The purpose of this study is to examine how professionals and paraprofessionals involved with a Sexual Assault Response Team (SART) understand and navigate different professional statutory requirements for victim confidentiality. Telephone surveys are conducted with 78 professionals: medical (27.8%), criminal justice (44.3%), and victim advocacy…
Keppel, Robert D; Weis, Joseph G
The act of leaving a victim's body in an unusual position is a conscious criminal action by an offender to thwart an investigation, shock the finder and investigators of the crime scene, or give perverted pleasure to the killer. The unusual position concepts of posing and staging a murder victim have been documented thoroughly and have been accepted by the courts as a definable phenomenon. One staging case and one posing case are outlined and reveal characteristics of those homicides. From the Washington State Attorney General's Homicide Investigation and Tracking System's database on murder covering the years 1981-2000 (a total of 5,224 cases), the relative frequency of unusual body dispositions is revealed as a very rare occurrence. Only 1.3% of victims are left in an unusual position, with 0.3% being posed and 0.1% being staged. The characteristics of these types of murders also set them apart: compared to all other murders, in staged murders the victims and killers are, on average, older. All victims and offenders in the staged murders are white, with victims being disproportionately white in murders with any kind of unusual body disposition. Likewise, females stand out as victims when the body is posed, staged, or left in other unusual positions. Whereas posed bodies are more likely to include sexual assault, often in serial murders, there is no evidence of either in the staged cases. Lastly, when a body is left in an unusual position, binding is more likely, as well as the use of more "hands on" means of killing the victim, such as stabbing or cutting weapons, bludgeons, ligatures, or hands and feet.
UNDERLYING VALUES. Confidentiality's value is not intrinsic but rather instrumental.That is to say, the value of confidentiality is derivative from the other values it advances.We can distin- guish four such values: autonomy, privacy, promise-keeping and utility (or welfare). Autonomy. Autonomous beings are those that are.
mation about themselves.This is particu- larly important given the often sensitive and personal nature of the information that medical practitioners can acquire, and the damaging ways in which such informa- tion could be used. Privacy. Although privacy, like confidentiality, can foster a person's autonomy, people also.
Strous, R D
In Nazi Germany, approximately 200 000 mentally ill people were murdered under the guise of euthanasia. Relatively little is known regarding the fate of the Jewish mentally ill patients targeted in this process, long before the Holocaust officially began. For the Nazis, Jewish mentally ill patients were doubly cursed since they embodied both "precarious genes" and "racial toxin". To preserve the memory of the victims, Yad Vashem, the leading institution dedicated to documentation of the Holocaust, actively collects information and documents the fate of victims in an open online database. Recently, a list of approximately 1200 names of Jewish mentally ill euthanasia victims has been compiled from hospital archives. Their fate remains unknown to surviving family members. Given the duty to preserve medical confidentiality, can this list be publicised for public interest and for notifying families-publicising names and death circumstances, including where "killed" would immediately indicate that the person had had a mental illness? Does the right to medical confidentiality lapse upon death? Is time elapsed since death a factor? Can opposing obligations of preserving victims' memory over-ride medical confidentiality? What if a family member objects to a grandparent's name being exposed on the list of mentally ill patients? This article considers these issues as well as the "rational" and "non-rational" factors in ethical decisional making surrounding this unique dilemma. Several possible solutions are proposed including preserving the list in a locked database for access by families and researchers, publicising in the media that such a list exists, publishing the information online without any identifiers and submitting the information to historians, allowing them to process the data as they see fit.
Burns, Robert E.
After telling a psychologist his intentions to kill Tatiana Tarasoff, Prosenjit Poddar did so. In Tarasoff v. Regents of University of California the psychologist was found liable for not warning the victim of danger. The author contends that the decision, in terms of medical capabilities, may be ahead of its time. (JT)
Smith, N C E; Findlay, G P; Weyman, D; Freeth, H
In 2006 the National Confidential Enquiry into Patient Outcome and Death undertook a large prospective study of trauma care, which revealed several findings pertaining to the management of head injuries in a sample of 493 patients. Case note data were collected for all trauma patients admitted to all hospitals accepting emergencies in england, wales, Northern Ireland and the Channel Islands over a three-month period. severely injured patients with an injury severity score (iss) of ≥16 were included in the study. the case notes for these patients were peer reviewed by a multidisciplinary group of clinicians, who rated the overall level of care the patient received. Of the 795 patients who met the inclusion criteria for the study, 493 were admitted with a head injury. Room for improvement in the level of care was found in a substantial number of patients (265/493). Good practice was found to be highest in high volume centres. The overall head injury management was found to be satisfactory in 84% of cases (319/381). This study has shown that care for trauma patients with head injury is frequently rated as less than good and suggests potential long-term remedies for the problem, including a reconfiguration of trauma services and better provision of neurocritical care facilities.
Wangmo, Tenzin; Handtke, Violet; Elger, Bernice Simone
Ensuring confidentiality is the cornerstone of trust within the doctor-patient relationship. However, health care providers have an obligation to serve not only their patient's interests but also those of potential victims and society, resulting in circumstances where confidentiality must be breached. This article describes the attitudes of mental health professionals (MHPs) when patients disclose past crimes unknown to the justice system. Twenty-four MHPs working in Swiss prisons were interviewed. They shared their experiences concerning confidentiality practices and attitudes towards breaching confidentiality in prison. Qualitative analysis revealed that MHPs study different factors before deciding whether a past crime should be disclosed, including: (1) the type of therapy the prisoner-patient was seeking (i.e., whether it was court-ordered or voluntary), (2) the type of crime that is revealed (e.g., a serious crime, a crime of a similar nature to the original crime, or a minor crime), and (3) the danger posed by the prisoner-patient. Based on this study's findings, risk assessment of dangerousness was one of the most important factors determining disclosures of past crimes, taking into consideration both the type of therapy and the crime involved. Attitudes of MHPs varied with regard to confidentiality rules and when to breach confidentiality, and there was thus a lack of consensus as to when and whether past crimes should be reported. Hence, legal and ethical requirements concerning confidentiality breaches must be made clear and known to physicians in order to guide them with difficult cases.
Vukosavljević-Gvozden Tatjana D.
Full Text Available The article examines confidentiality principle from different perspectives: as the factor which plays a very important part in developing a productive therapist-client relationship, ethical and, in many countries, legal issue. Ways to maintain confidentiality in therapy are stated, as well as situations in which it is inevitably limited. Three dilemmas concerning confidentiality are explained and discussed. The first is when one should speak and when one should be silent and what we should do when we are in two minds. The second is whether the client should be informed about confidentiality limitations at the very beginning, or when the need arises during the treatment. The third is whether confidentiality limitation (when a client poses a threat to himself or to the society should be legally regulated, as it is being done in many western countries.
Grady, C; Jacob, J; Romano, C
Despite the many justifications for protecting patient confidentiality, we recognize that confidentiality cannot be absolute. Our world of automated information and easy access and storage poses many threats to confidentiality. This paper has described a survey conducted at the NIH Clinical Center to assess the knowledge, attitudes, and behaviors of clinical physicians and nurses about confidentiality of patient information. The survey findings demonstrate the need for reminders and increased awareness about confidentiality in our setting. Most of the survey respondents had a good knowledge of what was expected of them, and they believed that confidentiality was important and maintaining it was their responsibility. Of interest was that in several simulated clinical situations, there was a discrepancy between what respondents indicated they should do and what they thought they would do. The biggest discrepancies appeared in situations that involved overhearing a patient conversation on the elevator, approaching an unfamiliar person who is reading a medical record in the nurses' station, and answering a patient's inquiry about the status of another patient. The findings support the speculation that this difference may be attributed to discomfort or decreased awareness, and not necessarily to lack of knowledge. Results indicate that policies and administrative expectations should be frequently communicated and enforced, and that educational programs that address issues of confidentiality should be provided. The results of this survey have been influential in guiding educational strategies and administrative activities at the clinical center. The clinical center initiated a confidentiality awareness campaign, displaying a new poster every three months in strategic locations and distributing other tangible reminders (such as pens, magnets, and buttons) containing the same confidentiality message.(ABSTRACT TRUNCATED AT 250 WORDS)
Ong, B B; Kaur, S
The duty of confidentiality in the normal doctor-patient relationship is well recognized. However, the duty of confidentiality between the pathologist who performs the autopsy and the requesting authorities and the next-of-kin is not as clearly spelt out. This article discusses the problems faced by the pathologist with regards to hospital and medico-legal autopsies in Malaysia. A proposed ethical guideline is included on how to deal with peculiar issues regarding confidentiality and the pathologist.
This article synthesizes existing literature to provide a summary of the ethical issues concerning patient confidentiality in sport. It outlines the medical principle of confidentiality and identifies cross-cultural ethicolegal variations that shape its implementation. Clinicians' multiple obligations, physical environments, and practice and policy contexts are discussed, and research detailing experiences of maintaining patient confidentiality in sport is reviewed. Policy recommendations for enhancing compliance with this ethical principle are summarized. It is argued that the context of sport exacerbates pressures on clinicians to break patient confidentiality, breaches occur regularly, and interventions are required to enhance ethical compliance in sports medicine. Copyright © 2016 Elsevier Inc. All rights reserved.
Lindenthal, Jacob Jay; Thomas, Claudewell S.
Assessed attitudes toward confidentiality and the conditions under which it would be breached in the psychologist-patient relationship. Psychologists, patients, and nonpatients completed questionnaires, which showed concern among subjects that confidentiality might be broken. In some cases, this fear prevented people from seeking treatment. (BH)
Rothstein, M.A. [ed.
Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.
Ebifananyi II – People Poses Places Andrea Stultiens People Poses Places is the second part of Ebifananyi, a book series that visualises historical Ugandan photo collections. In People Poses Places we delve into the archive of the photographer Musa Katuramu. In the mid 1930s, teacher and carpenter
Dentists must be cognisant of what the law requires and how they are expected to respond. When the law does not address an issue, the dentist would need to weigh the circumstances and consequences and do what he/she thinks is ethically appropriate and acceptable. The need to maintain confidentiality of any information given to us in our professional capacity is paramount. Patient autonomy and their absolute right to confidentiality must be ensured in almost all but the most exceptional circumstances. Patients have the ethical and legal right to expect a health professional to keep confidential the information provided during the course of their care. Disclosure of patient information is only permitted with the patient's consent or if there is an overwhelming public interest in disclosure as prescribed by the law.
Stefan Lueders, Computer Security Team
Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure! Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...
Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke
Confidentiality is an important concern in today's information society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multi-threading poses new
Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke
Confidentiality is an important concern in today’s informa- tion society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multi- threading poses new
Confidentiality stands out in psychiatry through its multiple connotations as an intrinsic necessity in the ethics of professional relationships. Thus it represents an important characteristic of this profession and at the same time a stringent request which, through its specificity, implies a direct contact with persons in need for help. Despite being inserted in professional codes and legislative systems, confidentiality in psychiatry is far from being considered a clarified matter and does not stand aside from ethical controversy. Keeping the professional secret is often a hard task due to the pressure of the law or of other professional groups who can bring multiple justifications, including that of action for the benefit of society. The therapist is often sub- mitted to a tension caused on the one hand by the promise of keeping the professional secret and on the other hand by multiple requests of breaking the confidentiality. So the problem of confidentiality in Psychiatry deserves special attention because in this profession, more than in other branches of medicine, the gain of the patient's trust is essential in the psychotherapeutic relationship.
Sealander, Karen A.; Schwiebert, Valerie L.; Oren, Thomas A.; Weekley, Jean L.
Introduces issues surrounding confidentiality in the schools, and the laws that govern and protect students, teachers, and school counselors. Maintains that although impossible for school counselors to be fully aware of all legal principles affecting their work, it is essential that they continually seek to stay abreast of changes in legal and…
Full Text Available Example-based mesh deformation techniques produce natural and realistic shapes by learning the space of deformations from examples. However, skeleton-based methods cannot manipulate a global mesh structure naturally, whereas the mesh-based approaches based on a translational control do not allow the user to edit a local mesh structure intuitively. This paper presents an example-driven mesh editing framework that achieves both global and local pose manipulations. The proposed system is built with a surface deformation method based on a two-step linear optimization technique and achieves direct manipulations of a model surface using translational and rotational controls. With the translational control, the user can create a model in natural poses easily. The rotational control can adjust the local pose intuitively by bending and twisting. We encode example deformations with a rotation-invariant mesh representation which handles large rotations in examples. To incorporate example deformations, we infer a pose from the handle translations/rotations and perform pose space interpolation, thereby avoiding involved nonlinear optimization. With the two-step linear approach combined with the proposed multiresolution deformation method, we can edit models at interactive rates without losing important deformation effects such as muscle bulging.
valid at the lower end of the IQ range. The assessment of rape victims is a sensitive matter and poses a number of challenges to the clinician. Rape victims are often traumatised by their experience, and this can make them reluctant to talk about the incident. In a study done by Elklit et al., it was found that ~70% of sexual ...
The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…
Plantinga, Laura; Natowicz, Marvin R.; Kass, Nancy E.; Hull, Sara Chandros; Gostin, Lawrence O.; Faden, Ruth R.
Despite policy attention to medical privacy and patient confidentiality, little empirical work exists documenting and comparing experiences of persons with genetic versus nongenetic medical conditions concerning persons’ disclosure to others as well as their views about appropriate confidentiality to and within families. The goal of this cross-sectional interview study with nearly 600 participants was to document and compare the experiences, attitudes, and beliefs of persons with strictly genetic conditions to those of persons with or at risk for other serious medical conditions in terms of the degree to which they have disclosed to others that they have the condition and their views about how others ought to maintain the confidentiality of that information. While almost all participants reported that family members knew about their condition, results suggest participants want to control that disclosure themselves and do not want doctors to disclose information to family members without their knowledge. Similarly, participants do not think family members should be able to get information about them without their knowledge but feel overwhelmingly that it is a person’s responsibility to disclose information about hereditary conditions to other family members. Ambivalence about confidentiality was evident: while most participants did not mind doctors sharing information with other doctors when it was for their benefit, the majority also felt that doctors should be punished for releasing information without their permission. The views and experiences reported here generally did not differ by whether participants had genetic versus nongenetic conditions, suggesting that the extensive policy focus on genetic information may be unwarranted. PMID:12704638
McIntyre, Jared Kean; Widom, Cathy Spatz
The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn
This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show that the proba......This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...
Barslund, Mikkel; Rand, John; Tarp, Finn
This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show that the proba......This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...
In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity. Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations. On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R.
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
School of Child and. Adolescent Health. University of Cape. Town. Lesley Henley is a member of the. Research Ethics. Committee of the. Health Sciences ... care. Confidentiality and the adolescent patient. Doctors may find themselves in an invidious position, trying to balance loyalty to family against confidentiality. Chantal ...
Rothstein, M.A. [ed.
Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.
... 32 National Defense 6 2010-07-01 2010-07-01 false Confidentiality promises. 806b.9 Section 806b.9... PROGRAM Obtaining Law Enforcement Records and Confidentiality Promises § 806b.9 Confidentiality promises. Promises of confidentiality must be prominently annotated in the record to protect from disclosure any...
... 25 Indians 2 2010-04-01 2010-04-01 false Confidentiality. 571.3 Section 571.3 Indians NATIONAL... INVESTIGATIONS General § 571.3 Confidentiality. Unless confidentiality is waived, the Commission shall treat as... appropriate law enforcement officials. The confidentiality of documents submitted in a multiple-party...
... 34 Education 2 2010-07-01 2010-07-01 false Confidentiality. 300.610 Section 300.610 Education... DISABILITIES Monitoring, Enforcement, Confidentiality, and Program Information Confidentiality of Information § 300.610 Confidentiality. The Secretary takes appropriate action, in accordance with section 444 of...
This website informs businesses, policymakers, and the public about the confidential business information (CBI) provisions of § 14 of the Toxic Substances Control Act (TSCA), as amended by the Frank R. Lautenberg Chemical Safety for the 21st Century Act.
Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.
Bærentzen, Jakob Andreas; Hansen, Kristian Evers; Erleben, Kenny
In this paper, we propose a pose editing and animation method for triangulated surfaces based on a user controlled partitioning of the model into deformable parts and rigid parts which are denoted handles. In our pose editing system, the user can sculpt a set of poses simply by transforming...... problem in order to obtain the interpolation weights. While the system can be used simply for building poses, it is also an animation system. The user can specify a path for a given constraint and the model is animated correspondingly....
... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Confidentiality. 574.440 Section... Grantees and Project Sponsors § 574.440 Confidentiality. The grantee shall agree, and shall ensure that each project sponsor agrees, to ensure the confidentiality of the name of any individual assisted under...
... 46 Shipping 8 2010-10-01 2010-10-01 false Confidentiality. 249.11 Section 249.11 Shipping MARITIME... UNDERWRITERS FOR MARINE HULL INSURANCE § 249.11 Confidentiality. (a) If the data submitted under this rule... for confidentiality at the time of any request for production of information under the FOIA by third...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 710.58 Section 710.58... CHEMICAL INVENTORY REGULATIONS Inventory Update Reporting for 2006 and Beyond § 710.58 Confidentiality. (a) Any person submitting information under this subpart may assert a business confidentiality claim for...
... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1691.3 Section 1691.3 Labor Regulations... EMPLOYMENT DISCRIMINATION FILED AGAINST RECIPIENTS OF FEDERAL FINANCIAL ASSISTANCE § 1691.3 Confidentiality. When an agency receives information obtained by EEOC, the agency shall observe the confidentiality...
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 413.9 Section 413.9... TRANSPORTATION LICENSING LICENSE APPLICATION PROCEDURES § 413.9 Confidentiality. (a) Any person furnishing... for which any person or agency requests confidentiality must be clearly marked with an identifying...
... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 531.4 Section 531.4 Shipping FEDERAL... General Provisions § 531.4 Confidentiality. (a) All NSAs and amendments to NSAs filed with the Commission... agree to disclose information contained in it. Breach of any confidentiality agreement contained in an...
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 414.13 Section 414.13... TRANSPORTATION LICENSING SAFETY APPROVALS Application Procedures § 414.13 Confidentiality. (a) To ensure confidentiality of data or information in the application, the applicant must— (1) Send a written request with the...
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Confidentiality agreements. 2.215 Section 2.215 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.215 Confidentiality agreements. (a) No EPA officer, employee...
... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1641.3 Section 1641.3 Labor Regulations... SUBCONTRACTS § 1641.3 Confidentiality. When the Department of Labor receives information obtained by EEOC, the Department of Labor shall observe the confidentiality requirements of sections 706(b) and 709(e) of title VII...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 717.19 Section 717.19... THE ENVIRONMENT General Provisions § 717.19 Confidentiality. (a) Any person submitting copies of records may assert a business confidentiality claim covering all or part of the submitted information. Any...
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Confidentiality. 60-742.3... HOLDING GOVERNMENT CONTRACTS OR SUBCONTRACTS § 60-742.3 Confidentiality. When the Department of Labor receives information obtained by EEOC, the Department of Labor shall observe the confidentiality...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 712.15 Section 712.15... INFORMATION RULES General Provisions § 712.15 Confidentiality. (a) Any person submitting information under this part may assert business confidentiality claims for the information as described in the pertinent...
... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Confidentiality. 57.606 Section 57.606... NONFERROUS SMELTER ORDERS Research and Development Requirements § 57.606 Confidentiality. The provisions of section 114 of the Act and 40 CFR part 2 shall govern the confidentiality of any data or information...
... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1640.4 Section 1640.4 Labor Regulations... WITH DISABILITIES ACT AND SECTION 504 OF THE REHABILITATION ACT OF 1973 § 1640.4 Confidentiality. (a... shall observe the confidentiality requirements of section 706(b) and section 709(e) of the Civil Rights...
... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Confidentiality. 790.7 Section 790.7...) PROCEDURES GOVERNING TESTING CONSENT AGREEMENTS AND TEST RULES General Provisions § 790.7 Confidentiality. (a... Act may assert a claim of confidentiality for certain information submitted to EPA in response to the...
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality. 285.2 Section 285.2... LABORATORY ACCREDITATION PROGRAM § 285.2 Confidentiality. To the extent permitted by applicable laws, NVLAP will protect the confidentiality of all information obtained relating to the application, on-site...
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 1003.108 Section 1003.108....108 Confidentiality. (a) Complaints and preliminary inquiries. Except as otherwise provided by law or... conduct is the subject of a complaint or preliminary inquiry, however, may waive confidentiality, except...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality claims. 716.55 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.55 Confidentiality claims. (a)(1... clearly identify the material subject to the claim. (3) Any respondent may assert a confidentiality claim...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public... MISCONDUCT General § 93.108 Confidentiality. (a) Disclosure of the identity of respondents and complainants... prescribed by applicable law, confidentiality must be maintained for any records or evidence from which...
... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 502.405 Section 502.405 Shipping... Alternative Dispute Resolution § 502.405 Confidentiality. (a) Except as provided in paragraphs (d) and (e) of... govern the confidentiality of the dispute resolution proceeding, in accordance with the guidance on...
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 42.603 Section 42.603... Financial Assistance § 42.603 Confidentiality. When an agency receives information obtained by EEOC, the agency shall observe the confidentiality requirements of sections 706(b) and 709(e) of title VII as would...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 710.38 Section 710.38... CHEMICAL INVENTORY REGULATIONS 2002 Inventory Update Reporting § 710.38 Confidentiality. (a) Any person submitting information under this part may assert a business confidentiality claim for the information. The...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 707.75 Section 707.75... IMPORTS AND EXPORTS Notices of Export Under Section 12(b) § 707.75 Confidentiality. (a) A person may assert a claim of confidentiality for any information which is submitted to EPA in a notice. (b) Any...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 59.11 Section 59.11 Public Health... Project Grants for Family Planning Services § 59.11 Confidentiality. All information as to personal facts... confidentiality. Otherwise, information may be disclosed only in summary, statistical, or other form which does...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 56.111 Section 56.111 Public... SERVICES General Provisions § 56.111 Confidentiality. All information as to personal facts and... designee with appropriate safeguards for confidentiality of patient records. Otherwise, information may be...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 67.20 Section 67.20 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES FELLOWSHIPS, INTERNSHIPS, TRAINING AGENCY..., Evaluation, Demonstration, and Dissemination Projects § 67.20 Confidentiality. The confidentiality of...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 51c.110 Section 51c.110 Public... SERVICES General Provisions § 51c.110 Confidentiality. All information as to personal facts and... designee with appropriate safeguards for confidentiality of patient records. Otherwise, information may be...
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 801.5 Section 801.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF... FOREIGN PERSONS § 801.5 Confidentiality. Information collected pursuant to § 801.3 is confidential (see...
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 37.4 Section 37.4... DISABILITIES ACT AND SECTION 504 OF THE REHABILITATION ACT OF 1973 § 37.4 Confidentiality. (a) When a section... the confidentiality requirements of section 706(b) and section 709(e) of the Civil Rights Act of 1964...
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 207.105 Section 207.105 Customs... and Committee Proceedings § 207.105 Confidentiality. (a) Protection of proprietary and privileged.... (b) Confidentiality of proceedings. Upon the request of any charged party pursuant to § 207.106 of...
Ranj Bar, Amin
Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.
Brown, Stephen I
As a result of the editors' collaborative teaching at Harvard in the late 1960s, they produced a ground-breaking work -- The Art Of Problem Posing -- which related problem posing strategies to the already popular activity of problem solving. It took the concept of problem posing and created strategies for engaging in that activity as a central theme in mathematics education. Based in part upon that work and also upon a number of articles by its authors, other members of the mathematics education community began to apply and expand upon their ideas. This collection of thirty readings is a tes
Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 21, No 1 (2003) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Confidentiality. D Benatar. Abstract. No Abstract. Full Text:.
Hu, Xiaoli; Su, Xiuqin; Zhang, Sanxi; Liu, Biao; Zhou, Zhiqiang
In this paper pose measurement refers to flying pose measurement of rigid body including the pitch angle, yaw angel and roll angle. Pose measurement is of vital importance for such items as weapons settings, fault analysis and optimation design. Pose measurement based on optical images has many merits such as intuitive and non-contacted, which is a main method to measure pose currently. According to the parameters used and principle of the algorithms, the existing methods of pose measurement based on optical images are classified systematically and comprehensively for the first time as following: the methods of one station un-using camera's inner parameters are divided into the feature length ratio method and the direct linear transformation(DLT )method, otherwise they are divided into the perspective n points(PNP)problem and the optical and radar integration method, the axes from planes intersection using two stations extensible to multistation, and model matching applied to one or more stations, and then they are comparatively analyzed .At last combined with practical applications such as one or more stations, have or no model and inner parameters used or unused, some selection and improvement of key points are given practically.
Abbing, Henriette Roscam
Medical confidentiality is of individual and of general interest. Medical confidentiality is not absolute. European countries differ in their legislative approaches of consent for data-sharing and lawful breaches of medical confidentiality. An increase of interference by the legislator with medical confidentiality is noticeable. In The Netherlands for instance this takes the form of new mandatory duties to report resp. of legislation providing for a release of medical confidentiality in specific situations, often under the condition that reporting takes place on the basis of a professional code that includes elements imposed by the legislator (e.g. (suspicion of) child abuse, domestic violence). Legislative interference must not result in the patient loosing trust in healthcare. To avoid erosion of medical confidentiality, (comparative) effectiveness studies and privacy impact assessments are necessary (European and national level). Medical confidentiality should be a subject of permanent education of health personnel.
Johnson Oluwole Ayodele
Full Text Available Badagry is the first community to receive the Christian religion in Nigeria. For this, every good reason exists to suppose that its coming into early contact with the missionaries should have caused the Ogu people to acquire a healthier understanding of fair play in the context of widowhood practices. Regrettably, they seem to respond more slowly to change in their attitudes to widows. Thus, despite the overwhelming presence of Christian relics in the ancient town of Badagry, traditional customs such as wife inheritance and widowhood rites have continued to appear significantly associated with violence against which women are not well-protected. “Gender Victimization: A Study of Widowhood Practices” among Ogu People of Lagos is the focus of this study. Quantitative and qualitative methods were adopted for the study. Thus, five in-depth interviews and three focus group discussion instruments were used to collect primary data, which were used to complement quantitative data. Although quantitative data were subjected to univariate, bivariate, and multivariate analyses, qualitative data were cleaned, reorganized into themes and analyzed. The study found that much as the Ogu people of Lagos acknowledge the position of the scriptures on society’s non-criminal relation with widows, they still believe that their culture comfortably drives the greater proportion of their widow-friendly interactions. This study suggests that the adoption of cultural best practices in handling women and their peculiar issues will tone down violence in customary widowhood practices and enable women who lost their husbands in circumstances beyond their controls access community-based support.
Center for Homeland Defense and Security
Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Paper: IPAWS (Integrated Public Alert and Warning System)” Modernizing emergency alerts poses challenges Anthony Cox is interested in the next generation of emergency alert systems.Any television viewer...
Newman, Angela B; Kjervik, Diane K
Health care legislation can be difficult to understand and apply in critical situations where patients may not be physically capable of autonomous control of confidential health information. Nurses are often the first to encounter confidential information about patients. To explore critical care nurses' knowledge of federal and North Carolina state legislation regarding confidentiality. This descriptive, qualitative study included 12 critical care nurses who were asked to describe their knowledge of federal confidentiality legislation and specific knowledge of North Carolina's confidentiality legislation. Critical care nurses were knowledgeable about federal confidentiality laws but demonstrated a need for further education about state-specific legislation. Nurses' application of confidentiality legislation demonstrates their knowledge of confidentiality legislation. To continue the trusting relationship that nurses have traditionally held with patients and patients' families, it is imperative for nurses to remain current about confidentiality legislation. Through education both before and after licensure, correct application of legislation can be achieved. Further research can aid in exploring the intersection between health care legislation and ethics. ©2016 American Association of Critical-Care Nurses.
... 7 Agriculture 6 2010-01-01 2010-01-01 false Confidentiality of submission and duration of confidentiality. 400.702 Section 400.702 Agriculture Regulations of the Department of Agriculture (Continued... Submission of Policies, Provisions of Policies and Rates of Premium § 400.702 Confidentiality of submission...
Holm, Preben; Petersen, Henrik Gordon
to the particular object and in order to handle the demand for flexibility, there is an increasing demand for avoiding such dedicated mechanical alignment systems. Rather, it would be desirable to automatically locate and grasp randomly placed objects from tables, conveyor belts or even bins with a high accuracy......Automated industrial assembly today require that the 3D position and orientation (hereafter ''pose`) of the objects to be assembled are known precisely. Today this precision is mostly established by a dedicated mechanical object alignment system. However, such systems are often dedicated...... that enables direct assembly. Conventional vision systems and laser triangulation systems can locate randomly placed known objects (with 3D CAD models available) with some accuracy, but not necessarily a good enough accuracy. In this paper, we present a novel method for refining the pose accuracy of an object...
Gupta, S; Bhardwaj, D N; Dogra, T D
Since the legal consequences taking in consideration of Indian evidence Act 1857 of an unwarranted release of confidential information are uncertain and even the consequences may be serious, it is necessary that a physician be most cautious when divulging any information about a patient. Although there are exceptions to the proposition that all confidential information acquired from a patient should be kept secret, the basic rule to remember is that confidential information should not be revealed without obtaining the patient's consent unless law of the land like provision in criminal procedure code of India requires the physician to report the information, to any person or insurance company. Whenever a physician believes it is necessary to reveal a professional secret to protect the welfare of a patient, a third person, or the community, he should exercise caution in the method of disclosure. The following suggestions have been made to guide physicians under these circumstances: 1. Assure yourself that the person informed is sometime entitled to the information, such as the patient's parent or guardian. 2. Do not give information by telephone if you do not recognize the voice of the person making the request. 3. Avoid the use of telegrams or letters to communicate medical information of patient. 4. If you are in doubt about your right to release the information consult your legal council. 5. A person in police custody as an undertrial prisoner has the right not to permit the doctor who has examined him, to disclose the nature of his illness to any person. If a person is convicted, he has no right and the doctor can disclose the result to the authorities. 6. Never release the treatment history without written consent from patient or its legal heirs to any insurance company.
Original title: Slachtoffers van criminaliteit. More than three million people in the Netherlands are victims of crime each year. Are all Dutch citizens equally at risk of becoming victims? And of those who become victims, which report the offence to the police, and what motivates them to do
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 354.17 Section 354.17 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE PROCEDURES FOR IMPOSING SANCTIONS FOR VIOLATION OF AN ANTIDUMPING OR COUNTERVAILING DUTY ADMINISTRATIVE PROTECTIVE ORDER § 354.17 Confidentiality...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1220.624 Section 1220.624 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... CONSUMER INFORMATION Procedures To Request a Referendum Definitions § 1220.624 Confidentiality. The names...
... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.413 Section 456.413 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...: Informational Requirements § 456.413 Confidentiality. The UR plan must provide that the identities of individual...
... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.213 Section 456.213 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...: Informational Requirements § 456.213 Confidentiality. The UR plan must provide that the identities of individual...
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality. 129.5 Section 129.5 Money and Finance: Treasury Regulations Relating to Money and Finance PORTFOLIO INVESTMENT SURVEY REPORTING § 129.5 Confidentiality. (a) Information collected pursuant to the Act will be kept in confidence...
... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 530.4 Section 530.4 Shipping FEDERAL MARITIME COMMISSION REGULATIONS AFFECTING OCEAN SHIPPING IN FOREIGN COMMERCE SERVICE CONTRACTS General Provisions § 530.4 Confidentiality. All service contracts and amendments to service contracts filed with the...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 50.310 Section 50.310 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL... § 50.310 Confidentiality. Information in the records or in the possession of programs or projects which...
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidentiality. 701.5 Section 701.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF... FIRMS § 701.5 Confidentiality. (a) As provided by § 309(c) of the Defense Production Act of 1950, as...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION ORDER Procedures To Request a Referendum Definitions § 1280.634 Confidentiality. The names of...
... 46 Shipping 9 2010-10-01 2010-10-01 false Confidentiality. 550.104 Section 550.104 Shipping FEDERAL MARITIME COMMISSION REGULATIONS AND ACTIONS TO ADDRESS RESTRICTIVE FOREIGN MARITIME PRACTICES... General Provisions § 550.104 Confidentiality. Notwithstanding any other law, the Commission may refuse to...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1250.537 Section 1250.537 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... and Regulations Records § 1250.537 Confidentiality. All information obtained by officers and employees...
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 1244.16 Section 1244.16 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS TEMPORARY PROTECTED STATUS FOR NATIONALS OF DESIGNATED STATES § 1244.16 Confidentiality. The...
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 244.16 Section 244.16 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS TEMPORARY PROTECTED STATUS FOR NATIONALS OF DESIGNATED STATES § 244.16 Confidentiality. The information contained in the...
... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Confidentiality. 403.14 Section 403.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS GENERAL PRE-TREAT-MENT REGULATIONS FOR EXIST-ING AND NEW SOURCES OF POLLUTION § 403.14 Confidentiality. (a...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 750.36 Section 750.36 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT PROCEDURES... Processing and Distribution in Commerce Exemptions § 750.36 Confidentiality. EPA encourages the submission of...
... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 430.75 Section 430.75 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY CONSERVATION PROGRAM FOR CONSUMER PRODUCTS Certification and Enforcement § 430.75 Confidentiality. Pursuant to the provisions of 10 CFR 1004.11, any person submitting...
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality. 356.29 Section 356.29 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE PROCEDURES AND RULES FOR IMPLEMENTING... Undertaking § 356.29 Confidentiality. (a) All proceedings involving allegations of a violation of a protective...
... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 456.113 Section 456.113 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED... Requirements § 456.113 Confidentiality. The UR plan must provide that the identities of individual recipients...
... 29 Labor 4 2010-07-01 2010-07-01 false Confidentiality. 1601.22 Section 1601.22 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION PROCEDURAL REGULATIONS Procedure for... Confidentiality. Neither a charge, nor information obtained during the investigation of a charge of employment...
... 45 Public Welfare 4 2010-10-01 2010-10-01 false Confidentiality. 1340.20 Section 1340.20 Public Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES... Grants and Contracts § 1340.20 Confidentiality. All projects and programs supported under the Act must...
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality. 750.16 Section 750.16 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT PROCEDURES... Manufacturing Exemptions § 750.16 Confidentiality. The Agency encourages the submission of nonconfidential...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 67.104 Section 67.104 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES FELLOWSHIPS, INTERNSHIPS, TRAINING... Services Research, Evaluation, Demonstration, and Dissemination Projects § 67.104 Confidentiality...
... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality. 1019.8 Section 1019.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION GENERAL EXPORT OF NONCOMPLYING, MISBRANDED, OR BANNED PRODUCTS Procedures for Export of Noncomplying, Misbranded, or Banned Products § 1019.8 Confidentiality. If...
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Confidentiality. 245a.21 Section 245a.21 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ADJUSTMENT OF STATUS TO... Confidentiality. (a) No person other than a sworn officer or employee of the Department of Justice or bureau or...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136a.57 Section 136a.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT... Service Facilities and Indian Health Service Programs § 136a.57 Confidentiality. Information which is...
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Confidentiality. 800.702 Section 800.702 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... TAKEOVERS BY FOREIGN PERSONS Provision and Handling of Information § 800.702 Confidentiality. (a) Any...
... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality. 431.407 Section 431.407 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT General Provisions § 431.407 Confidentiality. Pursuant to the provisions of 10 CFR 1004.11, any...
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 0.29f Section 0.29f Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 4-Office of the Inspector General § 0.29f Confidentiality. The Inspector General shall not, during the pendency of an...
... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality. 4043.8 Section 4043.8 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS REPORTABLE EVENTS AND CERTAIN OTHER NOTIFICATION REQUIREMENTS General Provisions § 4043.8 Confidentiality. In accordance with...
... 42 Public Health 4 2010-10-01 2010-10-01 false Confidentiality. 438.224 Section 438.224 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED... Operation Standards § 438.224 Confidentiality. The State must ensure, through its contracts, that...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 136.57 Section 136.57 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES INDIAN HEALTH SERVICE, DEPARTMENT... Service Facilities and Indian Health Service Programs § 136.57 Confidentiality. Information which is...
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Confidentiality. 906.10 Section 906.10 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION AFFIRMATIVE ACTION POLICY AND PROCEDURE Development Program § 906.10 Confidentiality. All information submitted to...
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality. 270.506 Section 270.506 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... Commission Review of Jurisdictional Agency Determinations § 270.506 Confidentiality. (a) Except as provided...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidentiality. 1280.227 Section 1280.227 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidentiality. All information obtained from books, records, or reports under the Act, this subpart, and the...
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality. 821.55 Section 821.55 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES MEDICAL DEVICE TRACKING REQUIREMENTS Records and Inspections § 821.55 Confidentiality. (a) Any patient...
... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1160.403 Confidential treatment. (a) All persons, including agents...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that is...
... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Promotion and Research Order Reports, Books and Records § 1260.203 Confidential treatment. All information...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Books and Records § 1209.62 Confidential treatment. All information obtained from books, records, or...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment. All...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Research and Promotion Order Reports, Books, and Records § 1250.354 Confidential treatment. (a) All...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this part...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this part...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1218.62 Confidential treatment. All information obtained from books, records, or reports under the Act...
... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1150.173 Confidential treatment. All information obtained from such...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Records § 1215.62 Confidential treatment. (a) All information obtained from books, records, or reports...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this part...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act, this subpart...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1230.82 Section 1230.82 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1230.82 Confidential treatment. All information obtained from the books, records or reports required to...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential treatment...
... 7 Agriculture 3 2010-01-01 2010-01-01 false Confidential treatment. 54.1033 Section 54.1033 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... and Poultry Products § 54.1033 Confidential treatment. Every design review specialist providing...
... CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.13 Confidentiality restrictions..., administrative, or legislative proceedings conducted by any Federal, State, or local authority. Any disclosure... place where only alcohol or drug abuse diagnosis, treatment, or referral is provided may be acknowledged...
Nolan, Christopher W.
Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…
Nasta, Aarti; Shah, Brijen; Brahmanandam, Shoma; Richman, Katherine; Wittels, Kathleen; Allsworth, Jenifer; Boardman, Lori
To assess the incidence of sexual victimization among a convenience sample of college women and evaluate both victims and non-victims' knowledge and use of available on and off campus resources. Written questionnaire distributed to students in lobbies of two campus libraries and large computing center A private northeastern university Upper-class undergraduate women (sophomores, juniors and seniors) Respondents (n=234) were asked to complete demographic information, report instances of sexual victimization (including rape, sexual coercion and unwanted sexual contact) that occurred during the 1999-2000 academic year and indicate whether they would or did use either university and/or outside resources available to sexual assault victims. Of the women who participated, 38% (90/234) affirmed one or more episodes of sexual victimization, with 6% (14/234) reporting a completed rape and 4% (9/234) an attempted rape. Drug or alcohol-related impairment leading to unwanted sexual activity was reported by 15% (35/234) of women. Utilization of available on- and off-campus resources was uncommon among victims (22% and 6%, respectively); 12% contacted health services, while only 4% reported an event to university security. Victims cited fear, embarrassment and guilt, as well as lack of confidentiality, as the most common reasons for failure to use resources. Increasing campus awareness of sexual victimization and removing barriers to access for victims should remain university goals.
Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask
Rape is often a very traumatic experience, which affects not only the primary victim (PV) but also his/her significant others. Studies on secondary victims of rape are few and have almost exclusively studied male partners of female rape victims. This study examined the impact of rape on 107...... secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...
Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt
We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Confidentiality of... § 295.36 Confidentiality of information. Confidential information submitted by individual Claimants is... the availability of confidentiality protection under exemptions to the Freedom of Information Act and...
... 40 Protection of Environment 17 2010-07-01 2010-07-01 false Confidentiality of data. 82.182... Confidentiality of data. (a) Clean Air Act provisions. Anyone submitting information must assert a claim of confidentiality at the time of submission for any data they wish to have treated as confidential business...
Isaacs, Madelyn L; Stone, Carolyn
Counselors who work with children regularly face the ethical dilemma of confidentiality for which there are few definitive answers. Confidentiality and Minors Questionnaire about managing student's confidential information was distributed to district guidance supervisors. It appears that counselors' judgment of what breaches confidentiality is…
Eichner, Marcin; Ferrari, Vittorio
Most existing techniques for articulated Human Pose Estimation (HPE)consider each person independently. Here we tackle the problem in a new setting,coined Human Pose Coestimation (PCE), where multiple people are in a common,but unknown pose. The task of PCE is to estimate their poses jointly and toproduce prototypes characterizing the shared pose. Since the poses of the individual people should be similar to the prototype, PCE has less freedom compared to estimating each pose independently, which simplifies the problem.We demonstrate our PCE technique on two applications. The first is estimating the pose of people performing the same activity synchronously, such as during aerobics, cheerleading, and dancing in a group. We show that PCE improves pose estimation accuracy over estimating each person independently. The second application is learning prototype poses characterizing a pose class directly from an image search engine queried by the class name (e.g., “lotus pose”). We show that PCE leads to better pose estimation in such images, and it learns meaningful prototypes which can be used as priors for pose estimation in novel images.
Alahmad, Ghiath; Dierickx, Kris
Protecting confidentiality is an essential value in all human relationships, no less in medical practice and research.(1) Doctor-patient and researcher-participant relationships are built on trust and on the understanding those patients' secrets will not be disclosed.(2) However, this confidentiality can be breached in some situations where it is necessary to meet a strong conflicting duty.(3) Confidentiality, in a general sense, has received much interest in Islamic resources including the Qur'an, Sunnah and juristic writings. However, medical and research confidentiality have not been explored deeply. There are few fatwas about the issue, despite an increased effort by both individuals and Islamic medical organizations to use these institutional fatwas in their research. Infringements on confidentiality make up a significant portion of institutional fatwas, yet they have never been thoroughly investigated. Moreover, the efforts of organizations and authors in this regard still require further exploration, especially on the issue of research confidentiality. In this article, we explore medical and research confidentiality and potential conflicts with this practice as a result of fatwas released by international, regional, and national Islamic Sunni juristic councils. We discuss how these fatwas affect research and publication by Muslim doctors, researchers, and Islamic medical organizations. We argue that more specialized fatwas are needed to clarify Islamic juristic views about medical and research confidentiality, especially the circumstances in which infringements on this confidentiality are justified. © 2012 Blackwell Publishing Ltd.
... Agreements and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY PRODUCT MANDATORY REPORTING § 1170.12... Product Mandatory Reporting program other than in a manner that ensures that confidentiality is preserved...
Niveau, Gerard; Burkhardt, Sandra; Chiesa, Sarah
Confidentiality is both a fundamental principle of medical ethics and a legal obligation. In exceptional situations not covered by legal provisions, doctors may want to waive confidentiality against the wishes of the patient. Swiss law calls for an authority to rule on such cases. In the Canton of Geneva this authority is the Commission for Professional Confidentiality. This paper concerns 41 cases managed by this commission. The study shows that the majority of these requests to the Commission concern the reporting of patients who are not incompetent but need the protection of a legal guardianship. In rare cases, there is another interest higher than confidentiality: public order or functioning of justice. The Commission found that the measure requested was justified in the majority of cases brought before it. This study focuses on exceptional cases but it throws into relief the conflict between the principle of autonomy on the one hand and the need for patient protection and social justice on the other.
... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...
Kaare M Nielsen
Full Text Available Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.
For qualitative researchers, maintaining respondent confidentiality while presenting rich, detailed accounts of social life presents unique challenges. These challenges are not adequately addressed in the literature on research ethics and research methods. Using an example from a study of breast cancer survivors, I argue that by carefully considering the audience for one’s research and by re-envisioning the informed consent process, qualitative researchers can avoid confidentiality dilemmas that might otherwise lead them not to report rich, detailed data. PMID:19843971
Mathematical problem posing is an important skill for teachers of mathematics, and relates readily to mathematical creativity. This article gives a bit of background information on mathematical problem posing, lists further references to connect problem posing and creativity, and then provides 20 problems based on the multiplication table to be…
Liégeois, Axel; Eneman, Marc
Because of the development towards community care, care providers not only exchange information in a team, but increasingly also in networks. This is a challenge to confidentiality. The ethical question is how care providers can keep information about the care receiver confidential, whilst at the same time exchanging information about that care receiver in a team or network? Can shared confidentiality be extended from a team to a network? To clarify this question, the article refers to the advice of an expert ethics committee in mental health care. The advice regards exchange of information in a network as a further step in enhancing collaboration among care providers. Therefore, the good and evident practice of shared confidentiality in a team can be extended to a network if the same conditions are met. First, the care providers participate in a clearly defined and identifiable team or network. Secondly, they have a shared care responsibility. Thirdly, they have a duty of confidentiality. Fourth, they dialogue with the care receiver and obtain his or her consent. Finally, they apply the filter of relevance. Hence, conditional shared confidentiality is an ethical justification for the exchange of information in a team or network.
Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees
The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also
Full Text Available In this paper the findings of literature review and explorative empirical research of yoga application in the work with victims of various forms of sufferings is presented. The largest notion of victim is accepted, which encompasses victims of crime, victims of human rights violations (including convicted persons, as well as victims of war, natural disasters and other sufferings. After determination of the notion of victim and yoga, the review and analyses of research findings and direct experiences with the application of yoga in victim support and victimisation prevention worldwide and in Serbia, is done. The author’s research findings as well as personal experiences with the application of yoga in the work with prisoners in prison for women in Pozarevac (Serbia, within the workshops that Victimology Society of Serbia implemented during 2012/2013, are presented as well. In the conclusions, contribution of yoga to holistic approach to victim support as well as important role that yoga may have in prevention of victimisation and criminalisation, is stressed. The importance of yoga for support of prisoners as the part of preparation for re-entry and with the aim to prevent recidivism, as well as to enable their more successful reintegration into the society, is particularly emphasised. The paper is based on the research implemented by the author for the purpose of writing the final essey at the course for yoga instructors on International yoga academy, Yoga Allience of Serbia.
Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…
Abdalrahman, Ihab Babiker; Osman, Ahmed Mohammed Abdulrahman; Ali, Baraah Mohammed Adham; Mustafa, El Imam ElGhazali Seddik Mohamed; Ali, Eman Esam Hassan; Muneer, Mohamed Siddig Eltayeb
Little is known about patients' opinions about their rights in autonomy and confidentiality concerning their illness and this study was conducted to assess it. This multi-centred, cross-sectional study was conducted in outpatient clinics in Khartoum, Sudan. It was delivered to 295 respondents. Data were managed using Microsoft Excel 2010 and SPSS. Eighty-five percent of the patients wanted to know about their conditions, of whom 17% wanted to choose their treatment and 29% believed they had the right to refuse treatment. Most of the respondents would not wish to hide information from their doctors. There was a wide variation at the rate of patients hiding information from their relatives, depending on their diagnosis (HIV 90%, malignancy 16.7% and tuberculosis 0%.) Respondents want to choose their treating doctor, know about their diseases, be consulted before a procedure. They would like to leave technical issues to their treating doctors without jeopardising their own rights. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Fattah, E A
The study concerned 50 cases occurring throughout Austria between 1950 and 1962 where murder was committed for the purpose of robbing the victim. Fifty-nine convicted killers and 61 victims were involved and 1950 was chosen as the starting point of the research in order to avoid undue influence from the extraordinary factors affecting criminality during and immediately following the Second World War. Cases were consecutive and unselected apart from a very small number excluded through unavailability of their files for legal reasons at the time when the data were collected. Unsuccessful murder attempts were not excluded since there is no difference between crimes actually carried out and those merely attempted as regards criminogenic factors, the pre-criminal situation, the choice of victim, the relationship and interaction between criminal and victim, and the recourse to homicide. However, the inquiry was confined to cases where guilt had been proven because of the aim to study not only the crime and the victim, but also the relationship of the criminal and victim. The latter is obviously not possible where the murderer remains unknown. Accordingly, since the material comprises a large number of cases over a fairly long period (more than a decade) from all over Austria, it is fair to claim that it provides an overview of the criminality of murder with intent to rob, and of the killers and the victims, for an entire country and over a significant epoch.
Dina Budhi Utami
Full Text Available Computer vision yang didasarkan pada pengenalan bentuk memiliki banyak potensi dalam interaksi manusia dan komputer. Pose tangan dapat dijadikan simbol interaksi manusia dengan komputer seperti halnya pada penggunaan berbagai pose tangan pada bahasa isyarat. Berbagai pose tangan dapat digunakan untuk menggantikan fungsi mouse, untuk mengendalikan robot, dan sebagainya. Penelitian ini difokuskan pada pembangunan sistem pengenalan pose tangan menggunakan HuMoment. Proses pengenalan pose tangan dimulai dengan melakukan segmentasi citra masukan untuk menghasilkan citra ROI (Region of Interest yaitu area telapak tangan. Selanjutnya dilakukan proses deteksi tepi. Kemudian dilakukan ekstraksi nilai HuMoment. Nilai HuMoment dikuantisasikan ke dalam bukukode yang dihasilkan dari proses pelatihan menggunakan K-Means. Proses kuantisasi dilakukan dengan menghitung nilai Euclidean Distance terkecil antara nilai HuMomment citra masukan dan bukukode. Berdasarkan hasil penelitian, nilai akurasi sistem dalam mengenali pose tangan adalah 88.57%.
Kaitlyn N. Ryan
Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.
Daniels, Regina G; McCorkle, Ruth
The "second victim" phenomenon--when a healthcare provider experiences adverse events because of the adverse events of a patient--is not well known or understood among healthcare professionals, including Certified Registered Nurse Anesthetists (CRNAs). No published research is currently available on the impact of second victim specifically in CRNAs, but it is known that second victim poses major challenges for healthcare professionals. Therefore, it is important to acknowledge its occurrence and to develop an educational curriculum based on the available evidence in order to promote peer and organizational support infrastructures. A comprehensive literature review was conducted, 6 educational domains on second victim were developed, and an expert panel validated the content.
Beskow, Laura M; Check, Devon K; Namey, Emily E; Dame, Lauren A; Lin, Li; Cooper, Alexandra; Weinfurt, Kevin P; Wolf, Leslie E
Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality...
Breitenstein, Michael D.; Jensen, Jeppe; Høilund, Carsten
We present an algorithm to estimate the 3D pose (location and orientation) of a previously unseen face from low-quality range images. The algorithm generates many pose candidates from a signature to find the nose tip based on local shape, and then evaluates each candidate by computing an error fu...
..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Confidentiality of information. 31... RELIEF PROGRAM Conflicts of Interest § 31.217 Confidentiality of information. (a) Nonpublic information... shall take appropriate measures to ensure the confidentiality of nonpublic information and to prevent...
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidentiality of information. 210.72 Section 210.72 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN... Confidentiality of information. Confidential information (as defined in § 201.6(a) of this chapter) that is...
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Confidentiality of records... Clauses 1652.224-70 Confidentiality of records. As prescribed in 1624.104, the following clause shall be inserted in all FEHBP contracts: Confidentiality of Records (JAN 1991) (a) The Carrier shall use the...
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.
CRAC is an IT-architecture-based method for assessing and comparing confidentiality risks of distributed IT systems. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets), and the paths that may be followed
... 32 National Defense 5 2010-07-01 2010-07-01 false Confidentiality of information. 776.25 Section 776.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS RULES... Rules of Professional Conduct § 776.25 Confidentiality of information. (a) Confidentiality of...
... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Confidentiality of records. 17.278 Section 17.278 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... for Survivors and Dependents of Certain Veterans § 17.278 Confidentiality of records. Confidentiality...
Confidentiality is a central principle of medical ethics. The most common breaches of this principle are not the rare cases in which the principle is overridden by other considerations. Instead, confidentiality is most often breached when it clearly should be respected. In this paper I outline these threats to confidentiality, the ...
... confidentiality agreement. 1552.227-76 Section 1552.227-76 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.227-76 Project employee confidentiality agreement. As prescribed in 1527.409, insert the following clause: Project Employee Confidentiality Agreement (MAY 1994) (a) The Contractor recognizes that...
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Confidentiality of records... PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 2152.224-70 Confidentiality of records. As prescribed in 2124.104-70, insert the following clause: Confidentiality of Records (OCT 2005) (a) The...
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Confidentiality agreement and remedies. 47.85... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.85 Confidentiality agreement and remedies. (a) The confidentiality agreement authorized by § 47.84— (1) May restrict the use of the...
... 49 Transportation 8 2010-10-01 2010-10-01 false Confidentiality in ADR Matters 1109.3 Section 1109... PROCEEDINGS AND THOSE IN WHICH THE BOARD IS A PARTY § 1109.3 Confidentiality in ADR Matters In all ADR matters involving the Board, whether under the Administrative Dispute Resolution Act or not, the confidentiality...
... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Confidentiality of information. 80.26... (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Controls and Prohibitions § 80.26 Confidentiality of... treated, in so far as its confidentiality is concerned, in accordance with the provisions of 40 CFR part 2. ...
... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality of reports. 1116.9 Section... REPORTS SUBMITTED PURSUANT TO SECTION 37 OF THE CONSUMER PRODUCT SAFETY ACT § 1116.9 Confidentiality of... or references information reported under section 37, the confidentiality provisions of section 6(e...
... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Confidentiality of reports. 1117.7 Section 1117.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS... Confidentiality of reports. The confidentiality provisions of section 6 of the CPSA, 15 U.S.C. 2055, apply to...
Hendrix, Dennis H.
Presents four possible alternatives for handling intrafamily confidentiality, and evaluates the alternatives in accordance with Kitchener's ethical principles. Concludes that confidentiality exists for the benefit of the client, and when that benefit ceases to exist or is overridden by other factors, alternatives to absolute confidentiality must…
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.
In this paper we present CRAC, an IT infrastructure-based method for assessing and comparing confidentiality risks of IT based collaborations. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets and user
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Advance confidentiality determinations. 2.206 Section 2.206 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.206 Advance confidentiality determinations. (a) An...
...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...
Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.
This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…
Drewsen, Merete; Lando, Henrik; Cummins, Tim
IACCM (International Association for Contract and Commercial Management) has initiated. The main theoretical aspect of the article concerns the application of the value maximization principle (the Coase theorem) to the drafting of confidentiality agreements. While the article is not theoretical, its...
Jacobs, B.P.F.; Pieters, Wolter; Warnier, M.
This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a simple programming language via modification
American Association of University Professors, 2013
This report argues that requiring faculty members to sign confidentiality agreements as a requirement to serve on university committees is in most cases inconsistent with widely accepted standards of shared governance and with the concept of serving as a representative. This argument does not apply to faculty serving on promotion and tenure…
... which include data or information constituting a trade secret or disclosing a trade position, financial... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72... Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE MINIMUM QUALITY AND HANDLING...
... financial information, or information that relates to an ongoing investigation. (c) A party or a CAB may... OF PHARMACEUTICAL GOOD MANUFACTURING PRACTICE REPORTS, MEDICAL DEVICE QUALITY SYSTEM AUDIT REPORTS... under its laws, the confidentiality of information exchanged under this part. (b) In particular, neither...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE HASS AVOCADO PROMOTION, RESEARCH...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained under...
... CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Court Orders Authorizing Disclosure and Use § 2.63... bodily injury, including circumstances which constitute suspected child abuse and neglect and verbal... injury, including homicide, rape, kidnapping, armed robbery, assault with a deadly weapon, or child abuse...
Full Text Available This paper presents facts on peer violence victims, committed by minor perpetrators against other minors. The author analyses four main characteristics of peer violence: imbalance of power between perpetrators and victims, identified intention to cause injuries, permanent treats of repeated violence and afraidness of the victims. Otherness and weakness (physical and social of the victims are identified as the main motives of the perpetrators who decide to attack, and these characteristics form the basis of the victim typology. Due to the fact that the research is phenomenologically based mostly on media report on peer violence cases in the period between September 2011 and the end of 2012, the author illustrates all main statements with the real cases which took place in the focused period. Measures to combat peer violence are presented, like the already established such as the school without violence program, and those recently proposed, such as the so called Aleksa’s class. [Projekat Ministarstva nauke Republike Srbije: Društvene transformacije u procesu evropskih integracija - multidisciplinarni pristup
Tyra, P A
Older female rape victims usually live alone, are raped by strangers, experience physical force and injury, and also are robbed. Rape trauma syndrome, a nursing diagnosis, consists of an acute phase of disorganization, and a long-term phase of reorganization of the victim's lifestyle. Rape victims experience emotional, physical, and cognitive reactions to the trauma of rape. Nursing actions can include providing specific interventions to victims during the acute phase, identifying victims during routine exams, referring victims for ongoing counseling, conducting community education programs on primary prevention and available services, and participating in longitudinal rape studies.
Cole, Jennifer; Logan, T. K.
The purpose of this study was to examine the role of victim alcohol use and partner-perpetrator on interprofessional collaboration on Sexual Assault Response Teams (SART). Telephone surveys with 78 medical, criminal justice, and victim advocacy professionals were conducted. When asked to identify case factors that pose challenges to…
Małgorzata K. Szerla
Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.
Finkelhor, David; Ormrod, Richard K.; Turner, Heather A.; Hamby, Sherry L.
Objective: Children who experience multiple victimizations (referred to in this paper as poly-victims) need to be identified because they are at particularly high risk of additional victimization and traumatic psychological effects. This paper compares alternative ways of identifying such children using questions from the Juvenile Victimization…
Finkelhor, David; Ormrod, Richard K.; Turner, Heather A.
Objective: To assess the role of multiple victimization, or what is termed in this article "poly-victimization," in explaining trauma symptomatology. Method: In a nationally representative sample of 2,030 children ages 2-17, assessment was made of the past year's victimization experiences and recent trauma symptoms. Results: Children experiencing…
Sang, Gaoli; He, Feixiang; Zhu, Rong; Xuan, Shibin
Head pose is useful information for many face-related tasks, such as face recognition, behavior analysis, human-computer interfaces, etc. Existing head pose estimation methods usually assume that the face images have been well aligned or that sufficient and precise training data are available. In practical applications, however, these assumptions are very likely to be invalid. This paper first investigates the impact of the failure of these assumptions, i.e., misalignment of face images, uncertainty and undersampling of training data, on head pose estimation accuracy of state-of-the-art methods. A learning-based approach is then designed to enhance the robustness of head pose estimation to these factors. To cope with misalignment, instead of using hand-crafted features, it seeks suitable features by learning from a set of training data with a deep convolutional neural network (DCNN), such that the training data can be best classified into the correct head pose categories. To handle uncertainty and undersampling, it employs multivariate labeling distributions (MLDs) with dense sampling intervals to represent the head pose attributes of face images. The correlation between the features and the dense MLD representations of face images is approximated by a maximum entropy model, whose parameters are optimized on the given training data. To estimate the head pose of a face image, its MLD representation is first computed according to the model based on the features extracted from the image by the trained DCNN, and its head pose is then assumed to be the one corresponding to the peak in its MLD. Evaluation experiments on the Pointing'04, FacePix, Multi-PIE, and CASIA-PEAL databases prove the effectiveness and efficiency of the proposed method.
Amalina, I. K.; Amirudin, M.; Budiarto, M. T.
This is a qualitative research concerning on students’ creativity on problem posing task. The study aimed at describing the students’ creative thinking ability to pose the mathematics problem in structured situations with varied condition of given problems. In order to find out the students’ creative thinking ability, an analysis of mathematics problem posing test based on fluency, novelty, and flexibility and interview was applied for categorizing students’ responses on that task. The data analysis used the quality of problem posing and categorized in 4 level of creativity. The results revealed from 29 secondary students grade 8, a student in CTL (Creative Thinking Level) 1 met the fluency. A student in CTL 2 met the novelty, while a student in CTL 3 met both fluency and novelty and no one in CTL 4. These results are affected by students’ mathematical experience. The findings of this study highlight that student’s problem posing creativity are dependent on their experience in mathematics learning and from the point of view of which students start to pose problem.
Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin
The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...
Grayson, Joann, Ed.
The documented incidence of sexual abuse of boys is reported. Though prevalence rates varied from different sources, all sources agreed that reported cases reflect only a fraction of the actual prevalence. The paper also discusses characteristics of the abusers, risk factors of victims, the effects of abuse, and the coping styles of the young male…
Højbjerg, Christian K.
Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...
This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...
Schoenau-Fog, Henrik; Bruni, Luis Emilio; Khalil, Faysal Fuad
of violent interactive shooter experiences by allowing the participants to experience the feeling of being a victim of war. An evaluation of the implementation indicated that participants experienced free spatial interaction, while still being able to acquire an understanding of the theme being mediated....
Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P
at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early...
In the aftermath of the devastating tsunami that hit South East Asia last December, a huge operation to try to identify thousands of victims got underway, with the help of many overseas medical and dental professionals. British dentist Gareth Pearson went to Thailand to try and help in this task and here recounts his experience.
Hugeux, P; Barouti, H
Just as the concept of war itself, the concept of the war victim is progressive, necessitating legal, economic, social, sanitary, ethical and political adaptations. In France, the laws of 1919, effective from 2nd August 1914, brought radical reform as laws of public solidarity, which guaranteed by the nation, the support of invalids of the most savage war in history. The collective nature of this new social risk obliged the state to replace a purely financial compensation by a solution of rehabilitation. The "Office National des Mutilés et Réformés", created in March 1916, was put in charge of the organisation of professional reeducation. The "war invalids" category was being transform a logic of assistance into one of social action. Later, the legislative structure made extensions, enlarging the beneficiaries in the "war victim" category. The "Service de Santé des Armées" in its basic mission of support to the armed forces covers many areas. The "Anciens Combattants et Victimes de Guerre" administration disposes of specific instruments, such as the "Institution Nationale des Invalides", the "Centre d'Etudes et de Recherche sur l'Appareillage des Handicapés", the "Office National des Anciens Combatants". These joint actions, added to the ones of very influential autonomous associations, contribute to give handicapped war victims an honourable citizenship.
Synovitz, L B; Byrne, T J
A sexual victimization survey was used to assess the factors that would discriminate between victims and nonvictims of sexual assault. The sample consisted of 241 female college students at a large midwestern university. Victimization status was ascertained from the 13-question Sexual Experiences Survey developed by Koss and Gidycz and Koss and Oros. Data eliciting information about possible associated factors (demographics, dating history, sexual history, personality characteristics and traits) and victimization status were obtained by adapting several scales and instruments into a single Dating and Relationship Survey. Of the 241 women, 102 reported they had been victimized. Discriminant function analysis was used to develop a set of variables that significantly identified victimization status. The variables found to be related to women's being sexually victimized were (a) number of different lifetime sexual partners, (b) provocative dress, and (c) alcohol use.
Shenoy, Akhil; Appel, Jacob M
Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.
Haggerty, L A; Hawkins, J
Investigators encounter many legal and ethical issues when they conduct research on partner abuse. Balancing abused women's rights to privacy with legally mandated reporting requirements involves considerable thought and planning. Failure to protect participants may result in escalation of abuse as well as loss of children to protective services. Various perspectives on maintaining participant privacy while conforming to legal mandates to report child abuse, homicidality, and suicidality are discussed. The role of confidentiality certificates in providing legal immunity for researchers and the method of obtaining the certificates are presented. In addition, the authors describe the strategies for participant protection that are implemented in a federally funded study of abuse, women's self-care, and pregnancy outcomes. The decision to clearly and specifically inform abused women of the limits of confidentiality allows participants to make informed decisions about disclosures, but may result in diminished recruitment.
Lux, James P.; Haque, Salman
Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.
Duan, Sisi [ORNL; Zhang, Haibin [University of North Carolina, Chapel Hill
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.
Hawes, Anthony H.; Iftekharuddin, Khan M.
We propose a novel method for analyzing images that exploits the natural lines of a human poses to find areas where self-occlusion could be present. Errors caused by self-occlusion cause several modern human pose estimation methods to mis-identify body parts, which reduces the performance of most action recognition algorithms. Our method is motivated by the observation that, in several cases, occlusion can be reasoned using only boundary lines of limbs. An intelligent edge detection algorithm based on the above principle could be used to augment the silhouette with information useful for pose estimation algorithms and push forward progress on occlusion handling for human action recognition. The algorithm described is applicable to computer vision scenarios involving 2D images and (appropriated flattened) 3D images.
Lindstrom, P; Duchaineau, M
We address the problem of estimating the relative pose, i.e. translation and rotation, of two calibrated cameras from image point correspondences. Our approach is to factor the nonlinear algebraic pose error functional into translational and rotational components, and to optimize translation and rotation independently. This factorization admits subproblems that can be solved using direct methods with practical guarantees on global optimality. That is, for a given translation, the corresponding optimal rotation can directly be determined, and vice versa. We show that these subproblems are equivalent to computing the least eigenvector of second- and fourth-order symmetric tensors. When neither translation or rotation is known, alternating translation and rotation optimization leads to a simple, efficient, and robust algorithm for pose estimation that improves on the well-known 5- and 8-point methods.
Magalhães, Teresa; Ribeiro, Catarina
The approach to victims of sexual crimes is of special complexity due to the nature of this kind of crime, the impact of victimization and the specificity of judicial investigation procedures. The absence of physical evidence and the secrecy that characterizes the majority of sexual victimization cases frequently lead the victim's story to be used as one of few proof elements. Given the importance of the information supplied by the victim in the criminal inquiry, it is essential to create strategies to optimise the interview process, not only to preserve evidence, but also to prevent a secondary victimization process. This review discusses in a brief manner the extent to which information given by victims can be considered relevant forensic evidence, and then presents the methodological guidelines for interview that should be used in this type of expertise.
Golec de Zavala, Agnieszka; Lantos, Dorottya; Bowden, Deborah
Research on beneficial consequences of yoga focuses on the effects of yogic breathing and meditation. Less is known about the psychological effects of performing yoga postures. The present study investigated the effects of yoga poses on subjective sense of energy and self-esteem. The effects of yoga postures were compared to the effects of 'power poses,' which arguably increase the sense of power and self-confidence due to their association with interpersonal dominance (Carney et al., 2010). The study tested the novel prediction that yoga poses, which are not associated with interpersonal dominance but increase bodily energy, would increase the subjective feeling of energy and therefore increase self-esteem compared to 'high power' and 'low power' poses. A two factorial, between participants design was employed. Participants performed either two standing yoga poses with open front of the body (n = 19), two standing yoga poses with covered front of the body (n = 22), two expansive, high power poses (n = 21), or two constrictive, low power poses (n = 20) for 1-min each. The results showed that yoga poses in comparison to 'power poses' increased self-esteem. This effect was mediated by an increased subjective sense of energy and was observed when baseline trait self-esteem was controlled for. These results suggest that the effects of performing open, expansive body postures may be driven by processes other than the poses' association with interpersonal power and dominance. This study demonstrates that positive effects of yoga practice can occur after performing yoga poses for only 2 min.
Straughan, Brian; Ames, William F
Written by two international experts in the field, this book is the first unified survey of the advances made in the last 15 years on key non-standard and improperly posed problems for partial differential equations.This reference for mathematicians, scientists, and engineers provides an overview of the methodology typically used to study improperly posed problems. It focuses on structural stability--the continuous dependence of solutions on the initial conditions and the modeling equations--and on problems for which data are only prescribed on part of the boundary.The book addresses continuou
Graham, Eleanor A M
In the event of any mass fatality incident, despite the cause, disaster victim identification must be undertaken; the humanitarian and legal responsibility for this falls on the forensic community. Mass fatality incidents can be natural (e.g., tsunamis, earthquakes, hurricanes), accidental (e.g., building collapse, ship sinking) or can occur as a result of a terrorist attack. Terrorism alone has been responsible for thousands of deaths in recent years and can be encountered in many forms (e.g., suicide bombings, airplane hijackings). In mass fatality situations, the experitise of many specialities are called on to assist in the identification efforts and to allow for the speedy return of recovered human remains to the relatives of the deceased. Today, DNA plays a vital but never solitary role in disaster victim identification.
Kaitlyn N. Ryan; Tracey Curwen
Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrenc...
Full Text Available We discuss the operator transforming the argument of a function in the L2-setting. Here this operator is unbounded and closed. For the approximate solution of ill-posed equations with closed operators, we present a new view on the Tikhonov regularization.
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.
CRAC is an IT-architecture-based method for assessing and comparing confidentiality risks of distributed IT systems. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets), and the paths that may be followed by different attackers (e.g. insider and outsider). We evaluate its effectiveness by applying it to a real-world outsourcing case.
Cervantes, Gabriela,; Fenz, Stefan
Part 5: Metrics and Risk Assessment; International audience; Confidentiality is an important property that organizations relying on information technology have to preserve. The purpose of this work is to provide a structured approach for identifying confidentiality requirements. A key step in the information security risk management process is the determination of the impact level arisen from a loss of confidentiality, integrity or availability. We deal here with impact level determination re...
Harber, Kent D; Podolski, Peter; Williams, Christian H
Victim blaming occurs when people are unfairly held responsible for their misfortunes. According to just world theory, witnessing another's victimization threatens just world beliefs, which arouses distress. Victim blaming redeems just world beliefs, thereby reducing distress. However, negative emotions can also be resolved through emotional disclosure, suggesting that disclosure can prevent victim blaming. Two experiments confirmed this prediction. In Study 1 participants viewed a woman being victimized or a woman in a nonvictimizing conflict. Participants then disclosed or suppressed the emotions aroused by these scenes and 1 week later evaluated the woman they had viewed. Disclosure reduced blaming of the victim but did not affect blaming of the nonvictim. Further, the more distress participants disclosed, the less they blamed the victim. Study 2 replicated the primary results of Study 1 and also showed that (a) disclosure exclusively reduces blaming of victims; it does not moderate judgments of victimizers, and (b) the effects of disclosure on blaming applies across genders. These 2 studies confirm that victim blaming is a form of emotion management (per just world theory), and that emotional disclosure prevents blaming by supplying an alternative mode of emotion management. This research also suggests that emotional disclosure moderates social perception, in general. (c) 2015 APA, all rights reserved).
Lee, Won Oh; Lee, Eui Chul; Park, Kang Ryoung
Applications based on eye-blink detection have increased, as a result of which it is essential for eye-blink detection to be robust and non-intrusive irrespective of the changes in the user's facial pose. However, most previous studies on camera-based blink detection have the disadvantage that their performances were affected by the facial pose. They also focused on blink detection using only frontal facial images. To overcome these disadvantages, we developed a new method for blink detection, which maintains its accuracy despite changes in the facial pose of the subject. This research is novel in the following four ways. First, the face and eye regions are detected by using both the AdaBoost face detector and a Lucas-Kanade-Tomasi (LKT)-based method, in order to achieve robustness to facial pose. Secondly, the determination of the state of the eye (being open or closed), needed for blink detection, is based on two features: the ratio of height to width of the eye region in a still image, and the cumulative difference of the number of black pixels of the eye region using an adaptive threshold in successive images. These two features are robustly extracted irrespective of the lighting variations by using illumination normalization. Thirdly, the accuracy of determining the eye state - open or closed - is increased by combining the above two features on the basis of the support vector machine (SVM). Finally, the SVM classifier for determining the eye state is adaptively selected according to the facial rotation. Experimental results using various databases showed that the blink detection by the proposed method is robust to various facial poses. Copyright © 2010 Elsevier B.V. All rights reserved.
Kaare M Nielsen
Unfortunately, lack of stringent standards, international harmonization, and transparency, as well as remaining claims of confidentiality on biosafety-relevant data generate consumer distrust, hinder...
Hatun, Kardelen; Duygulu, Pinar
We propose a method for recognizing human actions in videos. Inspired from the recent bag-of-words approaches, we represent actions as documents consisting of words, where a word refers to the pose in a frame. Histogram of oriented gradients (HOG) features are used to describe poses, which are then
The legacy of German medical research in the era of National Socialism remains contentious, as regards identification of victims, and the appropriate handling of scientific specimens. These questions are acutely posed by the scientific slides, brain sections, and other body parts of victims, who were killed for research. These slides continued to be held by Austrian and German scientific institutes in the second half of the twentieth century. That scientists continued research on these slides between 1945 and the late1980s suggests a disassociation of guilt and responsibility for the deaths of the victims by the German scientific community. PMID:24779110
Silber, Steven; Cai, Jinfa
This exploratory study examined how pre-service teachers (PSTs) pose mathematical problems for free and structured mathematical problem-posing conditions. It was hypothesized that PSTs would pose more complex mathematical problems under structured posing conditions, with increasing levels of complexity, than PSTs would pose under free posing…
de Boer, Hans H; Kloosterman, Ate D; de Bruijn, Arie G; Maat, George J R
Identifying the victims of a disaster is important for the next of kin, to issue a death certificate and, if necessary, for forensic investigations. In the Netherlands victims are identified by the Dutch disaster victim identification team, which is part of the national forensic investigation team ('Landelijk Team Forensische Opsporing'). Ante-mortem data are collected during the identification process; these include the victim's specific medical characteristics and the DNA profile of the victim and their family members. The victim's own doctor can play an important role in the ante-mortem investigation because of his or her knowledge of their personal medical details, and of the possible availability of samples for establishing a DNA profile. The ante-mortem data are then compared with post-mortem data. For a definitive identification at least 1 primary identification characteristic has to be established from the physical remains - dermatoglyphics, the DNA profile or the dental status.
Papalia, Nina L; Luebbers, Stefan; Ogloff, James R P; Cutajar, Margaret; Mullen, Paul E; Mann, Emily
The association between child sexual abuse (CSA) and risk for re-victimization is well-documented; however, less is known about the temporal progression of re-victimization experiences over the early life-course among CSA survivors, and whether this differs from that of those without known sexual abuse histories. This study investigated whether there are distinct temporal pathways of interpersonal re-victimization between the ages of 10-25 years among medically confirmed CSA cases, and considered whether abuse variables, re-victimization variables, and the presence of other adverse outcomes, were associated with heterogeneity in re-victimization pathways. The data were collected as part of a large-scale data-linkage study in which the medical records of 2759 cases of contact-CSA between 1964 and 1995 were linked, between 13 and 44 years following abuse, to police and public psychiatric databases; cases were compared to a matched community sample (n=2677). Using a subsample of 510 (401 victims; 109 comparisons) individuals with an interpersonal (re)victimization history, we examined the aggregate 'age-(re)victimization' curves for CSA victims and comparisons, respectively. Further, we applied longitudinal latent class analysis to explore heterogeneity in re-victimization trajectories among abuse survivors across their early life-course. Four latent pathways were identified, labeled: Normative; Childhood-Limited; Emerging-Adulthood; and Chronic re-victimization trajectories. Older age at abuse, a criminal history, and mental health problems were uniquely predictive of membership to the more problematic and persistent re-victimization trajectories. Findings indicate that individuals exposed to CSA during adolescence may be particularly vulnerable to poorer re-victimization trajectories, characterized by multiple risk indices, and thus may warrant increased service provision. Copyright © 2017 Elsevier Ltd. All rights reserved.
The rise of the electronic record now allows nurses to access a large archive of patient information that was more difficult to obtain when records consisted of manually held paper files. There have been several instances where curiosity and, occasionally, more malicious motivations have led nurses to access these records and read the notes of a celebrity or a person they know. In this article, Richard Griffith considers whether nurses' accessing and reading of the record of someone who is not in their care is in breach of their duty of confidentiality.
... Confidentiality Determinations Under the Greenhouse Gas Reporting Program AGENCY: Environmental Protection Agency... Recordkeeping Requirements, and Proposed Confidentiality Determinations under the Greenhouse Gas Reporting... Requirements, and Proposed Confidentiality Determinations under the Greenhouse Gas Reporting Program,'' which...
... Recordkeeping Requirements, and Proposed Confidentiality Determinations Under the Greenhouse Gas Reporting... and Recordkeeping Requirements, and Proposed Confidentiality Determinations Under the Greenhouse Gas... the Greenhouse Gas Reporting Program. In addition, the EPA is proposing confidentiality determinations...
... COMMISSION Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and Indemnification... interpretative statement (``Statement'') to provide guidance regarding the applicability of the confidentiality... regulatory authority described in section 21(c)(7) shall agree in writing to abide by the confidentiality...
Ben Belgacem, F.; Kaber, S.-M.
Ill-posed quadratic optimization frequently occurs in control and inverse problems and is not covered by the Lax-Milgram-Riesz theory. Typically, small changes in the input data can produce very large oscillations on the output. We investigate the conditions under which the minimum value of the cost function is finite and we explore the 'hidden connection' between the optimization problem and the least-squares method. Eventually, we address some examples coming from optimal control and data completion, showing how relevant our contribution is in the knowledge of what happens for various ill-posed problems. The results we state bring a substantial improvement to the analysis of the regularization methods applied to the ill-posed quadratic optimization problems. Indeed, for the cost quadratic functions bounded from below the Lavrentiev method is just the Tikhonov regularization for the 'hidden least-squares' problem. As a straightforward result, Lavrentiev's regularization exhibits better regularization and convergence results than expected at first glance.
After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea).
Echeverría B, Carlos; Goic G, Alejandro; Herrera C, Carolina; Quintana V, Carlos; Rojas O, Alberto; Ruiz-Esquide, Gonzalo; Salinas R, Rodrigo; Serani M, Alejandro; Taboada R, Paulina; Vacarezza Y, Ricardo
Social, technical and legal conditions of the current practice of medicine make it necessary to insist on certain actions and circumstances that may jeopardize the confidentiality of information, offered by patients to their health providers. Therefore, some effects of the current Chilean law are analyzed in this respect, regarding access to data from the clinical record of a patient. Also, the risks of putting certain data on social networking sites are analyzed, as well as some of its effects on clinical practice. The reasons because of mandatory reporting of diseases, meaning danger to public health, is allowed, are mentioned. We also discuss the difficulties involved in managing the results of preventative health screenings and its knowledge by third parties, as well as some possible violations of personal privacy, regarding dissemination of some people health information and its further mention or figuration in mass media. We conclude that it is a must for both physicians and other health team members, to safeguard confidentiality of data to which they have had access, as well as the need to know the relevant law, in order to respect human dignity of patients, each one as a person. We address the attention to the possibility that, practicing in a different way, it could endanger the reliability of clinical records, also impairing the quality of people's health care.
For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN. The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...
Human Resources Department
The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose. From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...
Human Resources Department
The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called Â« Confidential Declaration of Family SituationÂ Â» (CDFS) was used for that purpose.Â From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...
Koulouris, John; Koulouris, A.
In Some kind of networks like PON (Passive Optical Networks) and HFC (Hybrid Fiber Coaxial) networks, the information from the central station (headend) to the terminals is broadcast to all of them. So each one of them besides its own data gets also the data destined for the others. Under these conditions privacy and confidentiality do not exist. The usual way to overcome this drawback is conventional encryption of the data between headend and terminals. This method besides making the communication procedure more complex, has also the drawback that traffic data cannot be protected, since the destination field of each cell cannot be encrypted. Here another method is presented which, although not encryption in the conventional meaning of the term, secures a high degree of individuality and confidentiality. The basic idea is to use different multiplexing patterns for each connection so that each terminal can demultiplex only its own data. The method is suited for the high data speed of the PON networks and maybe preferable to conventional encryption.
... Section 300.220 Wildlife and Fisheries INTERNATIONAL FISHING AND RELATED ACTIVITIES INTERNATIONAL... having access to confidential information may be subject to criminal and civil penalties for unauthorized... section is intended to confer any right, claim, or entitlement to obtain access to confidential...
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of information. 65.53 Section 65.53 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) EMERGENCY FEDERAL LAW ENFORCEMENT ASSISTANCE Additional Requirements § 65.53 Confidentiality of information. Section 812 of title I of the...
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of information. 549.14 Section 549.14 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL MANAGEMENT MEDICAL SERVICES Infectious Disease Management § 549.14 Confidentiality of information. Any disclosure of...
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Confidentiality of statements. 905.735-505 Section 905.735-505 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Confidentiality of statements. The Ethics Counselor shall hold in confidence each statement of employment and...
... 34 Education 1 2010-07-01 2010-07-01 false Central records; confidentiality. 6.4 Section 6.4 Education Office of the Secretary, Department of Education INVENTIONS AND PATENTS (GENERAL) § 6.4 Central records; confidentiality. Central files and records shall be maintained of all inventions, patents, and...
... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Confidentiality of social data. 1.520 Section 1.520 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Confidentiality of social data. Persons having access to social data will be conscious of the fact that the family...
... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Confidentiality of statements. 706.410 Section 706.410 Conservation of Power and Water Resources WATER RESOURCES COUNCIL... Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES RULES RELATING TO INVESTIGATIONS § 1b.9 Confidentiality of investigations...
Trice-Black, Shannon; Riechel, Morgan E. Kiper; Shillingford, M. Ann
Confidentiality in counseling relationships helps ensure trust between clients and counselors. Yet, defining and understanding the boundaries of confidentiality in school settings is often difficult, as school counselors are engaged in multiple relationships with various stakeholders. This qualitative phenomenological study explores the…
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Confidentiality of information. 401.312 Section 401.312 Housing and Urban Development Regulations Relating to Housing and Urban... (PRA) § 401.312 Confidentiality of information. A PAE and every other restricted person (as defined in...
... 40 Protection of Environment 22 2010-07-01 2010-07-01 false Confidentiality of information. 147.2907 Section 147.2907 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... Mineral Reserve-Class II Wells § 147.2907 Confidentiality of information. (a) The following information...
... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Confidentiality of information. 122.7 Section 122.7 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS EPA... form or instructions or, in the case of other submissions, by stamping the words “confidential business...
Sankar, Pamela; Mora, Susan; Merz, Jon F; Jones, Nora L
To lay the groundwork for a better understanding of patient views on medical confidentiality. Studies were found by searching medline, bioethicsline, and selected bibliographies. Articles concerning physician perspectives or implications of legal and administrative regulations were excluded. Only peer-reviewed journal articles reporting original research on patients' confidentiality views and conduct were included. Many patients are unaware of or misunderstand their legal or ethical right to medical confidentiality protections, which leads them to both over- and underestimate confidentiality protections. The possibility that medical information might be revealed, intentionally or not, to acquaintances in a clinic or other social community troubles patients as much as information release to insurers or employers. A significant minority of patients distrust confidentiality protections, leading some to report that they delay or forgo medical care. If doubtful that confidentiality will be upheld, patients will act independently to protect information. Our review found a wider variety of understandings and beliefs about medical confidentiality among patients than are often indicated in the writings of practitioners or legal experts. As medical confidentiality regulations evolve, these differences need to be recognized and accounted for in interactions between practitioners and patients.
... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Confidentiality of cave... AGRICULTURE CAVE RESOURCES MANAGEMENT § 290.4 Confidentiality of cave location information. (a) Information... location of a significant cave or a cave nominated for designation, unless the authorized officer...
... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Confidentiality of cave location information. 37.12 Section 37.12 Public Lands: Interior Office of the Secretary of the Interior CAVE MANAGEMENT Cave Designation § 37.12 Confidentiality of cave location information. (a) Information disclosure...
... Provisions for Section 8(a) Information-Gathering Rules § 704.7 Confidential business information claims. (a) Any person submitting a notice under this rule may assert a business confidentiality claim covering... bodies) by use of legitimate means (other than discovery based on a showing of special need in a judicial...
Nunnelly, Diane T.
School psychologists and other educators should be concerned about the issues of confidentiality, privacy and privileged communication in regard to school records such as psychological reports and intelligence test scores. Confidentiality relates to matters of professional ethics, privileged communication refers to legal rights, and privacy is a…
... confidentiality of information, including the security of systems, and records requirements described in 20 CFR... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Confidentiality of information and records..., SURVIVORS AND DISABILITY INSURANCE (1950- ) Determinations of Disability Administrative Responsibilities and...
... confidentiality of information, including the security of systems, and records requirements described in 20 CFR... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Confidentiality of information and records... INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability Administrative Responsibilities and...
... comply with the provisions for confidentiality of information, including the security of systems, and... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Confidentiality of information and records..., SURVIVORS AND DISABILITY INSURANCE (1950- ) Payments for Vocational Rehabilitation Services Administrative...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1210.532... WATERMELON RESEARCH AND PROMOTION PLAN Rules and Regulations Records § 1210.532 Confidential books, records, and reports. All information obtained from the books, records, and reports of handlers and importers...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports of...
... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted to...
Nov 1, 2010 ... Challenges to maintaining confidentiality often arise because of competing moral claims of the patient, his/her family members and doctors. ... to make decisions on behalf of patients who cannot make such decisions for .... to confidentiality and that the nurse-patient relationship is based on trust between ...
Fisher, Mary Alice
All psychologists must uphold the same ethical standards about confidentiality even though each state imposes different legal limits on their ability to protect clients' confidences. The resulting ethical-legal confusion is exacerbated by legally based confidentiality training that treats legal exceptions as if they were the rule and fosters the…
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality of parole records. 2.88 Section 2.88 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS District of Columbia Code: Prisoners and Parolees § 2.88 Confidentiality of parole record...
Tavaokkoli, Saeid Nazari; Nejadsarvari, Nasrin; Ebrahimi, Ali
Confidentiality is one of the old rules of the medical profession. While emphasizing the necessity of confidentiality in religious teachings, disclosure of other's secrets to commit sin deserves punishment hereafter known. Today, progress in medical science and invention of new diagnostic and therapeutic procedures, as well as the extent of information and disclosure of the secrets of the patients, have provided more than ever. After explaining the concepts and principles of confidentiality in medical ethics, the Islamic-oriented Virtue Ethics, in a comparative review, share the differences in these two sets of ethical review and explain the issue of confidentiality. In professional medical ethics, only the behaviors of health staff are evaluated and moral evaluation of the features cannot be evaluated, but in Islamic ethics, the moral evaluation of the features that are sensual, confidentiality is more stable, without any external supervision will maintain its efficiency.
This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…
Dorte Marie Søndergaard
Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.
Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.
Fabel, Stephan; Baek, Kyungim; Berkelman, Peter
The Compact Lightweight Surgery Robot from the University of Hawaii includes two teleoperated instruments and one endoscope manipulator which act in accord to perform assisted interventional medicine. The relative positions and orientations of the robotic instruments and endoscope must be known to the teleoperation system so that the directions of the instrument motions can be controlled to correspond closely to the directions of the motions of the master manipulators, as seen by the the endoscope and displayed to the surgeon. If the manipulator bases are mounted in known locations and all manipulator joint variables are known, then the necessary coordinate transformations between the master and slave manipulators can be easily computed. The versatility and ease of use of the system can be increased, however, by allowing the endoscope or instrument manipulator bases to be moved to arbitrary positions and orientations without reinitializing each manipulator or remeasuring their relative positions. The aim of this work is to find the pose of the instrument end effectors using the video image from the endoscope camera. The P3P pose estimation algorithm is used with a Levenberg-Marquardt optimization to ensure convergence. The correct transformations between the master and slave coordinate frames can then be calculated and updated when the bases of the endoscope or instrument manipulators are moved to new, unknown, positions at any time before or during surgical procedures.
Hansen, Helle Rabøl
Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... on bullying, and 2. teacher strategies in relation to bullying practices among children. The paper analyses the relationship between policy documents and their implied discourses on the one hand and the discourses and understandings taken up by teaches in their everyday interaction with children...... and colleagues on the other hand. The paper is based on empirical data including surveys among 253 teachers from 10 schools, interview with 12 teachers, and observations among teachers in their respectively class and staff rooms. In the analyses punishment and sanctions appear to work as general strategies...
Schoenau-Fog, Henrik; Bruni, Luis Emilio; Khalil, Faysal Fuad
in the “First Person Victim” experience to create awareness about the consequences of war for civilians. The paper will also explain how our “Interactive Dramatic Experience Model” organizes the various events of the experience and mediates an emergent narrative by the use of the first person shooter form......Scientific and psychological studies claim a variety of triggers in video games with violent content may promote aggression. To oppose the violent behavior of players in these games, this paper will describe how the sources of aggression and first person shooter conventions have been exploited....... The theme is communicated through the use of tragedy, and turns the roles around to let the participants encounter a realistic war-scenario while being confronted with ethical issues, by enacting the experience of being a victim of war. An evaluation of the implemented experience indicated...
Brittain, Anna W.; Williams, Jessica R.; Zapata, Lauren B.; Moskosky, Susan B.; Weik, Tasmeen S.
Context Family planning services are essential for reducing high rates of unintended pregnancies among young people, yet a perception that providers will not preserve confidentiality may deter youth from accessing these services. This systematic review, conducted in 2011, summarizes the evidence on the effect of assuring confidentiality in family planning services to young people on reproductive health outcomes. The review was used to inform national recommendations on providing quality family planning services. Evidence acquisition Multiple databases were searched to identify articles addressing confidentiality in family planning services to youth aged 10–24 years. Included studies were published from January 1985 through February 2011. Studies conducted outside the U.S., Canada, Europe, Australia, or New Zealand, and those that focused exclusively on HIV or sexually transmitted diseases, were excluded. Evidence synthesis The search strategy identified 19,332 articles, nine of which met the inclusion criteria. Four studies examined outcomes. Examined outcomes included use of clinical services and intention to use services. Of the four outcome studies, three found a positive association between assurance of confidentiality and at least one outcome of interest. Five studies provided information on youth perspectives and underscored the idea that young people greatly value confidentiality when receiving family planning services. Conclusions This review demonstrates that there is limited research examining whether confidentiality in family planning services to young people affects reproductive health outcomes. A robust research agenda is needed, given the importance young people place on confidentiality. PMID:26190851
Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.
... Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting. (a) The confidential financial reporting system set forth in this subpart is designed to complement... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Policies of confidential financial...
Walle Vande Ilse
Full Text Available All too often, the victimization of children is automatically associated with child abuse and sexual abuse. However, children are also confronted, either directly or indirectly, with other kinds of criminality. In spite of that children usually do not get appropriate support and assistance. In this paper, the establishment and development of services for the support of children-victims of crime in Belgium, as well as European cooperation in this regard, are described.
Williams, Garrath; Pigeot, Iris
Many attempts have been made to formalize ethical requirements for research. Among the most prominent mechanisms are informed consent requirements and data protection regimes. These mechanisms, however, sometimes appear as obstacles to research. In this opinion paper, we critically discuss conventional approaches to research ethics that emphasize consent and data protection. Several recent debates have highlighted other important ethical issues and underlined the need for greater openness in order to uphold the integrity of health-related research. Some of these measures, such as the sharing of individual-level data, pose problems for standard understandings of consent and privacy. Here, we argue that these interpretations tend to be overdemanding: They do not really protect research subjects and they hinder the research process. Accordingly, we suggest another way of framing these requirements. Individual consent must be situated alongside the wider distribution of knowledge created when the actions, commitments, and procedures of researchers and their institutions are opened to scrutiny. And instead of simply emphasizing privacy or data protection, we should understand confidentiality as a principle that facilitates the sharing of information while upholding important safeguards. Consent and confidentiality belong to a broader set of safeguards and procedures to uphold the integrity of the research process. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Sainio, Miia; Veenstra, Rene; Huitsing, Gijs; Salmivalli, Christina
This study focused on the dyadic defending relationships of victimized children in grades 3, 4, and 5 (N = 7481 children from 356 school classes, mean ages 10-12 years). Most of the victims (72.3%) had at least one defender. Being defended was positively related to victims' adjustment and social status. Analyses on victim-defender dyads showed…
Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.
Will, R; Hintz, E; Blättner, B
Life time prevalence of stalking is about 12-20%, while females are more often affected than male. Stalking is a statutory offense. However, it is not an assault of victims' law. For the purpose of health consequences for stalking victims, research in following database were conducted: EMBASE, CINAHL, MEDLINE, PsycINFO and Social Science Index. English and German published studies of the years 2002-2010 were included. 17 primary studies and 2 meta-analyses were identified. Direct physiological consequences are relatively rare; however stalking victims report a poorer physiological health status. Almost every second stalking victim shows impairments on his/her psychical well-being. Impairments of social well-being are common, too. As a result, there is still a lot of research, especially in long-term studies, required. Socio-legal reassessment of stalking will probably benefit only a few of the affected people. © Georg Thieme Verlag KG Stuttgart · New York.
Dulchin, J; Segal, A J
Traditionally, psychoanalytic training institutes have used the knowledge which faculty gained in the psychoanalyses of their student patients to evaluate the progress of those students. The training institute that we shall call Eastern Institute regarded such a practice as unacceptable, and organized its program with the intention that analysis would exercise no power over their student patients' careers. The institute's commitment to the confidentiality of psychoanalytic relationships led to an ambiguous definition of confidentiality. This ambiguity meant that some faculty members violated the confidentiality of the analytic relationship even though they believed thye were sustaining it. This paper examines the ways in which confidential information was managed, the conditions under which it was compromised, and the significance of this paradoxical situation in the life of the Institute and in the wider psychoanalytic world.
Brands, W G; van der Ven, J M; Eijkman, M A J
The right to confidentiality and privacy is established in various laws and in many cases the violation of these laws provokes a reaction in the form of severe sanctions. Nevertheless, patients complain relatively seldom about violations ofprivacy laws by dentists. The right to privacy consists of a requirement of confidentiality on the part of those carrying out treatment and the patients' right to be treated without being observed by third parties. 'Third parties' do not include those involved in the treatment or someone who represents the patient. The right to confidentiality can be violated if a patient grants consent, in cases of a legal requirement or in cases ofa conflict of requirements. A separate regulation exists concerning the confidentiality and privacy of patients in the context of scientific research.
Konstantinović-Vilić, Slobodanka; Žunić, Natalija
Mass media seem to be playing the central role in our everyday life and the media impact is so overpowering nowadays that we live in a mediasaturated culture. Not only are mass media an inseparable part of our contemporary life but they also significantly define and shape our daily existence. In order to explain the cultural impact that the media coverage of crime and victimization has in our society, it is necessary to understand the relationship between crime, victimization and mass media. ...
Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves rela...
Ohene, Sally-Ann; Johnson, Kiana; Atunah-Jay, Sarah; Owusu, Andrew; Borowsky, Iris Wagman
Violence in all forms poses a concern because of associations with multiple adverse effects including injuries and mental health problems. There is however limited data on violence in general and youth violence in particular in Ghana. To explore the nature and scope of youth violence in Ghana, we used the nationwide Global School-based Health Survey, conducted among senior high school students in Ghana, to explore risk and protective factors at the individual, family, and environmental levels associated with sexual and physical violence victimization. A fifth of these students reported being forced to have sex in their lifetime while two out of five had been a victim of a physical attack in the year preceding the survey. In final multivariate analysis, for sexual violence victimization, history of sexual activity with or without condom use at last sex, feeling sad or hopeless, and being a victim of bullying and electronic bullying were identified as risk factors, while having friends who were not sexually active was protective. Independent risk factors for physical violence victimization were attempting suicide in the last year, alcohol use in the past month, and bullying other students in the past month. Parent respect for privacy just reached significance as a protective factor for physical violence victimization in the final model. Recognition of the magnitude of violence victimization among Ghanaian students and associated factors must be used to guide development and implementation of appropriate concrete measures to prevent and address the problem.
Gao, Han; Nielson, Hanne Riis
Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....
Earley, C L; Strong, L. C.
Protecting the confidentiality of genetic research data is an important aspect of genetic research that has been discussed in various forums. Research data must be protected to prevent discrimination and its use in litigation. The certificate of confidentiality was created to protect the subjects of alcohol- and drug-abuse studies, who may be engaging in illegal activities. As revised in 1988, the certificate protects investigators engaging in other kinds of studies from being compelled to re...
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor
Gollwitzer, Mario; Süssenbach, Philipp; Hannuschke, Marianne
People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, "victim sensitivity" predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively-especially in socially uncertain situations. This pattern can be explained with the sensitivity to mean intentions (SeMI) model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model's prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span ("ontogenetic stabilization") and across social situations ("actual-genetic stabilization"). Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a) how certain contextual cues (e.g., facial expressions) become conditioned stimuli that elicit equally strong responses, (b) why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c) how these cues shape spontaneous social expectations (regarding other people's intentions). Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.
Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.
Fihl, Preben; Cosar, Serhan
Automatic estimation of the human pose enables many interesting applications and has therefore achieved much attention in recent years. One of the most successful approaches for estimating unconstrained poses has been the pictorial structures framework. However, occlusions between interacting...
Full Text Available The emergence of novel health record devices has opened a new avenue for medical sciences. Portable electronic health record devices are of recently-introduced inventions that would definitely contribute to the facilitation of providing health care for the trauma patients in low-resource settings (1. In addition to the benefits these new tools would provide for the patients, hospital workflow will not be hindered by the burden of providing primary physiological data required for the medical management. However, recently it has been argued that health record data should be considered confidential and rules or guidelines implemented in order to mitigate ethical concerns (2. Undoubtedly, implementation of effective regulations in this regard stands quite necessary. However, these regulations should exempt some fields from obtaining consent from the individuals, especially in the field of critical care medicine. For instance in the intrahospital, perioperative and emergency settings, the physiological data are used quite often to save lives of the patients; yet, no consents are obtained from the patients in this regard. Implementation of such guidelines, though seemingly necessary, should not impede the utilization of physiological or medical health data, especially in the emergency conditions where any delay in the process of data utilization could risk the lives of the individuals.
Full Text Available The ability to recognise face images under random pose is a task that is done effortlessly by human beings. However, for a computer system, recognising face images under varying poses still remains an open research area. Face recognition across pose...
Gong, Wenjuan; Gonzàlez, Jordi; Roca, Francesc Xavier
We present a novel method for human action recognition (HAR) based on estimated poses from image sequences. We use 3D human pose data as additional information and propose a compact human pose representation, called a weak pose, in a low-dimensional space while still keeping the most discriminative information for a given pose. With predicted poses from image features, we map the problem from image feature space to pose space, where a Bag of Poses (BOP) model is learned for the final goal of HAR. The BOP model is a modified version of the classical bag of words pipeline by building the vocabulary based on the most representative weak poses for a given action. Compared with the standard k-means clustering, our vocabulary selection criteria is proven to be more efficient and robust against the inherent challenges of action recognition. Moreover, since for action recognition the ordering of the poses is discriminative, the BOP model incorporates temporal information: in essence, groups of consecutive poses are considered together when computing the vocabulary and assignment. We tested our method on two well-known datasets: HumanEva and IXMAS, to demonstrate that weak poses aid to improve action recognition accuracies. The proposed method is scene-independent and is comparable with the state-of-art method.
Coughlan, B; Powell, D; Higgins, M F
Amongst the lay and media population there is a perception that pregnancy, labour and delivery is always physiological, morbidity and mortality should be "never events" and that error is the only cause of adverse events. Those working in maternity care know that it is an imperfect art, where adverse outcomes and errors will occur. When errors do occur, there is a domino effect with three groups being involved - the patient (first victim), the staff (second victims) and the organization (third victims). If the perceived expectation of patients on all clinicians is that of perfection, then clinicians may suffer the consequences of adverse outcomes in isolation and silence. More recently identification and discussion on the phenomenon of the second victim has become a popular research topic. This review aimed to study not only the phenomenon of second victim in general medical care but to also concentrate on maternity care where the expectation of perfection may be argued to be greater. Risk factors, prevalence and effect of second victims were identified from a thorough search of the literature on the topic. The review focuses on the recent research of the effect on maternity staff of adverse outcomes and discusses topical issues of resilience, disclosure, support systems as well as Learning from Excellence. It is now well documented that when staff members are supported in their disclosure of errors this domino effect is less traumatic. It is the responsibility of everyone working in healthcare to support all the victims of an error, as an ethical duty and to have a supportive culture of disclosure. In addition, balance can be provided by developing a culture of learning from excellence as well as from errors. Copyright © 2017 Elsevier B.V. All rights reserved.
Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.
.... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...
James, Jenny; Cameron, Sonya; Usherwood, Tim
The medical ethic of confidentiality is usually taught from a western ethical perspective based on the Hippocratic oath. This study at an urban Aboriginal medical service aimed to explore how confidentiality is understood in a community controlled Aboriginal health service, with a view to informing the training of general practitioners. Twenty-three people, comprising staff, patients and general practice registrars, were interviewed about confidentiality between July 2007 and February 2008. Six themes were identified: overlapping contexts of confidentiality, key sensitivities, sharing of patient information, importance of consent, multiple roles, and consequences of maintaining or breaching confidentiality. Perspectives on confidentiality in this community included issues of social justice, the importance of public demonstrations of confidentiality, and the challenge of protecting all relationships when staff have multiple roles. Incorporation of community perspectives into the teaching of confidentiality may help doctors to understand the responsibilities of practising confidentiality in certain communities.
Walker, L E; Browne, A
Recent data demonstrate that, although gender has an impact upon the experience of being a victim of an intimate's violence, there is no particular personality pattern that leads one to become a victim. Rather, women--who are socialized to adapt and submit, and who are likely to become victims of men's sexual violence or physical abuse--may not develop adequate self-protection skills as children, especially if they come from childhood homes in which females are victimized, leading to a later vulnerability to physical and sexual abuse. Men, however, socialized to express anger and aggression in an outward manner, learn to model the abuse witnessed or experienced in childhood and often learn that women are the "appropriate" recipients of this violence. Social learning theories of modeling and aggression are used to explain how such personality patterns develop, and the theory of learned helplessness is used to explain battered women's coping responses to their partners' abusive behavior. The extreme situation, in which a battered woman kills her partner in self-defense, is analyzed in order to understand women victims' sense of desperation and entrapment in severely abusive relationships and the extent to which their behaviors are in reaction to the abuse perpetrated by the mate.
Meloy, J Reid; Boyd, Cynthia
Demographic, clinical, and forensic data were gathered in an archival study of 82 female stalkers from the United States, Canada, and Australia. Female stalkers were predominantly single, heterosexual, educated individuals in their mid 30s who had pursued their victims for more than a year. Major mental disorder and personality disorder were suggested, especially borderline personality disorder. They usually threatened violence, and if they did threaten, were more likely to be violent. Frequency of interpersonal violence was 25 percent, but there was limited use of weapons, and injuries were minor. Stalking victims were most likely to be slightly older male acquaintances; but if the victim was a prior sexual intimate of the female stalker, her risk of being violent toward him exceeded 50 percent. Unlike male stalkers who often pursue their victims to restore intimacy, these female stalkers often pursued their victims to establish intimacy. Common emotions and motivations included anger, obsessional thoughts, rage at abandonment, loneliness, dependency, jealousy, and perceived betrayal. Results are interpreted from a clinical and risk management perspective.
Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839
Theories of victimization developed independently of theories of offending, in spite of consistent findings of similarities between offenders and victims of crime. This study examines whether Gottfredson and Hirschi's (1990) general theory of crime, typically used to predict offending, also has relevance in understanding juvenile victimization. The data for this project are drawn from a sample of over 1,200 middle and high school students. Using structural equation models, the findings suggest that higher self-control does directly decrease victimization and that self-control also affects victimization indirectly though opportunities (peer deviance). Implications for the studies of victimization as well as the general theory of crime are discussed.
Kelsay, James D; Tillyer, Marie Skubak; Tillyer, Rob; Ward, Jeffrey T
This study explores the nature and outcome of violent incidents experienced by child, adolescent, adult, and elderly victims. Data from the National Incident-Based Reporting System (NIBRS) are used to determine whether there are differences in the situational characteristics-including location, time of day, weapons, and the victim-offender relationship-of violent victimization experiences across the 4 age groups, including whether situational characteristics influence the likelihood of victim injury. Results indicate that victim injury is most prevalent among adult victims and that the situational characteristics of violent incidents vary by victim age, as do the correlates of victim injury. These findings suggest that of the nature of violent victimization should be examined within the context of victim age, and supports research by scholars who have proposed a model of developmental victimology to identify age-specific victimization patterns.
Fabian, Benjamin; Zarnekow, Rüdiger
Summary Background Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. Objectives This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals’ willingness to accept the infrastructure for inter-organizational sharing of medical data. Methods We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Results Our results indicate the importance of confidentiality assurance in individuals’ acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals’ acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions. PMID:27781238
The reasons why boys who are victims of incest remain silent are explored in terms of the special meaning of victimization to males. Males' inability to express helplessness and vulnerability is identified as a major contributing factor. (CM)
Rennung, Miriam; Blum, Johannes; Göritz, Anja S
Power posing, the adoption of open and powerful postures, has effects that parallel those of actual social power. This study explored the social evaluation of adopting powerful vs. powerless body postures in men and women regarding perceived warmth, competence, and the likelihood of eliciting admiration, envy, pity, and contempt. Previous findings suggest that the display of power by women may have side effects due to gender stereotyping, namely reduced warmth ratings and negative emotional reactions. An experiment (N = 2,473) asked participants to rate pictures of men and women who adopted high-power or low-power body postures. High-power posers were rated higher on competence, admiration, envy, and contempt compared to low-power posers, whereas the opposite was true for pity. There was no impact of power posing on perceived warmth. Contrary to expectations, the poser's gender did not moderate any of the effects. These findings suggest that non-verbal displays of power do influence fundamental dimensions of social perception and their accompanying emotional reactions but result in comparably positive and negative evaluations for both genders.
Full Text Available Power posing, the adoption of open and powerful postures, has effects that parallel those of actual social power. This study explored the social evaluation of adopting powerful versus powerless body postures in men and women regarding perceived warmth, competence, and the likelihood of eliciting admiration, envy, pity, and contempt. Previous findings suggest that the display of power by women may have side effects due to gender stereotyping, namely reduced warmth ratings and negative emotional reactions. An experiment (N = 2,473 asked participants to rate pictures of men and women who adopted high-power or low-power body postures. High-power posers were rated higher on competence, admiration, envy, and contempt compared to low-power posers, whereas the opposite was true for pity. There was no impact of power posing on perceived warmth. Contrary to expectations, the poser’s gender did not moderate any of the effects. These findings suggest that nonverbal displays of power do influence fundamental dimensions of social perception and their accompanying emotional reactions but result in comparably positive and negative evaluations for both genders.
Bannink, Rienke; Broeren, Suzanne; van de Looij-Jansen, Petra M; de Waart, Frouwkje G; Raat, Hein
To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially because early-onset mental health problems
Bannink, Rienke; Broeren, Suzanne; van de Looij – Jansen, Petra M.; de Waart, Frouwkje G.; Raat, Hein
Purpose To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. Methods A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. Results There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Conclusions Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially
Full Text Available PURPOSE: To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. METHODS: A two-year longitudinal study was conducted among first-year secondary school students (N = 3181. Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. RESULTS: There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. CONCLUSIONS: Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying
The success of group psychotherapy is impeded when group members maintain secrets and fail to self-disclose to other group members. However, revealing secrets sometimes conflicts with the legal and ethical constraints of confidentiality, thus placing a greater burden on the group. The case reported here illustrates how complex the dynamics of group therapy become when one group member maintains a secret. In this case, one member maintained a secret about another to preserve that individual's right to privacy and confidentiality. This case also details the group member's deliberations and confusion about the effect his secret had on the group's success, as well as the burden he experienced by choosing to preserve confidentiality at the expense of successful therapy for himself.
Stefan Lueders, Computer Security Team
Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site! Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...
Duan, Xiaodong; Tan, Zheng-Hua
In this paper, we present a local feature learning method for face recognition to deal with varying poses. As opposed to the commonly used approaches of recovering frontal face images from profile views, the proposed method extracts the subject related part from a local feature by removing the pose...... related part in it on the basis of a pose feature. The method has a closed-form solution, hence being time efficient. For performance evaluation, cross pose face recognition experiments are conducted on two public face recognition databases FERET and FEI. The proposed method shows a significant...... recognition improvement under varying poses over general local feature approaches and outperforms or is comparable with related state-of-the-art pose invariant face recognition approaches. Copyright ©2015 by IEEE....
Cao, Yuanming; Liu, Yijun
Head pose estimation has been widely used in the field of artificial intelligence, pattern recognition and intelligent human-computer interaction and so on. Good head pose estimation algorithm should deal with light, noise, identity, shelter and other factors robustly, but so far how to improve the accuracy and robustness of attitude estimation remains a major challenge in the field of computer vision. A method based on deep learning for pose estimation is presented. Deep learning with a strong learning ability, it can extract high-level image features of the input image by through a series of non-linear operation, then classifying the input image using the extracted feature. Such characteristics have greater differences in pose, while they are robust of light, identity, occlusion and other factors. The proposed head pose estimation is evaluated on the CAS-PEAL data set. Experimental results show that this method is effective to improve the accuracy of pose estimation.
Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)
Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potentialmisuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed.
Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)
Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary`s practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone`s benefit but the employer`s. Issues regarding defining rights and obligations by contract were also discussed.
This article explores and offers a qualified defence of the claim that the entitlement to forgive a wrongdoer belongs to the victim of the wrong. A summary account of forgiveness is given, followed by arguments in favor of the victim's prerogative to forgive. Primary, or direct victims are then distinguished from secondary and ...
Pedersen, Bodil Maria; Sidenius, Katrine
Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...
This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...
Sainio, Miia; Veenstra, René; Huitsing, Gijs; Salmivalli, Christina
This study focused on the dyadic defending relationships of victimized children in grades 3, 4, and 5 (N = 7481 children from 356 school classes, mean ages 10-12 years). Most of the victims (72.3%) had at least one defender. Being defended was positively related to victims' adjustment and social
Chan, John H. F.
Using a new non-anonymous questionnaire and a nomination method by which victims were asked to name their aggressors, Chan (2002) collated the responses from individual victims to produce name-clusters that were studied for systemic patterns of bullying and victimization within the whole-school community. Three such patterns emerged: serial…
Qian, Xuelin; Fu, Yanwei; Wang, Wenxuan; Xiang, Tao; Wu, Yang; Jiang, Yu-Gang; Xue, Xiangyang
Person Re-identification (re-id) faces two major challenges: the lack of cross-view paired training data and learning discriminative identity-sensitive and view-invariant features in the presence of large pose variations. In this work, we address both problems by proposing a novel deep person image generation model for synthesizing realistic person images conditional on pose. The model is based on a generative adversarial network (GAN) and used specifically for pose normalization in re-id, th...
Holt, Melissa K.; Finkelhor, David; Kantor, Glenda Kaufman
This study explored the possibility that bullies, victims of bullying, and bully-victims (i.e., youth who both perpetrate and are victims of bullying) are at increased risk for victimization in four other domains: conventional crime, child maltreatment, sexual victimization, and witnessing or indirect victimization. It also evaluated the extent to…
Hughes, C G
The extradition proceedings relating to Senator Pinochet were ultimately resolved by the decision of the Secretary of State on the basis of medical evidence as to the Senator's competence to participate in a criminal trial. In considering the decision-making of the Secretary of State the court considered whether a confidential medical report, which dealt with matters of fact and opinion, could be disclosed to interested parties. The interests of justice in a significant, novel and complex case over-rode Senator Pinochet's expectations of confidentiality and his right to respect for private life under Article 8(1) of the European Convention on Human Rights (ECHR).
Van Liew, Julia R
As multidisciplinary perspectives are increasingly integrated into the treatment of health problems, opportunities for clinical psychologists in medical settings are expanding. Although cross-discipline collaboration is at the core of multidisciplinary treatment models, psychologists must be particularly cautious about information sharing due to their profession's ethical standards regarding patient confidentiality. Psychologists' ethical obligations require them to achieve a delicate balance between contributing to the treatment team and protecting patient confidentiality. In the current review, relevant ethical standards and federal guidelines are applied to everyday practices of clinical psychologists in medical settings. Additionally, recommendations for individual psychologists, health care organizations, and graduate training programs are presented.
Sokol, D K; Car, J
Although telephone consultations are widely used in the delivery of healthcare, they are vulnerable to breaches of patient confidentiality. Current guidelines on telephone consultations do not address adequately the issue of confidentiality. In this paper, we propose a solution to the a password system to control access to patient information. Authorised persons will be offered the option of selecting a password which they will use to validate their request for information over the telephone. This simple yet stringent method of access control should improve security while allowing the continuing evolution of telephone consultations.
Oli S. Arul
Full Text Available With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.
... Request for Information Collection: ``Confidentiality & Disclosure of State Unemployment Compensation... Confidentiality and Disclosure of State Unemployment Compensation Information final rule and State Income and.... ADDRESSEE: Submit written comments to the Employment and Training Administration, Office of Unemployment...
... AGENCY Access to Confidential Business Information by Protection Strategies Incorporated AGENCY... access to the Toxic Substances Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI...
... AGENCY Access to Confidential Business Information by Industrial Economics, Incorporated AGENCY... will authorize its contractor, Industrial Economics, Incorporated (IEc) to access Confidential Business..., Industrial Economics, Incorporated (IEc) will assist the Office of Enforcement and Compliance Assurance...
Thomas, Nicole A; Burkitt, Jennifer A; Patrick, Regan E; Elias, Lorin J
People tend to display the left cheek when posing for a portrait; however, this effect does not appear to generalise to advertising. The amount of body visible in the image and the sex of the poser might also contribute to the posing bias. Portraits also exhibit lateral lighting biases, with most images being lit from the left. This effect might also be present in advertisements. A total of 2801 full-page advertisements were sampled and coded for posing direction, lighting direction, sex of model, and amount of body showing. Images of females showed an overall leftward posing bias, but the biases in males depended on the amount of body visible. Males demonstrated rightward posing biases for head-only images. Overall, images tended to be lit from the top left corner. The two factors of posing and lighting biases appear to influence one another. Leftward-lit images had more leftward poses than rightward, while the opposite occurred for rightward-lit images. Collectively, these results demonstrate that the posing biases in advertisements are dependent on the amount of body showing in the image, and that biases in lighting direction interact with these posing biases.
Katzer, C.; Fetchenhauer, D.; Belschak, F.
Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet
... Information Collection Activities; Proposed Collection; Comment Request; Confidentiality Rules (Renewal... this action are businesses or other for-profit entities. Title: Confidentiality Rules (Renewal). ICR... protect the confidentiality of information as well as the rights of the public to obtain access to...
... National Oceanic and Atmospheric Administration 50 CFR Part 600 RIN 0648-AV81 Confidentiality of... regulations to revise existing regulations governing the confidentiality of information submitted in... some significant issues that concern NMFS' application of the MSA confidentiality provision to requests...
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.
The leakage of confidential information (e.g.\\ industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the
... AGENCY Waste Import and Export; Inquiry To Learn Whether Businesses Assert Business Confidentiality... 268, and did not assert a claim of business confidentiality covering any of that information at the... of submission, cannot later make a business confidentiality claim.\\13\\ Nevertheless, other businesses...
... National Oceanic and Atmospheric Administration 50 CFR Part 600 RIN 0648-AV81 Confidentiality of... governing the confidentiality of information submitted in compliance with any requirement or regulation... address some significant issues that concern NMFS' application of the MSA confidentiality provision to...
... National Oceanic and Atmospheric Administration 50 CFR Part 600 RIN 0648-AV81 Confidentiality of... regulations governing the confidentiality of information submitted in compliance with any requirement or... some significant issues that concern NMFS' application of the MSA confidentiality provision to requests...
... AGENCY Access to Confidential Business Information; Protection Strategies Incorporated AGENCY... Strategies Incorporated (PSI) of Arlington, VA, to access information which has been submitted to EPA under... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data occurred on...
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false What is the confidentiality requirement of Federal UC law? 603.4 Section 603.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR FEDERAL-STATE UNEMPLOYMENT COMPENSATION (UC) PROGRAM; CONFIDENTIALITY AND DISCLOSURE OF STATE UC INFORMATION Confidentiality and...
... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of patient safety work product. 3... PROVISIONS PATIENT SAFETY ORGANIZATIONS AND PATIENT SAFETY WORK PRODUCT Confidentiality and Privilege Protections of Patient Safety Work Product § 3.206 Confidentiality of patient safety work product. (a...
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Final confidentiality determination by EPA legal office. 2.205 Section 2.205 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.205 Final confidentiality...
Pruneau, Diane; Freiman, Viktor; Barbier, Pierre-Yves; Langis, Joanne
Grade 3 students were asked to solve a sedimentation problem in a local river. With scientists, students explored many aspects of the problem and proposed solutions. Graphic representation tools were used to help students to better pose the problem. Using questionnaires and interviews, researchers observed students' capacity to pose the problem…
Cheng, Lu Pien
In this study, ways in which problem posing activities aid our understanding of children's learning of addition of unlike fractions and product of proper fractions was examined. In particular, how a simple problem posing activity helps teachers take a second, deeper look at children's understanding of fraction concepts will be discussed. The…
Lindell, Annukka K
When posing for portraits people tend to offer their left cheek. This bias is also evident in selfies: informal photographic self-portraits taken with a smartphone. Mechanical biases have been argued to influence selfie posing orientation (predicting that using the left hand favours a stronger left cheek bias), however this hypothesis has not been directly tested. The present study was thus designed to determine whether motor biases influence selfie pose orientation. Three hundred and twenty participants (F = 159, M = 161) were asked to pose for a selfie "as you really are," and completed a handedness measure; hand used to take the selfie and selfie pose orientation were recorded. Ordinal logistic regression confirmed that neither participant handedness nor hand used to capture the selfie predicted selfie pose orientation. Regardless of sex, handedness, or hand used, participants were more likely to present a midline (49.75%) than a left (26.53%) or right (26.72%) cheek pose. Though handedness was a strong predictor of hand used to capture the selfie (left handers favour the left, and right handers the right, hand), it did not predict posing orientation. These results confirm that selfie cheek biases are not simply a residual effect of the mechanics of taking selfies.
Anikonov, Yu E
The Inverse and Ill-Posed Problems Series is a series of monographs publishing postgraduate level information on inverse and ill-posed problems for an international readership of professional scientists and researchers. The series aims to publish works which involve both theory and applications in, e.g., physics, medicine, geophysics, acoustics, electrodynamics, tomography, and ecology.
Dibeklioğlu, H.; Valenti, R.; Salah, A.A.; Gevers, T.
Automatic detection of spontaneous versus posed facial expressions received a lot of attention in recent years. However, almost all published work in this area use complex facial features or multiple modalities, such as head pose and body movements with facial features. Besides, the results of these
Opmeer, Mark R.; Curtain, Ruth F.
We provide an abstract framework for infinite-dimensional linear systems that are not necessarily well-posed in the standard L2 sense. One example of a system that is not well-posed but does fit into the new abstract framework is the heat equation with Dirichlet control and Neumann observation. The
Broekhuijsen, Jeroen; Poppe, Ronald Walter; Poel, Mannes
Automatic estimation and recognition of poses from video allows for a whole range of applications. The research described here is an important step towards automatic extraction of 3D poses. We describe our research to extract the 2D joint locations of the people in meeting videos. The key point of
services to patients in their care.1 The general ethical ... Ethics in health care: confidentiality and information technologies. Knapp van Bogaert D, PhD, DPhil. Sessional Professor of Ethics, Department of Family Medicine and Primary Health Care MEDUNSA .... medical history, financial disclosures and personality traits.
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality of Electronic Export Information. 30.60 Section 30.60 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE FOREIGN TRADE REGULATIONS General Administrative Provisions...
One of the most difficult issues health professionals face in their daily fieldwork practice is a conflict between their professional duties, as illustrated in keeping a patient's medical information confidential, and having empathy with a family member's need to know. This moral dilemma is difficult for students to circumvent and ...
The author reports on a legal battle over oral-history records housed at Boston College that casts light on how little legal weight pledges of confidentiality to research subjects actually have. As a federal court weighs whether to let the federal government seize, and hand over to British authorities, the college's records of confidential…
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The
Last month's article considered the scope of a district nurse's duty to maintain the confidentiality of patient information under the Nursing and Midwifery Council (NMC) Code, their contract of employment, and the law. This month, Richard Griffith considers the exceptions to these duties and sets out when a district nurse would be justified in disclosing patient information.
Leyva-Moral, Juan Manuel; Feijoo-Cid, Maria
Background When conducting qualitative research, participants usually share lots of personal and private information with the researcher. As researchers, we must preserve participants' identity and confidentiality of the data. Objective To critically analyze an ethical conflict encountered regarding confidentiality when doing qualitative research. Research design Case study. Findings and discussion one of the participants in a study aiming to explain the meaning of living with HIV verbalized his imminent intention to commit suicide because of stigma of other social problems arising from living with HIV. Given the life-threatening situation, the commitment related to not disclosing the participant's identity and/or the content of the interview had to be broken. To avoid or prevent suicide, the therapist in charge of the case was properly informed about the participant's intentions. One important question arises from this case: was it ethically appropriate to break the confidentiality commitment? Conclusion confidentiality could be broken if a life-threatening event is identified during data collection and participants must know that. This has to be clearly stated in the informed consent form.
... 34 Education 2 2010-07-01 2010-07-01 false Confidentiality of information. 303.460 Section 303.460 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION EARLY INTERVENTION PROGRAM FOR INFANTS AND...
... Section 144.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS... submissions, by stamping the words “confidential business information” on each page containing such... which deals with the existence, absence, or level of contaminants in drinking water. ...
... ethical dilemmas as to when and to whom they may disclose information. ... 1 Department of Psychology, University of the Free State, Bloemfontein, South Africa ... Confidentiality is an important ethical principle for all health professionals and also has a legal bearing on duty. .... interdisciplinary education and practice.
... privileged documents. 17.501 Section 17.501 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS... privileged documents. (a) Documents and parts of documents are considered confidential and privileged if they... of special incidents (VA Form 10-2633 or similar forms) and follow-up documents unless developed...
Mole, Damian J; Fox, Colin; Napolitano, Giulio
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
Lindenthal, Jacob Jay; And Others
Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…
Drake, David W.; And Others
The purpose of this research was to study the effects of different statements regarding confidentiality (absolute; limited; nondirective) on subject impressions of interviewers. In addition, the professional affiliation of the interviewer was manipulated (psychologist, minister/pastoral counselor, social worker) to assess potential influence of…
Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb
Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.
... THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Solicitation and... evaluators and advisors shall sign a Conflict of Interest Certificate and a Confidentiality Certificate in a... outside the Government shall take into consideration requirements for avoiding individual conflicts of...
... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1207.540 Section 1207.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... books, records, and reports. All information obtained from the books, records, and reports of handler...
Ethics CPD Supplement: Ethics in health care: confidentiality and information technologies. S3. Vol 56 No 1 Supplement 1. S Afr Fam Pract ... data is increasingly underpinned by advances in technology. For example, computer storage of ... hospital's secure computer to complete the file transfer. In. Ethics in health care:.
Time for Action: Audit, Accountability and Confidential Enquiries into Maternal Deaths in Nigeria. Julia Hussein, Friday Okonofua. Abstract. Improving the quality of care is essential for achieving reductions in maternal mortality. Audit is one of the methods which can be used to simultaneously assess as well as improve ...
O'Connell, William P.
The school counseling literature emphasizes the importance of confidentiality in the counseling relationship. In some circumstances, school policy may require disclosure of content discussed in counseling unrelated to threat of harm to self or others. This pilot study investigated secondary school principals' attitudes toward the practice of…
... introduction in its rules to ] state that confidential treatment also must be afforded to ``any information that would reveal the existence of a SAR.'' The introduction also would indicate that SAR information... based''); Cotton v. Private Bank and Trust Co., 235 F. Supp. 2d 809, 815 (N.D. Ill. 2002) (holding that...
... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Assurance of claimant confidentiality. 303.31 Section 303.31 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS CITIZEN AWARDS FOR INFORMATION ON CRIMINAL...
Objectives. To describe the role of the Internet in building virtual communities of doctors, to identify threats to privacy and confidentiality in this use of the Internet, and to suggest ways in which this threat can be managed. Summary. The Internet is revolutionising the medical profession. The doctor's role as medical expert is ...
... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Confidential fisheries data. 229.11 Section 229.11 Wildlife and Fisheries NATIONAL MARINE FISHERIES SERVICE, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS AUTHORIZATION FOR COMMERCIAL FISHERIES UNDER THE MARINE...
Fung, Ho Yin; Wong, Kin Hong; Yu, Ying Kin; Tsui, Kwan Pang; Kam, Ho Chuen
In this paper, we have developed an algorithm to track the pose of a human face robustly and efficiently. Face pose estimation is very useful in many applications such as building virtual reality systems and creating an alternative input method for the disabled. Firstly, we have modified a face detection toolbox called DLib for the detection of a face in front of a camera. The detected face features are passed to a pose estimation method, known as the four-point algorithm, for pose computation. The theory applied and the technical problems encountered during system development are discussed in the paper. It is demonstrated that the system is able to track the pose of a face in real time using a consumer grade laptop computer.
Full Text Available Head pose estimation has been an integral problem in the study of face recognition systems and human-computer interfaces, as part of biometric applications. A fine estimate of the head pose angle is necessary and useful for several face analysis applications. To determine the head pose, face images with varying pose angles can be considered to be lying on a smooth low-dimensional manifold in high-dimensional image feature space. However, when there are face images of multiple individuals with varying pose angles, manifold learning techniques often do not give accurate results. In this work, we propose a framework for a supervised form of manifold learning called Biased Manifold Embedding to obtain improved performance in head pose angle estimation. This framework goes beyond pose estimation, and can be applied to all regression applications. This framework, although formulated for a regression scenario, unifies other supervised approaches to manifold learning that have been proposed so far. Detailed studies of the proposed method are carried out on the FacePix database, which contains 181 face images each of 30 individuals with pose angle variations at a granularity of 1Ã¢ÂˆÂ˜. Since biometric applications in the real world may not contain this level of granularity in training data, an analysis of the methodology is performed on sparsely sampled data to validate its effectiveness. We obtained up to 2Ã¢ÂˆÂ˜ average pose angle estimation error in the results from our experiments, which matched the best results obtained for head pose estimation using related approaches.
Beltran-Aroca, Cristina M; Girela-Lopez, Eloy; Collazo-Chao, Eliseo; Montero-Pérez-Barquero, Manuel; Muñoz-Villanueva, Maria C
Respect for confidentiality is important to safeguard the well-being of patients and ensure the confidence of society in the doctor-patient relationship. The aim of our study is to examine real situations in which there has been a breach of confidentiality, by means of direct observation in clinical practice. By means of direct observation, our study examines real situations in which there has been a breach of confidentiality in a tertiary hospital. To observe and collect data on these situations, we recruited students enrolled in the Medical Degree Program at the University of Cordoba. The observers recorded their entries on standardized templates during clinical internships in different departments: Internal Medicine; Gynecology and Obstetrics; Pediatrics; Emergency Medicine; General and Digestive Surgery; Maxillofacial Surgery; Plastic Surgery; Orthopedics and Traumatology; Digestive; Dermatology; Rheumatology; Mental Health; Nephrology; Pneumology; Neurology; and Ophthalmology. Following 7138 days and 33157 h of observation, we found an estimated Frequency Index of one breach per 62.5 h. As regards the typology of the observed breaches, the most frequent (54,6 %) were related to the consultation and/or disclosure of clinical and/or personal data to medical personnel not involved in the patient's clinical care, as well as people external to the hospital. As regards their severity, severe breaches were the most frequent, accounting for 46.7 % of all incidents. Most of the reported incidents were observed in public areas (37.9 %), such as corridors, elevators, the cafeteria, stairs, and locker rooms. In addition to aspects related to hospital organization or infrastructure, we have shown that all healthcare personnel are involved in confidentiality breaches, especially physicians. While most are committed unintentionally, a non-negligible number are severe, repeated breaches (9.5 %), thus suggesting a certain carelessness, perhaps through ignorance about
Søndergaard, Dorte Marie
Based on a conceptualization of bullying and relational aggression in groups as an effect of social dynamics rather than individual deficits – this article reflects upon some of the intricate mechanisms and dilemmas involved in victim positioning. Victims of bullying and relational aggression often....... The hopes of (eventual) social belonging may in that sense work paradoxically as a strong agent in the denial of oppression and marginalization. The article is theoretically informed by poststructuralist conceptualizations and grounded in cases of bullying and marginalization (one of them involving rape......). One case is taken from the empirical data produced by the author and a research project on bullying among children (eXbus: Exploring Bullying in School). Two other cases are borrowed from publications of respectively B. Davies from Australia and A. Evaldsson from Shweden. The article opens insights...
McGovern, Theresa M
This author has found through professional and personal experience that throughout the world, women directly affected by injustice have led demands for accountability. The purpose of this article is to challenge mainstream human rights groups to create a different type of partnership between themselves and the people for whom they advocate by seeking the involvement of "victims", including leaders of successful "victim-led" initiatives. This approach will result in more appropriate policy recommendations and will enhance both entities' capacity for outreach. Moreover, it will bring mainstream human rights organizations into greater compliance with their own stated values, as well as exemplifying the same respect, flexibility, and accommodation that these groups often recommend to governmental, political, and institutional entities.
Grosse, Alexandra B.; Grosse, Claudia A.; Anderson, Suzanne [University Hospital of Berne, Inselspital, Department of Diagnostic, Pediatric and Interventional Radiology, Berne (Switzerland); Steinbach, Lynne S. [University of California San Francisco, Department of Radiology, San Francisco, CA (United States); Zimmermann, Heinz [University Hospital of Berne, Inselspital, Department of Trauma and Emergency Medicine, Berne (Switzerland)
Skiing and hiking outside the boundaries remains an attractive wilderness activity despite the danger of avalanches. Avalanches occur on a relatively frequent basis and may be devastating. Musculoskeletal radiologists should be acquainted with these injuries. Fourteen avalanche victims (11 men and 3 women; age range 17-59 years, mean age 37.4 years) were air transported to a high-grade trauma centre over a period of 2 years. Radiographs, CT and MR images were prospectively evaluated by two observers in consensus. Musculoskeletal findings (61%) were more frequent than extraskeletal findings (39%). Fractures were most commonly seen (36.6%), involving the spine (14.6%) more frequently than the extremities (9.8%). Blunt abdominal and thoracic trauma were the most frequent extraskeletal findings. A wide spectrum of injuries can be found in avalanche victims, ranging from extremity fractures to massive polytrauma. Asphyxia remains the main cause of death along with hypoxic brain injury and hypothermia. (orig.)
Maier, Shana L
Despite efforts to educate and create community awareness, rape myths and victim-blaming attitudes persist in society. This research explores whether advocates express victim-questioning attitudes or questions, negative judgment, or frustration regarding victims' behavior or choices. Data from interviews with 58 advocates reveal that the majority (76%) of advocates never expressed any victim-questioning attitudes during the interview. However, responses from 14 advocates (24%) show that victim-questioning has evolved into a much more complex, subtle form than historical victim blaming or acceptance of rape myths.
van de Weijer, Steve G A; Leukfeldt, E Rutger
The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.
Jackson, Debra; Peters, Kath; Hutchinson, Marie; Edenborough, Michel; Luck, Lauretta; Wilkes, Lesley
The aim of this paper is to reveal the experiences and meaning of confidentiality for Australian nurses in the context of whistle blowing. Despite the ethical, legal and moral importance of confidentiality within the health-care context, little work has addressed the implications of confidentially related to whistle-blowing events. The study used qualitative narrative inquiry. Eighteen Australian nurses, with first-hand experience of whistle blowing, consented to face-to-face semi-structured interviews. Four emergent themes relating to confidentiality were identified: (1) confidentiality as enforced silence; (2) confidentiality as isolating and marginalizing; (3) confidentiality as creating a rumour mill; and (4) confidentiality in the context of the public's 'right to know'. The interpretation and application of confidentiality influences the outcomes of whistle blowing within the context of health-care services. Conversely, confidentially can be a protective mechanism for health-care institutions. It is beholden upon nurse manager to carefully risk manage whistle-blowing events. It is important that nurse managers are aware of the consequences of their interpretation and application of confidentiality to whistle-blowing events, and the potentially competing outcomes for individuals and the institution. © 2011 The Authors. Journal compilation © 2011 Blackwell Publishing Ltd.
Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor
OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...... for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. CONCLUSIONS: The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion...
Bridges, F Stephen; Tankersley, William B
Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.
Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.
National Aeronautics and Space Administration — We propose to develop ESPRIT: an Exercise Sensing and Pose Recovery Inference Tool, in support of NASA's effort in developing crew exercise technologies for...
Full Text Available To solve the problem of relative camera pose estimation, a method using optimization with respect to the manifold is proposed. Firstly from maximum-a-posteriori (MAP model to nonlinear least squares (NLS model, the general state estimation model using optimization is derived. Then the camera pose estimation model is applied to the general state estimation model, while the parameterization of rigid body transformation is represented by Lie group/algebra. The jacobian of point-pose model with respect to Lie group/algebra is derived in detail and thus the optimization model of rigid body transformation is established. Experimental results show that compared with the original algorithms, the approaches with optimization can obtain higher accuracy both in rotation and translation, while avoiding the singularity of Euler angle parameterization of rotation. Thus the proposed method can estimate relative camera pose with high accuracy and robustness.
... Procedures Home, Business, and Entertainment Products Cell Phones Health Issues Share Tweet Linkedin Pin it More sharing ... it Email Print Do cell phones pose a health hazard? Many people are concerned that cell phone ...
María F. Ayllón
Full Text Available This work shows the relationship between the development of mathematical thinking and creativity with mathematical problem posing and solving. Creativity and mathematics are disciplines that do not usually appear together. Both concepts constitute complex processes sharing elements, such as fluency (number of ideas, flexibility (range of ideas, novelty (unique idea and elaboration (idea development. These factors contribute, among others, to the fact that schoolchildren are competent in mathematics. The problem solving and posing are a very powerful evaluation tool that shows the mathematical reasoning and creative level of a person. Creativity is part of the mathematics education and is a necessary ingredient to perform mathematical assignments. This contribution presents some important research works about problem posing and solving related to the development of mathematical knowledge and creativity. To that end, it is based on various beliefs reflected in the literature with respect to notions of creativity, problem solving and posing.
Davies, Michelle; Pollard, Paul; Archer, John
Most researchers who have investigated attributions of blame toward victims in sexual-assault depictions have considered only female victims of male perpetrators. Few researchers have investigated the effects of perpetrator gender or victim sexual orientation on blame attributions toward male victims. The present authors investigated those two variables. Participants were 161 undergraduates at a British university in social science courses, each of whom read one scenario of a set in which perpetrator gender and victim sexual orientation were varied between subjects, and who completed a questionnaire measuring their blame toward the victim and the perpetrator. The present results showed that male participants blamed the victim more if a person of the gender that he was normally attracted to assaulted him. Male participants also regarded the female perpetrator in more favorable terms than they did the male perpetrator regardless of the victim's sexual orientation. The authors discussed the present results in relation to gender role stereotypes.
Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC
Oldenburg, Beau; Barrera, Davide; Olthof, Tjeert; Goossens, Frits; van der Meulen, Matty; Vermande, Marjolijn; Aleva, Elisabeth; Sentse, Miranda; Veenstra, René
Using data from 2413 Dutch first-year secondary school students (M age=13.27, SD age=0.51, 49.0% boys), this study investigated as to what extent students who according to their self-reports had not been victimized (referred to as reporters) gave victimization nominations to classmates who according to their self-reports had been victimized (referred to as receivers). Using a dyadic approach, characteristics of the reporter-receiver dyad (i.e., gender similarity) and of the reporter (i.e., reporters' behavior during bullying episodes) that were possibly associated with reporter-receiver agreement were investigated. Descriptive analyses suggested that numerous students who were self-reported victims were not perceived as victimized by their non-victimized classmates. Three-level logistic regression models (reporter-receiver dyads nested in reporters within classrooms) demonstrated greater reporter-receiver agreement in same-gender dyads, especially when the reporter and the receiver were boys. Furthermore, reporters who behaved as outsiders during bullying episodes (i.e., reporters who actively shied away from the bullying) were less likely to agree on the receiver's self-reported victimization, and in contrast, reporters who behaved as defenders (i.e., reporters who helped and supported victims) were more likely to agree on the victimization. Moreover, the results demonstrated that reporters gave fewer victimization nominations to receivers who reported they had been victimized sometimes than to receivers who reported they had been victimized often/very often. Finally, this study suggested that reporter-receiver agreement may not only depend on characteristics of the reporter-receiver dyad and of the reporter, but on classroom characteristics as well (e.g., the number of students in the classroom). Copyright © 2015 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.
Kabanikhin, S I
The text demonstrates the methods for proving the existence (if et all) and finding of inverse and ill-posed problems solutions in linear algebra, integral and operator equations, integral geometry, spectral inverse problems, and inverse scattering problems. It is given comprehensive background material for linear ill-posed problems and for coefficient inverse problems for hyperbolic, parabolic, and elliptic equations. A lot of examples for inverse problems from physics, geophysics, biology, medicine, and other areas of application of mathematics are included.
open computer vision) for real-time implementation and faster computation since OpenCV has precompiled libraries that may work better for real image...affordable CCD cameras and open coding libraries . We accomplish this by reviewing past literature about UAV detection and pose estimation and exploring...capabilities suitable for the purpose of UAV to UAV detection and pose estima- tion using affordable CCD cameras and open coding libraries . We
Taheri, Sima; Sankaranarayanan, Aswin C; Chellappa, Rama
The albedo of a Lambertian object is a surface property that contributes to an object's appearance under changing illumination. As a signature independent of illumination, the albedo is useful for object recognition. Single image-based albedo estimation algorithms suffer due to shadows and non-Lambertian effects of the image. In this paper, we propose a sequential algorithm to estimate the albedo from a sequence of images of a known 3D object in varying poses and illumination conditions. We first show that by knowing/estimating the pose of the object at each frame of a sequence, the object's albedo can be efficiently estimated using a Kalman filter. We then extend this for the case of unknown pose by simultaneously tracking the pose as well as updating the albedo through a Rao-Blackwellized particle filter (RBPF). More specifically, the albedo is marginalized from the posterior distribution and estimated analytically using the Kalman filter, while the pose parameters are estimated using importance sampling and by minimizing the projection error of the face onto its spherical harmonic subspace, which results in an illumination-insensitive pose tracking algorithm. Illustrations and experiments are provided to validate the effectiveness of the approach using various synthetic and real sequences followed by applications to unconstrained, video-based face recognition.
Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H
Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality. Copyright © 2015 Elsevier Masson SAS. All rights reserved.
Agyapong, V I O
A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.
Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung
This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).
Burton, David L.; Duty, Kerry Jo; Leibowitz, George S.
This study compares sexually victimized and nonsexually victimized male adolescent sexual abusers on a number of variables. Self-report measures were administered to 325 male sexually abusive youth (average age 16) in six residential facilities in the Midwest, 55% of whom reported sexual victimization. The results indicate that the sexually…
Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley
This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The approach is modeldriven integrating information assets and the IT infrastructure that they rely on for distributed systems. IT infrastructures enable one to analyse risk propagation possibilities and ca...
Wallace, Ilse M
In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications.
Downs, R. R.; Adamo, S. B.
The integration of remote sensing data with socioeconomic data presents new opportunities for scientific discovery and analysis that can improve understanding of the environmental sustainability issues that society faces today. Such integrated data products and services can be used to study interdisciplinary issues by investigators representing various disciplines. In addition to the scientific benefits that can be attained by integrating remote sensing data with socioeconomic data, the integration of these data also present challenges that reflect the complex issues that arise when sharing and integrating different types of science data. When integrating one or more datasets that contain sensitive information, data producers need to be aware of the limitations that have been placed upon the data to protect private property, species or other inhabitants that reside on the property, or restricted information about a particular location. Similarly, confidentiality and privacy issues are a concern for data that have been collected about individual humans and families who have volunteered to serve as human research subjects or whose personal information may have been collected without their knowledge. In addition, intellectual property rights that are associated with a particular dataset may prevent integration with other data or pose constraints on the use of the resulting data products or services. These challenges will be described along with approaches that can be applied to address them when planning projects that involve the integration of remote sensing data with socioeconomic data.
Obrad T. Čabarkapa
Full Text Available In order that the invention solving a technical problem receives a patent protection, it is necessary to file a patent application. For the protection of confidential inventions which are important for defense and national security, a confidential patent application must be filed. A confidential patent application is an important and complex document, the parts of which are, in principle, exposed in an established order. For the preparation of patent applications, it is necessary to engage experts with higher education, primarily in the technical field the invention relates to. The contents of the patent application is a basis for examining whether the application meets the requirements for patentability and whether the right to patent protection is achieved. Besides theoretical discussions on patent application, the paper gives a short version of an example of an application regarding a protected confidential invention. Introduction The basic condition for the exercise of patent protection is filing a patent application, the test procedure and, eventually, depending on the test results - the recognition or rejection of the patent. The paper gives a description of all parts of the patent application on an example of a confidential invention already patented. The content of the confidential patent application The confidential patent application for confidential invention protection consists of the following parts: The application for a patent; description of the invention; the claims (indication of what is new and what is required to be protected by patenting; abstract (short summary of the invention and a draft of the invention (to which the description and the claims are referred. The application for a patent The application for patent is filed on Form P-1 and a request for the petty patent on Form MP-1. The data entered in the file is, for example: the applicant; the lawyer; the name of the invention in Serbian and English; the inventor
Following the Gillick case in 1986, it was recognised that mature minors were owed a duty of confidentiality in respect of their medical information. Subsequent cases confirmed that the duty was also owed to non-competent children, including infants, but without explaining the basis for finding the existence of such a duty and its scope. It is particularly unclear when and upon what legal basis a doctor could disclose information to parents when their child wished to keep it confidential. This paper will examine the law of confidentiality as it applies to children, identifying issues which are problematic. Developments in the law of personal confidences which have taken place as a result of the Human Rights Act 1998, and the recognition of Article 8 rights as part of the law, will be reviewed and analysed from the perspective of the duty of confidence owed to children in respect of their medical information. Finally, the paper will offer an explanation of a basis for disclosure to parents which minimises violations of a minor's autonomy.
Wijayasinghe, Indika B.; Sanford, Joseph D.; Abubakar, Shamsudeen; Saadatzi, Mohammad Nasser; Das, Sumit K.; Popa, Dan O.
The performance of robots to carry out tasks depends in part on the sensor information they can utilize. Usually, robots are fitted with angle joint encoders that are used to estimate the position and orientation (or the pose) of its end-effector. However, there are numerous situations, such as in legged locomotion, mobile manipulation, or prosthetics, where such joint sensors may not be present at every, or any joint. In this paper we study the use of inertial sensors, in particular accelerometers, placed on the robot that can be used to estimate the robot pose. Studying accelerometer placement on a robot involves many parameters that affect the performance of the intended positioning task. Parameters such as the number of accelerometers, their size, geometric placement and Signal-to-Noise Ratio (SNR) are included in our study of their effects for robot pose estimation. Due to the ubiquitous availability of inexpensive accelerometers, we investigated pose estimation gains resulting from using increasingly large numbers of sensors. Monte-Carlo simulations are performed with a two-link robot arm to obtain the expected value of an estimation error metric for different accelerometer configurations, which are then compared for optimization. Results show that, with a fixed SNR model, the pose estimation error decreases with increasing number of accelerometers, whereas for a SNR model that scales inversely to the accelerometer footprint, the pose estimation error increases with the number of accelerometers. It is also shown that the optimal placement of the accelerometers depends on the method used for pose estimation. The findings suggest that an integration-based method favors placement of accelerometers at the extremities of the robot links, whereas a kinematic-constraints-based method favors a more uniformly distributed placement along the robot links.
Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri
Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.
Yu, Ying Kin; Wong, Kin Hong; Chang, Michael Ming Yuen
This paper describes a genetic algorithm that tackles the pose-estimation problem in computer vision. Our genetic algorithm can find the rotation and translation of an object accurately when the three-dimensional structure of the object is given. In our implementation, each chromosome encodes both the pose and the indexes to the selected point features of the object. Instead of only searching for the pose as in the existing work, our algorithm, at the same time, searches for a set containing the most reliable feature points in the process. This mismatch filtering strategy successfully makes the algorithm more robust under the presence of point mismatches and outliers in the images. Our algorithm has been tested with both synthetic and real data with good results. The accuracy of the recovered pose is compared to the existing algorithms. Our approach outperformed the Lowe's method and the other two genetic algorithms under the presence of point mismatches and outliers. In addition, it has been used to estimate the pose of a real object. It is shown that the proposed method is applicable to augmented reality applications.
Gong, Wenjuan; Zhang, Xuena; Gonzàlez, Jordi; Sobral, Andrews; Bouwmans, Thierry; Tu, Changhe; Zahzah, El-hadi
Human pose estimation refers to the estimation of the location of body parts and how they are connected in an image. Human pose estimation from monocular images has wide applications (e.g., image indexing). Several surveys on human pose estimation can be found in the literature, but they focus on a certain category; for example, model-based approaches or human motion analysis, etc. As far as we know, an overall review of this problem domain has yet to be provided. Furthermore, recent advancements based on deep learning have brought novel algorithms for this problem. In this paper, a comprehensive survey of human pose estimation from monocular images is carried out including milestone works and recent advancements. Based on one standard pipeline for the solution of computer vision problems, this survey splits the problem into several modules: feature extraction and description, human body models, and modeling methods. Problem modeling methods are approached based on two means of categorization in this survey. One way to categorize includes top-down and bottom-up methods, and another way includes generative and discriminative methods. Considering the fact that one direct application of human pose estimation is to provide initialization for automatic video surveillance, there are additional sections for motion-related methods in all modules: motion features, motion models, and motion-based methods. Finally, the paper also collects 26 publicly available data sets for validation and provides error measurement methods that are frequently used. PMID:27898003
Ulfah, U.; Prabawanto, S.; Jupri, A.
The research aims to investigate the differences in enhancement of students’ mathematical creative thinking ability of those who received problem posing approach assisted by manipulative media and students who received problem posing approach without manipulative media. This study was a quasi experimental research with non-equivalent control group design. Population of this research was third-grade students of a primary school in Bandung city in 2016/2017 academic year. Sample of this research was two classes as experiment class and control class. The instrument used is a test of mathematical creative thinking ability. Based on the results of the research, it is known that the enhancement of the students’ mathematical creative thinking ability of those who received problem posing approach with manipulative media aid is higher than the ability of those who received problem posing approach without manipulative media aid. Students who get learning problem posing learning accustomed in arranging mathematical sentence become matter of story so it can facilitate students to comprehend about story
Tucker, Corinna Jenkins; Finkelhor, David; Shattuck, Anne M.; Turner, Heather
Objective: The goal of this study was to document the prevalence and correlates of any past year sibling victimization, including physical, property, and psychological victimization, by a co-residing juvenile sibling across the spectrum of childhood from one month to 17 years of age. Methods: The National Survey of Children's Exposure to Violence…
Georgiou, Stelios N.; Fanti, Kostas A.
The purpose of the current study was to develop and test a transactional model, based on longitudinal data, capable to describe the existing interrelation between maternal behavior and child bullying and victimization experiences over time. The results confirmed the existence of such a model for bullying, but not for victimization in terms of…
Becker-Blease, Kathryn A.; Turner, Heather A.; Finkelhor, David
In a representative sample of 2,030 U.S. children aged 2-17, 13.9% report lifetime exposure to disaster, and 4.1% report experiencing a disaster in the past year. Disaster exposure was associated with some forms of victimization and adversity. Victimization was associated with depression among 2- to 9-year-old disaster survivors, and with…
Elklit, Ask; Christiansen, Dorte M.
In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…
Frenken, Jos; Van Stolk, Bram
Interviews with 130 Dutch professionals helping incest victims and 50 adult women who were incest victims as children found that assistance was hampered by institutional distrust, inability of professionals to stop ongoing incest, frequent breaking off of contact by the young girls, professionals' shortcomings in knowledge and skills, and…
Espelage, Dorothy L.; Hong, Jun Sung; Rao, Mrinalini A.; Low, Sabina
This article reviews the extant literature on the links between peer victimization and academic performance and engagement among children and adolescents. Although most of the research on this association is based on cross-sectional investigations, research using longitudinal designs is starting to point to the fact that peer victimization does…
The Author makes a 'tour d'horizon', albeit summarized, of the problems brought about by the victim "from crime" in the exclusive picture of criminology. After defining the dogmatic relations between criminology and victimology, stating that such a (new) discipline highlights the entirety of the criminal event centering upon the dyad criminal-victim, the latest classifications of the victim viewed individually and also in his manifold relationships with the acting subject, are reviewed, in the attempt of identifying, on the basis of the various situations of victimization as they occur, if not some causal laws proper, at least some constants and some emerging lines susceptible of an in-depth analysis. After hinting to the problems brought about by the victim in the supranational prospect, and by the crimes so-called without a victim, the importance of the victim from the criminalistics and criminal execution angle, is outlined, and the Author closes up, by way of conclusion, and at the operational level, broadly hinting to the most suitable methods for the prevention and repairing in regard of the victims of crime.
Sleath, Emma; Bull, Ray
One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…
Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy
For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…
Walker, Robert; Shannon, Lisa; Logan, T. K.
Intimate partner violence victimization has been associated with serious health problems among women, including many disorders that involve sleep disturbances. However, there has been only limited examination of sleep duration among women with victimization experiences. A total of 756 women with a domestic violence order (DVO) against a male…
... child abuse. In addition, the definition clarifies that child pornography related offenses are a form of... used terms, including ``crime victim'', ``State administering agency'', ``victim of child abuse'', and... Guidelines. OVC proposes a new definition of the undefined statutory term ``child abuse'' that is intended to...
Ballard, Carol N.
Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)
Oldenburg, Beau; Barrera, Davide; Olthof, Tjeert; Goossens, Frits; van der Meulen, Matty; Vermande, Marjolijn; Aleva, Elisabeth; Sentse, Miranda; Veenstra, Rene
Using data from 2413 Dutch first-year secondary school students (M age = 13.27, SD age = 0.51, 49.0% boys), this study investigated as to what extent students who according to their self-reports had not been victimized (referred to as reporters) gave victimization nominations to classmates who
Oldenburg, Beau; Barrera, Davide; Olthof, Tjeert; Goossens, Frits; van der Meulen, Matty; Vermande, Marjolijn; Aleva, Liesbeth; Sentse, Miranda; Veenstra, René
Using data from 2413 Dutch first-year secondary school students (M age. = 13.27, SD age. = 0.51, 49.0% boys), this study investigated as to what extent students who according to their self-reports had not been victimized (referred to as reporters) gave victimization nominations to classmates who
Owens, Jennifer Gatewood
This study examines the impact of methodological features of the National Crime Victimization Survey (NCVS) on respondent willingness to report violent, serious violent, and property victimizations to the NCVS. Bounded and unbounded data from the 1999-2005 NCVS are used to create a longitudinal file of respondents, and survey-weighted logistic regression models are used to assess the factors associated with the reporting of victimization. Net of sociodemographic control variables, unbounded interviews produced higher estimates of serious violence (72%), violence (66%), and property victimization (67%). Mobile respondents reported higher estimates than nonmobile respondents of serious violence (48%), violence (35%), and property victimization (15%). Compared with in-person interviews, interviewing by telephone increased reporting for serious violence (7%), violence (12%), and property victimization (17%). This study highlights the importance of controlling for these factors in both longitudinal and cross-sectional analyses to estimate victimization risk.
Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta
In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.
Ménard, Kim S; Cox, Amanda K
Using the National Crime Victimization Survey 2006 Stalking Victimization Supplement (NCVS-SVS) and guided by Greenberg and Ruback's social influence model, this study examines the effects of individual (e.g., severity, sex, victim-offender relationship) and contextual (e.g., location) factors on stalking victimization risk, victim labeling and help seeking, and victim and third-party police contacts. Logistic regression results suggest individual and contextual characteristics matter. Consistent with prior research and the theoretical model, the positive effects of severity and sex (female) were significant across all dependent variables, whereas the interaction effect of victim-offender relationship and location held only for third-party police contacts. © The Author(s) 2015.
Full Text Available Three-dimensional (3D face models can intrinsically handle large pose face recognition problem. In this paper, we propose a novel pose-invariant face recognition method via RGB-D images. By employing depth, our method is able to handle self-occlusion and deformation, both of which are challenging problems in two-dimensional (2D face recognition. Texture images in the gallery can be rendered to the same view as the probe via depth. Meanwhile, depth is also used for similarity measure via frontalization and symmetric filling. Finally, both texture and depth contribute to the final identity estimation. Experiments on Bosphorus, CurtinFaces, Eurecom, and Kiwi databases demonstrate that the additional depth information has improved the performance of face recognition with large pose variations and under even more challenging conditions.
Morali, A.; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roelf J.
The leakage of confidential information (e.g.\\ industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the presence of cross- organization cooperation, like in the case of outsourcing. This is due to the complexity of business networks. This paper presents an IT-architecture based method for assessing a...
We propose a direct method for solving nonlinear ill-posed problems in Banach-spaces. The method is based on a stable inversion formula we explicitly compute by applying techniques for analytic functions. Furthermore, we investigate the convergence and stability of the method and prove that the derived noniterative algorithm is a regularization. The inversion formula provides a systematic sensitivity analysis. The approach is applicable to a wide range of nonlinear ill-posed problems. We test the algorithm on a nonlinear problem of travel-time inversion in seismic tomography. Numerical results illustrate the robustness and efficiency of the algorithm.
Full Text Available Aircraft presents ideal object for terrorist attack. Apart from the risks posed by possible terrorist attacks on airborne aircraft, air terrorism includes the threats to general aviation on the ground, including airports and surrounding infrastructure. Air oriented terrorism in all of its forms can undermine public confidence in the safety of air travel, which could result in negative effects for certain airlines and other firms in aviation industry due to decline in passenger travel and cargo shipment. This article is giving an overview about the redoubtable present and potential future threats posed to in-flight security, and possibilities and solutions how to mitigate the risks on acceptable level.
Lin, Jonathan Feng-Shun; Kulić, Dana
In this paper, an approach for lower-leg pose recovery from ambulatory sensors is implemented and validated in a clinical setting. Inertial measurement units are attached to patients undergoing physiotherapy. The sensor data is combined with a kinematic model within an extended Kalman filter framework to perform joint angle estimation. Anthropometric joint limits and process noise adaptation are employed to improve the quality of the joint angle estimation. The proposed approach is tested on 7 patients following total hip or knee joint replacement surgery. The proposed approach achieves an average root-mean-square error of 0.12 radians at key poses.
Duncan, Rony E; Vandeleur, Moya; Derks, Anouk; Sawyer, Susan
When confidential health care is provided to adolescents they are more likely to seek care, disclose sensitive information, and return for future visits. Guidelines for health professionals recommend seeing young people alone to facilitate confidential care. We sought to document parental views regarding confidentiality with adolescents, aiming to identify topics that parents believe they should be informed about despite an assurance of confidentiality between their child and the doctor. We also aimed to document harms and benefits that parents associate with adolescents seeing doctors alone. A sample of 86 parents attending an adolescent medicine clinic with their son/daughter was surveyed using a brief, anonymous questionnaire. Parents identified several benefits associated with confidential care, yet also believed they should be informed about a wide range of topics, even if their children did not want them to know. Parents' primary concern about confidentiality was a fear of not being informed about important information. Parental views concerning confidentiality are complex and conflicting and differ from current guidance provided to health professionals. Ensuring that parents accurately understand the limits to confidentiality and support the notion of confidential care for their children is a challenging yet vital task for health professionals. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Gold, Azgad; Strous, Rael D
Extreme intentional and deliberate violence against innocent people, including acts of terror and school shootings, poses various ethical challenges, some related to the practice of medicine. We discuss a dilemma relating to deliberate violence, in this case the aftermath of a terror attack, in which there are multiple injured individuals, including the terror perpetrator. Normally, the priority of medical treatment is determined based on need. However, in the case of a terror attack, there is reason to question this. Should the perpetrator of extreme violence receive medical treatment on the scene before the victims if he or she is designated as the most seriously injured? Or rather, should victims receive medical care priority if they are also in some life-threatening danger, although not at the same level of severity as the perpetrator? We present two opposing approaches: the conventional 'no-exceptions' approach, which gives priority to the terrorist, and the justice-oriented 'victim first' approach, which gives priority to the victims. Invoking concepts of retributive justice, distributive justice and corrective justice, this latter approach suggests that 'value-neutrality' can lead to injustice. Perpetrators of terror-like violence should be treated as an act of humanism and good ethical medical practice. However, in clear and obvious terror-like situations, to treat the perpetrators of violence before their victims may be unjust. Thus, in some specific situations, the 'victim first' approach may be considered a legitimate alternative triage policy. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Full Text Available Hannah Arendt is against the idea that Jews were only the victims of history. Starting from the idea that the Age of Enlightenment and the Jewish emancipation put the Jewish tradition and history in crisis, she is adamant that this same history is not only full of suffering, but includes a hidden tradition of activism that is important to uncover and to claim. The aim of these pages is to analyse the Arendtian thinking of the 30s and 40s in order to show some elements that can help us to understand what the loss of humanity means today and to indicate the possibilities of claiming and recovering it.
Levinson, Jay; Domb, Abraham J
Disaster Victim Identification (DVI) is a triangle, the components of which are secular law, religious law and custom and professional methods. In cases of single non-criminal deaths, identification often rests with a hospital or a medical authority. When dealing with criminal or mass death incidents, the law, in many jurisdictions, assigns identification to the coroner/medical examiner, who typically uses professional methods and only answers the religious requirements of the deceased's next-of-kin according to his personal judgment. This article discusses religious considerations regarding scientific methods and their limitations, as well as the ethical issues involved in the government coroner/medical examiner's becoming involved in clarifying and answering the next-of-kin's religious requirements.
Klaassen, C.W.J.M.; Doorman, L.M.
We interpret problem posing not as an end in itself, but as a means to add quality to students' process of learning content. Our basic tenet is that all along students know the purpose(s) of what they are doing. This condition is not easily and not often satisfied in education, as we illustrate with
Ayllón, María F.; Gómez, Isabel A.; Ballesta-Claver, Julio
This work shows the relationship between the development of mathematical thinking and creativity with mathematical problem posing and solving. Creativity and mathematics are disciplines that do not usually appear together. Both concepts constitute complex processes sharing elements, such as fluency (number of ideas), flexibility (range of ideas),…
Astronaut Linda M. Godwin, STS-59 payload commander, poses with the spacesuit she wore for launch. She will eventually wear the partial pressure suit for the entry phase of the Space Shuttle Endeavour's week and a half mission in Earth orbit.
Mahmood, Zahid; Ali, Tauseef; Khan, Samee U.
The popularity of face recognition systems have increased due to their use in widespread applications. Driven by the enormous number of potential application domains, several algorithms have been proposed for face recognition. Face pose and image resolutions are among the two important factors that
Van der Linde, Ian; Watson, Tamara
The face inversion effect, evidence that humans possess a specialized system for face processing, and the (3/4) view advantage, evidence that a canonical viewpoint exists from which faces may be optimally recognized, are two commonly cited findings in the face processing literature. In this paper, the interaction of these effects is examined in a sequential matching paradigm in which unfamiliar faces are combinatorially randomized in pose across two dimensions (roll and yaw). Using large numbers of poses, trials and face stimuli, two experiments were conducted in which pose was either jointly or independently randomized between intervals. Results include that performance was modulated in a continuous fashion as each dimension was manipulated, that an offset-specific (3/4) advantage exists, that both specific study and test pose affect recognition, and that, for like offset, yaw rotation is more deleterious to performance than roll rotation. Response bias effects included that matched or reflective yaw led observers to employ a more liberal criterion.
Reilink, Rob; Stramigioli, Stefano; Misra, Sarthak
A system is developed that can reconstruct the pose of flexible endoscopic instruments that are used in ad- vanced flexible endoscopes using solely the endoscopic images. Four markers are placed on the instrument, whose positions are measured in the image. These measurements are compared to a
This article reports on lessons about climate change which pose many challenges for science teachers. The natural world today offers a broad--and dire--catalog of scientific phenomena for teachers wanting to craft classroom lessons on the topic of climate change. As public concern about global warming increases, teachers are carving out a larger…
Livestock's contribution to climate change is now an established fact and closeness of livestock to human beings in urban areas portends many health and environmental implications. The study ascertained farmer's perception of health and environmental hazards posed by livestock keeping in Enugu Urban, Nigeria and its ...
Mahendra, R.; Slamet, I.; Budiyono
One of the difficulties of students in the learning of geometry is on the subject of plane that requires students to understand the abstract matter. The aim of this research is to determine the effect of Problem Posing learning model with Realistic Mathematics Education Approach in geometry learning. This quasi experimental research was conducted in one of the junior high schools in Karanganyar, Indonesia. The sample was taken using stratified cluster random sampling technique. The results of this research indicate that the model of Problem Posing learning with Realistic Mathematics Education Approach can improve students’ conceptual understanding significantly in geometry learning especially on plane topics. It is because students on the application of Problem Posing with Realistic Mathematics Education Approach are become to be active in constructing their knowledge, proposing, and problem solving in realistic, so it easier for students to understand concepts and solve the problems. Therefore, the model of Problem Posing learning with Realistic Mathematics Education Approach is appropriately applied in mathematics learning especially on geometry material. Furthermore, the impact can improve student achievement.
Sugito; E. S., Sri Mulyani; Hartono; Supartono
This study was to explore how enhance communication skill through problem posing and presentation method. The subjects of this research were the seven grade students Junior High School, including 20 male and 14 female. This research was conducted in two cycles and each cycle consisted of four steps, they were: planning, action, observation, and…
da Ponte, Joao Pedro; Henriques, Ana
This paper reports a classroom-based study involving investigation activities in a university numerical analysis course. The study aims to analyse students' mathematical processes and to understand how these activities provide opportunities for problem posing. The investigations were intended to stimulate students in asking questions, to trigger…
Lee, Andrew; Casasent, David
An optical neural network architecture and algorithm based on a Hopfield optimization network are presented for multitarget tracking. This tracker utilizes a neuron for every possible target track, and a quadratic energy function of neural activities which is minimized using gradient descent neural evolution. The neural net tracker is demonstrated as part of a system for determining position and orientation (pose) of spinning satellites with respect to a robotic spacecraft. The input to the system is time sequence video from a single camera. Novelty detection and filtering are utilized to locate and segment novel regions from the input images. The neural net multitarget tracker determines the correspondences (or tracks) of the novel regions as a function of time, and hence the paths of object (satellite) parts. The path traced out by a given part or region is approximately elliptical in image space, and the position, shape and orientation of the ellipse are functions of the satellite geometry and its pose. Having a geometric model of the satellite, and the elliptical path of a part in image space, the three-dimensional pose of the satellite is determined. Digital simulation results using this algorithm are presented for various satellite poses and lighting conditions.
H. Dibeklioğ lu; A.A. Salah (Albert Ali); L. Akarun
htmlabstractAutomatic localization of 3D facial features is important for face recognition, tracking, modeling and expression analysis. Methods developed for 2D images were shown to have problems working across databases acquired with different illumination conditions. Expression variations, pose
Niemi, Laura; Young, Liane
Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.
Ćopić Sanja M.
Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.
Beskow, Laura M.; Check, Devon K.; Namey, Emily E.; Dame, Lauren A.; Lin, Li; Cooper, Alexandra; Weinfurt, Kevin P.; Wolf, Leslie E.
Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants’ privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public’s health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders’ views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB) chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions’ use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or ‘unsure’. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an ‘extra layer’ of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to
SABAU-POPA CLAUDIA DIANA
Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the
Berman Jules J
Full Text Available Abstract Background Medical researchers often need to share clinical data without violating patient confidentiality. Threshold cryptographic protocols divide messages into multiple pieces, no single piece containing information that can reconstruct the original message. The author describes and implements a novel threshold protocol that can be used to search, annotate or transform confidential data without breaching patient confidentiality. Methods The basic threshold protocol is: 1 Text is divided into short phrases; 2 Each phrase is converted by a one-way hash algorithm into a seemingly-random set of characters; 3 Threshold Piece 1 is composed of the list of all phrases, with each phrase followed by its one-way hash; 4 Threshold Piece 2 is composed of the text with all phrases replaced by their one-way hash values, and with high-frequency words preserved. Neither Piece 1 nor Piece 2 contains information linking patients to their records. The original text can be re-constructed from Piece 1 and Piece 2. Results The threshold algorithm produces two files (threshold pieces. In typical usage, Piece 2 is held by the data owner, and Piece 1 is freely distributed. Piece 1 can be annotated and returned to the owner of the original data to enhance the complete data set. Collections of Piece 1 files can be merged and distributed without identifying patient records. Variations of the threshold protocol are described. The author's Perl implementation is freely available. Conclusions Threshold files are safe in the sense that they are de-identified and can be used for research purposes. The threshold protocol is particularly useful when the receiver of the threshold file needs to obtain certain concepts or data-types found in the original data, but does not need to fully understand the original data set.
Fleming, Thomas R
There is compelling evidence supporting the importance of maintaining confidentiality of interim data in clinical trials designed to reliably address the benefit-to-risk profile of interventions. While this is widely recognized, creative approaches are needed to achieve this in challenging settings where interim data are released for regulatory review and action, even though the trial would be continued to address its primary hypothesis. An illustration is the recently emerging setting of cardiovascular safety trials in type 2 diabetes mellitus. At the first stage of such trials, if large relative increases in cardiovascular major morbidity/mortality can be ruled out, data can be released solely for the purpose of allowing regulatory decision making about marketing approval. The trial is then continued in the post-marketing setting to address the primary hypothesis regarding whether smaller relative increases can be ruled out. Active rather than passive approaches are needed to protect the integrity of cardiovascular safety trials. Given the importance to trial integrity of maintaining confidentiality of interim data such as the estimated relative effect on cardiovascular risk, a Data Access Plan should be in place in these trials to ensure such data are not revealed to study participants and their caregivers, investigators involved in trial conduct, the sponsor's management team, and the public, until trial completion. A Performance Standards Document also should be developed to pre-specify targeted and minimally acceptable levels for recruitment rate, best real-world achievable adherence, avoidance of cross-ins, and retention rate. This document should specify creative approaches for achieving these targets, oversight procedures during trial conduct to monitor performance levels, and actions to be taken if emerging data indicate minimally acceptable levels are not being reached. In settings where meaningful breaches in confidentiality have occurred, such
Smid, Wineke; Schepers, Klaartje; Kamphuis, Jan Henk; van Linden, Sabine; Bartling, Sarah
The growing number of notifications for child pornography (CP) possession constitutes a capacity problem for police forces entrusted with the investigation of these offenses. Notifications of CP offenses in which the investigation reveals concurrent direct victimization, in the form of contact offenses, grooming, online offending, or the production of CP material, form a potential target group for prioritization. The first of the twofold aims of this study was to validate the occurring distinction between mixed suspects (i.e., CP possession suspects who were also ever associated with direct victimization) and CP-only suspects (i.e., CP possession suspects who were never associated with direct victimization) to predict an outcome of the investigation including direct victimization. The second aim was to explore variables related to direct victimization among CP-only suspects. A total of 150 files of police investigations into notifications for CP offenses were studied. Findings confirmed significantly greater prevalence of direct victimization as an outcome of the investigation among mixed suspects than CP-only suspects (90% vs. 10%). Among CP-only suspects, direct victimization was predicted by (a) prior police contacts, charges, or convictions concerning noncontact sexual offending, (b) the confiscation of more than two computers during the house search, and (c) a more serious nature of the CP material that formed the basis for the notification in terms of younger victims and more extreme content. These variables may point to a small subgroup of heavily invested CP offenders who are at a higher risk to cross the line to direct victimization. Cross-validation of these preliminary findings is indicated. © The Author(s) 2014.
Women often seek midwifery care as an alternative to the maternity services that are readily available within the insured health care system in Alberta. Some aspects of community-based, primary care midwifery in Alberta that characterize this alternative are the use of story-telling as a form of knowledge, the development of social connections among women seeking midwifery care, and nonauthoritarian relationships between midwives and women. In this paper, the concept of confidentiality, as it relates to these aspects of midwifery practice, is explored, using traditional, caring and feminist models of ethics.
Wegscheider, Karl; Friede, Tim
Confidentiality and informed consent are important concepts enabling the sharing of sensitive data. In a paper on this topic of this issue, Williams and Pigeot () discuss that these have to be balanced with openness to ensure research standards. In this opinion paper, we give some background on how the paper by Williams and Pigeot evolved, reflect on their concepts, and provide some examples of the application of these concepts in various settings relevant to biostatisticians working in health research. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M
Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.
Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.
This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…
Cramer, Robert J; McNiel, Dale E; Holley, Sarah R; Shumway, Martha; Boccellari, Alicia
The present study investigates victim sexual orientation in a sample of 641 violent crime victims seeking emergency medical treatment at a public-sector hospital. Victim sexual orientation was examined as it: (a) varies by type of violent crime and demographic characteristics, (b) directly relates to psychological symptoms, and (c) moderates the relationship between victim and crime characteristics (i.e., victim gender, victim trauma history, and type of crime) and psychological symptoms (i.e., symptoms of acute stress, depression, panic, and general anxiety). Results showed that lesbian, gay, bisexual, and transgender (LGBT) victims were more likely to be victims of sexual assault. Heterosexual victims were more likely to be victims of general assault and shootings. LGBT victims demonstrated significantly higher levels of acute stress and general anxiety. Moreover, victim sexual orientation moderated the association of type of crime with experience of panic symptoms. Also, victim sexual orientation moderated the relation of victim trauma history and general anxiety symptoms. Results are discussed in relation to victimization prevalence rates, sexual prejudice theory, and assessment and treatment of violent crime victims.
Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving
To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....
Blake, Jamilia J.; Kim, Eun Sook; Sohn McCormick, Anita L.; Hayes, DeMarquis
The purpose of the current study was to examine the dimensionality of social victimization and to assess the relation between social victimization and classmate social support in a sample of 260 students. Confirmatory factor analyses yielded four dimensions of peer victimization: overt, verbal social, and nonverbal social victimization and peer…
Lichtenstein, J.E.; Madewell, J.E.
Radiology is assuming an increasingly important role in the investigation of casualty victims. Radiographic screening for foreign bodies, personal effects, dental and surgical artifacts and occult skeletal injury has long been an established technique in forensic medicine. Positive radiographic identification of the victims by comparison with antemortem films and records in a more recent, important development. Large scale radiographic investigations may require improvised facilities posing unaccustomed technical and logistical problems. Radiologic experience gained from aviation accident investigation is found to apply in other casualty situations as well as in individual fatality investigations. Radiologic data may aid determination of the cause of incidents, resulting in improved safety procedures and design, as well as serving humanitarian and forensic functions.
Balamurugan, A M; Sivasubramanian, A
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.
A. M. Balamurugan
Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.
Rosen, Lisa H; Underwood, Marion K; Beron, Kurt J; Gentsch, Joanna K; Wharton, Michelle E; Rahdar, Ahrareh
This study examined self-reports of social victimization and parent reports of adjustment for a sample followed from fourth through seventh grades. Different patterns of social victimization experiences were identified; of the 153 students (79 girls) with complete data, 24% reported chronic social victimization, 23% reported transient experiences of social victimization, and 53% reported being socially victimized at no more than one time point. We examined whether students who experienced persistent and periodic social victimization were at greater risk for internalizing problems than nonvictims. Persistently victimized children demonstrated continuously elevated levels of internalizing problems. Children who were not originally victimized by social aggression but became victimized with time did not demonstrate higher levels of internalizing problems than did nonvictims. Findings were mixed for those who escaped social victimization during this period.
Cook, Carrie L; Fox, Kathleen A
Fear of crime research has primarily focused on fear of crime in general or on fear of specific types of violent crimes. This study builds from this line of research by focusing exclusively on the night fear of six types of property crimes, including fear of burglary while away from home, vehicle theft, bicycle theft, property theft, vandalism, and vehicle burglary. This study examines the effects of victimization, vicarious victimization, and perceived risk on fear of property crime. Survey data from college students reveal that victimization and vicarious victimization were not significant predictors of fear of property crime, whereas perceived risk was a consistent and significant predictor of fear of all property crimes.
Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.
... business information. 1552.235-71 Section 1552.235-71 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-71 Treatment of confidential business information. As prescribed in 1535.007-70(b... determined that in the performance of a contract, EPA may furnish confidential business information to the...
... business information. 1552.235-80 Section 1552.235-80 Federal Acquisition Regulations System ENVIRONMENTAL... Clauses 1552.235-80 Access to confidential business information. As prescribed in 1535.007-70(g), insert the following clause. Access to Confidential Business Information (OCT 2000) It is not anticipated...
... Business Information (APR 1996). 1552.235-76 Section 1552.235-76 Federal Acquisition Regulations System... Provisions and Clauses 1552.235-76 Treatment of Confidential Business Information (APR 1996). As prescribed in 1535.007-70(c), insert the following clause: Treatment of Confidential Business Information (TSCA...
Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras
To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....
Williams, Rhonda L.; Wehrman, Joseph D.
Student confidentiality can create challenges for both school counselors and administrators. The article addresses historical and ethical issues surrounding confidentiality in schools as well as methods of working toward collaboration. Developing an understanding of one another's ethical, legal, and professional responsibilities can lead to a…
Confidentiality presents particular challenges to practitioners working with young people, on account of the latter's vulnerability and emotional immaturity. Ethical codes place a key importance on confidentiality, from deontological and teleological perspectives. However, young clients may rely on a more pragmatic approach in deciding whether to…
Wong, Sabrina T; Lavoie, Josee G; Browne, Annette J; MacLeod, Martha L P; Chongo, Meck
Group medical visits (GMVs), clinical encounters with a medical component delivered to groups of patients, have emerged as an innovative approach to potentially increasing efficiency while enhancing the quality of primary health care (PHC). GMVs have created the need to pay explicit attention to patient confidentiality. What strategies are used by providers and patients to address issues of confidentiality within GMVs? In-depth interviews were conducted with 34 PHC providers and 29 patients living in nine rural communities in British Columbia, Canada. Data were analysed using interpretive thematic analysis and a relational autonomy approach. We found three main themes: (i) choosing to disclose: balancing benefits and drawbacks of GMVs, (ii) maintaining confidentiality in GMVs and (iii) gaining strength from interdependent relationships: patients learning from each other. Confidentiality can be addressed and was not a major concern for patients attending or providers facilitating GMVs in these rural communities. Patients adopted strategies to address their own and others' concerns related to confidential health information. Providers used multiple strategies to maintain confidentiality within the group, including renegotiating what information is shared and providing examples of what information ought to be kept confidential. Although GMVs are not for all patients, a relational autonomy approach is useful in drawing attention to the context and structures which may influence their patients' ability to act autonomously. Successful delivery of GMVs requires both patients and providers to negotiate between maintaining confidentiality and an appropriate level of disclosure. © 2013 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
Stone, Carolyn; Isaacs, Madelyn L.
Investigated school counselors' attitudes toward breaching confidentiality before and after the 1999 Columbine High School shootings. Surveys of demographically similar counselors indicated that the Columbine shootings affected counselors' predictions about their attitudes and behavior regarding confidentiality. Counselors were more reluctant to…
Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara
The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Custody of and denial of public access to confidential reports. 2634.604 Section 2634.604 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT... § 2634.604 Custody of and denial of public access to confidential reports. (a) Any report filed with an...
... Confidentiality, security, and integrity of personal information collected from children. The operator must... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE...
... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information....39 In camera treatment of confidential information. (a) Definition. Except as hereinafter provided... protective orders or orders granting in camera treatment are not made part of the public record and are kept...
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information; furnishing of... NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL AND BILATERAL SAFEGUARD ACTIONS, MARKET DISRUPTION, TRADE DIVERSION, AND REVIEW OF RELIEF ACTIONS General § 206.7 Confidential business information...
Yates, Alayne; And Others
Child victims of incest were judged to have more poorly developed impulse controls, a defensive structure which emphasizes repression, and were significantly more variable in the degree to which they expressed sexual features in the drawings. (Author/CL)
Boatman, Bonny; And Others
Reviews three treatment methods (individual, group, and family therapy) used over a five-year period for child incest victims. Presents common themes, issues, and pitfalls that arose during therapy. Stresses potential benefits of psychotherapy to this population. (Author)
Younes, Georges; Asmar, Daniel; Elhajj, Imad; Al-Harithy, Howayda
In recent years, agencies around the world have invested huge amounts of effort toward digitizing many aspects of the world's cultural heritage. Of particular importance is the digitization of outdoor archaeological sites. In the spirit of valorization of this digital information, many groups have developed virtual or augmented reality (AR) computer applications themed around a particular archaeological object. The problem of pose tracking in outdoor AR applications is addressed. Different positional systems are analyzed, resulting in the selection of a monocular camera-based user tracker. The limitations that challenge this technique from map generation, scale, anchoring, to lighting conditions are analyzed and systematically addressed. Finally, as a case study, our pose tracking system is implemented within an AR experience in the Byblos Roman theater in Lebanon.
Speidel, S.; Krappe, S.; Röhl, S.; Bodenstedt, S.; Müller-Stich, B.; Dillmann, R.
Minimally invasive surgery is a highly complex medical discipline with several difficulties for the surgeon. To alleviate these difficulties, augmented reality can be used for intraoperative assistance. For visualization, the endoscope pose must be known which can be acquired with a SLAM (Simultaneous Localization and Mapping) approach using the endoscopic images. In this paper we focus on feature tracking for SLAM in minimally invasive surgery. Robust feature tracking and minimization of false correspondences is crucial for localizing the endoscope. As sensory input we use a stereo endoscope and evaluate different feature types in a developed SLAM framework. The accuracy of the endoscope pose estimation is validated with synthetic and ex vivo data. Furthermore we test the approach with in vivo image sequences from da Vinci interventions.
Full Text Available Identification of robot kinematic errors during the calibration process often requires accurate full pose measurements (position and orientation of robot end-effectors in Cartesian space. This paper proposes a new method of full pose measurement of robot end-effectors for calibration. This method is based on an analysis of the features of a set of target points (placed on a rotating end-effector on a circular trajectory. The accurate measurement is validated by computational simulation results from the Puma robot. Moreover, experimental calibration and validation results for the Hyundai HA-06 robot prove the effectiveness, correctness, and reliability of the proposed method. This method can be applied to robots that have entirely revolute joints or to robots for which only the last joint is revolute.
De Chiara, Giovanna
2012-2013 In recent years, the disasters caused by landslides tragically increased due to the demographic growth and the indiscriminate use of land. Among the different types of landslides, flow-like phenomena - often simultaneously affecting large areas - are associated with the most catastrophic consequences in terms of loss of human life and economic damage. Understanding, forecasting and controlling the risk posed by flow-like phenomena are now recognised to be a priority for the sa...
Hietanen, Antti; Halme, Jussi; Buch, Anders Glent
We propose two methods to robustify point correspondence based 6D object pose estimation. The first method, curvature filtering, is based on the assumption that low curvature regions provide false matches, and removing points in these regions improves robustness. The second method, region pruning....... For the experiments, we evaluated three correspondence selection methods, Geometric Consistency (GC) , Hough Grouping (HG)  and Search of Inliers (SI)  and report systematic improvements for their robustified versions with two distinct datasets....
Scherzer, Otmar; Kaltenbacher, Barbara
Nonlinear inverse problems appear in many applications, and typically they lead to mathematical models that are ill-posed, i.e., they are unstable under data perturbations. Those problems require a regularization, i.e., a special numerical treatment. This book presents regularization schemes which are based on iteration methods, e.g., nonlinear Landweber iteration, level set methods, multilevel methods and Newton type methods.
Tzionas, Dimitrios; Gall, Juergen
Benchmarking methods for 3d hand tracking is still an open problem due to the difficulty of acquiring ground truth data. We introduce a new dataset and benchmarking protocol that is insensitive to the accumulative error of other protocols. To this end, we create testing frame pairs of increasing difficulty and measure the pose estimation error separately for each of them. This approach gives new insights and allows to accurately study the performance of each feature or method without employin...
ELEMENT. PROIECT. TASK Artificial Inteligence Laboratory AE OKUI UBR 545 Technology Square Cambridge, MA 021.39 11. CONTROLLING OFFICE NAME AND ADDRESS 12...AD-Ali65 912 SENSING STRATEGIES FOR DISAMBIGURTING MONG MULTIPLE 1/1 OBJECTS IN KNOWN POSES(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL ...or Dist Special 1 ’ MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY A. I. Memo 855 August, 1985 Sensing Strategies for
Garandeau, Claire F.; Lee, Ihno A.; Salmivalli, Christina
Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children's social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for children who remain victimized. Data were collected at…
Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.
This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future incidents of cyberbullying. The buddy interacts with the victim in three stages: first the child communicates her emotional state, next the buddy gathers information about the situation at hand, then the b...
This paper discusses (1) how my own interest in the treatment of sexual assualt victims developed and how I view the scope of this problem; (2) myths and facts about sexual assault; (3) common reactions of those who work with rape victims; (4) the rape trauma syndrome; (5) an approach to immediate and short-term treatment; and (6) the long-term effects of sexual assault and related treatment issues.
Van Blyderveen, Sherry Lynn
Peer victimization is an issue which has recently received considerable attention from the media, the school system, and academic literature. The present study examines a number of expected correlates, both risk factors and outcomes, of peer victimization through the use of the Adolescent Health Survey - II conducted by the McCreary Centre Society in the province of British Columbia. Approximately 25,800 youth, from grades 7 through 12, from various regions of the province completed the quest...
Gisel Viviana Osorio-Cuellar
Full Text Available Abstract Given the context and the number of armed conflict victims in the Colombian Pacific coast and their difficulties to access psycho-social care, Narrative Community-based Group Therapy appears as a viable mental health intervention. The objective of this study is to describe the process of implementation and results of the intervention in Afro-Colombian victims of violence, in the municipalities of Buenaventura and Quibdó. More specifically, we will be looking at the perspectives of workers and supervisors, through evaluative case studies and individual in-depth interviews. The therapy allows us to identify support and coping systems through coexistence, communication and interaction. It requires an adaptation process to the diversity of knowledge and expressions of victims of Colombian violence, greater empathy from care providers and rigor in their profiles selection, facilities ensuring security and confidentiality, and links with other educational, employment and recreational organizations. It is important to include these results while improving current and future intervention processes.
Osorio-Cuellar, Gisel Viviana; Pacichana-Quinayáz, Sara Gabriela; Bonilla-Escobar, Francisco Javier; Fandiño-Losada, Andrés; Gutiérrez-Martinez, Maria Isabel
Given the context and the number of armed conflict victims in the Colombian Pacific coast and their difficulties to access psycho-social care, Narrative Community-based Group Therapy appears as a viable mental health intervention. The objective of this study is to describe the process of implementation and results of the intervention in Afro-Colombian victims of violence, in the municipalities of Buenaventura and Quibdó. More specifically, we will be looking at the perspectives of workers and supervisors, through evaluative case studies and individual in-depth interviews. The therapy allows us to identify support and coping systems through coexistence, communication and interaction. It requires an adaptation process to the diversity of knowledge and expressions of victims of Colombian violence, greater empathy from care providers and rigor in their profiles selection, facilities ensuring security and confidentiality, and links with other educational, employment and recreational organizations. It is important to include these results while improving current and future intervention processes.
Gonzalez-Pacheco, Victor; Malfaz, Maria; Fernandez, Fernando; Salichs, Miguel A.
The main activity of social robots is to interact with people. In order to do that, the robot must be able to understand what the user is saying or doing. Typically, this capability consists of pre-programmed behaviors or is acquired through controlled learning processes, which are executed before the social interaction begins. This paper presents a software architecture that enables a robot to learn poses in a similar way as people do. That is, hearing its teacher's explanations and acquiring new knowledge in real time. The architecture leans on two main components: an RGB-D (Red-, Green-, Blue- Depth) -based visual system, which gathers the user examples, and an Automatic Speech Recognition (ASR) system, which processes the speech describing those examples. The robot is able to naturally learn the poses the teacher is showing to it by maintaining a natural interaction with the teacher. We evaluate our system with 24 users who teach the robot a predetermined set of poses. The experimental results show that, with a few training examples, the system reaches high accuracy and robustness. This method shows how to combine data from the visual and auditory systems for the acquisition of new knowledge in a natural manner. Such a natural way of training enables robots to learn from users, even if they are not experts in robotics. PMID:24048336
Miguel A. Salichs
Full Text Available The main activity of social robots is to interact with people. In order to do that, the robot must be able to understand what the user is saying or doing. Typically, this capability consists of pre-programmed behaviors or is acquired through controlled learning processes, which are executed before the social interaction begins. This paper presents a software architecture that enables a robot to learn poses in a similar way as people do. That is, hearing its teacher’s explanations and acquiring new knowledge in real time. The architecture leans on two main components: an RGB-D (Red-, Green-, Blue- Depth -based visual system, which gathers the user examples, and an Automatic Speech Recognition (ASR system, which processes the speech describing those examples. The robot is able to naturally learn the poses the teacher is showing to it by maintaining a natural interaction with the teacher. We evaluate our system with 24 users who teach the robot a predetermined set of poses. The experimental results show that, with a few training examples, the system reaches high accuracy and robustness. This method shows how to combine data from the visual and auditory systems for the acquisition of new knowledge in a natural manner. Such a natural way of training enables robots to learn from users, even if they are not experts in robotics.