WorldWideScience

Sample records for voluntary anonymous non-punitive

  1. Exploration of Non-punitive Strategies for Medication Error Administration%治理用药差错的非惩罚性策略探讨

    Institute of Scientific and Technical Information of China (English)

    陈金秀; 秦玉花; 赵红卫; 张伟; 陈琪; 黄文广

    2012-01-01

    OBJECTIVE: To explore non-punitive strategies of administering medication error, and to promote safety of drug use in patients. METHODS: The traditional handling method and malpractice of medication error were analyzed, and the content of medication safety culture and countermeasures were introduced. RESULTS & CONCLUSIONS: Medication safety culture included the establishment of non-punitive share culture, and analysis of reasons for medication error but no punishment, etc. Medical personnel could report medication error and non-error event with voluntary, active, positive and true attitude; the protection of patients medication safety was maximized. A sound and effective medication error reporting system is the countermeasure of non-punitive strategies of administering medication error.%目的:探讨治理用药差错的非惩罚性策略,促进患者用药安全.方法:对用药差错的传统处理方法和弊端进行分析,介绍非惩罚性策略涉及的用药安全文化的内容及相关措施.结果:用药安全文化表现为建立无惩罚的差错分享文化、出现用药差错时重点是分析事由而不是惩罚等,促使医务人员能够自愿、主动、积极、真实地报告用药差错及非差错性事件,最大限度保护患者的用药安全;非惩罚性策略的措施即倡导建立完善、有效的用药差错报告系统.

  2. Medical students' education on organ donation and its evaluation during six consecutive years: results of a voluntary, anonymous educational intervention study.

    Science.gov (United States)

    Radunz, Sonia; Benkö, Tamás; Stern, Sabrina; Saner, Fuat H; Paul, Andreas; Kaiser, Gernot M

    2015-03-12

    One of the main reasons for organ shortage is insufficient education on organ donation. Knowledgeable medical students could share the information with friends and families resulting in a positive attitude to organ donation of the general public. During six consecutive years (2009 to 2014), we conducted a voluntary, anonymous educational intervention study on organ donation among fourth year medical students in the course of the main surgery lecture at the University of Essen, Germany. Questionnaires of 383 students were analyzed. Prior to the specific lecture on organ donation, 64% of the students carried a signed organ donor card with the intention to donate. Further information regarding organ donation was required by 37% of the students. The request for further information was statistically significantly higher among students without a donor card compared to organ donor card carriers (P organ donation and improves their attitude to organ donation. Continued training on organ donation will help medical students to become disseminators for this important topic in our society.

  3. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  4. Anonymous Gossiping

    OpenAIRE

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping me...

  5. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  6. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  7. Anonymity in voting revisited

    NARCIS (Netherlands)

    Jonker, Hugo; Pieters, Wolter; Chaum, David; Jakobsson, Markus; Rivest, Ronald L.; Ryan, Peter Y.A.; Benaloh, Josh; Kutylowski, Miroslaw; Adida, Ben

    2010-01-01

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in

  8. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  9. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  10. Anonymity in Voting Revisited

    Science.gov (United States)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  11. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  12. An Anonymity Revocation Technology for Anonymous Communication

    Science.gov (United States)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  13. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  14. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  15. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup;

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...

  16. Deniable Anonymous Group Authentication

    Science.gov (United States)

    2014-02-13

    electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84–88, February 1981. [16] D. Chaum. Blind signatures for...ASIACRYPT, 2004. [59] P. P. Tsang and V. K. Wei. Short linkable ring signatures for e- voting , e-cash and attestation. In ’05 ISPEC, 2005. [60] D. I...which we term anonymity, proportionality, forward anonymity, and deniability. Like ring signatures [50], DAGA allows a user to au- thenticate as an

  17. Anonymous Quantum Communication

    Science.gov (United States)

    Brassard, Gilles; Broadbent, Anne; Fitzsimons, Joseph; Gambs, Sébastien; Tapp, Alain

    We introduce the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).

  18. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  19. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the first...... formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  20. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the rst...... formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  1. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  2. The Metadata Anonymization Toolkit

    OpenAIRE

    Voisin, Julien; Guyeux, Christophe; Bahi, Jacques M.

    2012-01-01

    This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \\emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right balance between information lost and privacy enhancement. Finally, the specification of the Metadat...

  3. The Metadata Anonymization Toolkit

    OpenAIRE

    2012-01-01

    This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \\emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right balance between information lost and privacy enhancement. Finally, the specification of the Metadat...

  4. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  5. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  6. Probabilistic Anonymity and Admissible Schedulers

    CERN Document Server

    Garcia, Flavio D; Sokolova, Ana

    2007-01-01

    When studying safety properties of (formal) protocol models, it is customary to view the scheduler as an adversary: an entity trying to falsify the safety property. We show that in the context of security protocols, and in particular of anonymizing protocols, this gives the adversary too much power; for instance, the contents of encrypted messages and internal computations by the parties should be considered invisible to the adversary. We restrict the class of schedulers to a class of admissible schedulers which better model adversarial behaviour. These admissible schedulers base their decision solely on the past behaviour of the system that is visible to the adversary. Using this, we propose a definition of anonymity: for all admissible schedulers the identity of the users and the observations of the adversary are independent stochastic variables. We also develop a proof technique for typical cases that can be used to proof anonymity: a system is anonymous if it is possible to `exchange' the behaviour of two...

  7. Analysis and countermeasures of the 282 cases of nursing adverse events with non-punitive network reported%282例非惩罚性网络上报护理不良事件的分析与对策

    Institute of Scientific and Technical Information of China (English)

    韩美玲; 王芳; 徐淑华; 陈芹; 吴菲菲

    2015-01-01

    目的:通过对282例非惩罚性网络上报护理不良事件的分析,了解护理不良事件发生的特点,并制定对策,以减少护理不良事件的发生。方法回顾性分析2013年6月—2014年6月网络上报的282例非惩罚性护理不良事件,对其进行总结、分析,探讨护理不良事件的发生特点、原因、年龄段与护士层级的关系。结果282例护理不良事件中无后果事件(Ⅲ级)占67.38%,隐患事件(Ⅳ级)占26.95%。23:00—8:00发生的护理不良事件占26.60%。警告事件(Ⅰ级)中33.3%发生在15:00—23:00、66.7%发生在23:00—8:00。发生不良事件的时间段主要集中在8:00—15:00,占52.84%(149/282)。护士层级发生不良事件的比例最高,占59.93%(169/282)。发生护理不良事件的患者年龄分布中,>60岁患者占49.29%。护理不良事件发生的原因中未严格执行查对制度占30.85%,缺乏责任心占24.11%,风险意识不强占23.76%。结论实行网络上报非惩罚性护理不良事件后,各护理单元不良事件的主动上报意识明显加强,护士层级发生不良事件的比例较高,>60岁住院患者发生率较高,警告事件(Ⅰ级)多在15:00—8:00发生。应加强年轻护士培训、老年住院患者管理及15:00—8:00的护士值班管理,以减少护理不良事件的发生。%Objective To understand the characteristics of the nursing adverse events through analysis the 282 cases of nursing adverse events, and make countermeasures to reduce the incidence of adverse events. Methods A total of 282 nursing adverse events of non-punitive network reported were collected from June 2013 to June 2014 with retrospective analysis, then we analyzed and summarized them, in order to find out the relationship between occurred characteristics, reasons, age group with the nurse hierarchy, etc. Results No consequence nursing adverse events (levelⅢ) accounted for 67. 38% of all events cases, while potential hazard

  8. Voluntary Slavery

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2014-06-01

    Full Text Available The permissibility of actions depends upon facts about the flourishing and separateness of persons. Persons differ from other creatures in having the task of discovering for themselves, by conjecture and refutation, what sort of life will fulfil them. Compulsory slavery impermissibly prevents some persons from pursuing this task. However, many people may conjecture that they are natural slaves. Some of these conjectures may turn out to be correct. In consequence, voluntary slavery, in which one person welcomes the duty to fulfil all the commands of another, is permissible. Life-long voluntary slavery contracts are impermissible because of human fallibility; but fixed-term slavery contracts should be legally enforceable. Each person has the temporarily alienable moral right to direct her own life.

  9. Voluntary Slavery

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2014-06-01

    Full Text Available The permissibility of actions depends upon facts about the flourishing and separateness of persons. Persons differ from other creatures in having the task of discovering for themselves, by conjecture and refutation, what sort of life will fulfil them. Compulsory slavery impermissibly prevents some persons from pursuing this task. However, many people may conjecture that they are natural slaves. Some of these conjectures may turn out to be correct. In consequence, voluntary slavery, in which one person welcomes the duty to fulfil all the commands of another, is permissible. Life-long voluntary slavery contracts are impermissible because of human fallibility; but fixed-term slavery contracts should be legally enforceable. Each person has the temporarily alienable moral right to direct her own life.

  10. Alcoholics Anonymous: cult or cure?

    Science.gov (United States)

    Vaillant, George E

    2005-06-01

    To discuss the mechanism of action, the efficacy and the safety of Alcoholics Anonymous (AA) in the treatment of alcoholism. The published works on effective treatments for alcoholism is briefly reviewed and a prospective multidisciplinary follow-up of recovery from alcoholism in two community cohorts of adolescent males followed from 1940 until the present day is reviewed. The suggested mechanism of action of AA is that it employs four factors widely shown to be effective in relapse prevention in addictions: external supervision, substitute dependency, new caring relationships and increased spirituality. In addition, AA serendipitously follows the principles of cognitive behaviour therapy in relapse prevention. Alcoholics Anonymous appears equal to or superior to conventional treatments for alcoholism, and the skepticism of some professionals regarding AA as a first rank treatment for alcoholism would appear to be unwarranted. Alcoholics Anonymous is probably without serious side-effects.

  11. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  12. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...

  13. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...

  14. Movement Data Anonymity through Generalization

    Directory of Open Access Journals (Sweden)

    Anna Monreale

    2010-08-01

    Full Text Available Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the movements of people and vehicles, producing society-wide mobility databases. This is a challenging scenario for data analysis and mining. On the one hand, exciting opportunities arise out of discovering new knowledge about human mobile behavior, and thus fuel intelligent info-mobility applications. On other hand, new privacy concerns arise when mobility data are published. The risk is particularly high for GPS trajectories, which represent movement of a very high precision and spatio-temporal resolution: the de-identification of such trajectories (i.e., forgetting the ID of their associated owners is only a weak protection, as generally it is possible to re-identify a person by observing her routine movements. In this paper we propose a method for achieving true anonymity in a dataset of published trajectories, by defining a transformation of the original GPS trajectories based on spatial generalization and k-anonymity. The proposed method offers a formal data protection safeguard, quantified as a theoretical upper bound to the probability of re-identification. We conduct a thorough study on a real-life GPS trajectory dataset, and provide strong empirical evidence that the proposed anonymity techniques achieve the conflicting goals of data utility and data privacy. In practice, the achieved anonymity protection is much stronger than the theoretical worst case, while the quality of the cluster analysis on the trajectory data is preserved.

  15. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu

  16. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  17. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  18. A review of Alcoholics Anonymous/ Narcotics Anonymous programs for teens.

    Science.gov (United States)

    Sussman, Steve

    2010-03-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/ NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed.

  19. Computing on Anonymous Quantum Network

    CERN Document Server

    Kobayashi, Hirotada; Tani, Seiichiro

    2010-01-01

    This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions (without intermediate measurements for a distributed and superposed input), if the number of parties is given to every party. A corollary of this result is a more efficient quantum leader election algorithm than existing ones: the new quantum algorithm runs in O(n) rounds with bit complexity O(mn^2), on an anonymous quantum network with n parties and m communication links. Another corollary is the first quantum algorithm that exactly computes any computable Boolean function with round complexity O(n) and with smaller bit complexity than that of existing classical algorithms in the worst case over all (computable) Boolea...

  20. Octopus: A Secure and Anonymous DHT Lookup

    CERN Document Server

    Wang, Qiyan

    2012-01-01

    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate ...

  1. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  2. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  3. Voluntary Environmental Governance Arrangements

    NARCIS (Netherlands)

    van der Heijden, J.

    2012-01-01

    Voluntary environmental governance arrangements have focal attention in studies on environmental policy, regulation and governance. The four major debates in the contemporary literature on voluntary environmental governance arrangements are studied. The literature falls short of sufficiently

  4. Voluntary Environmental Governance Arrangements

    NARCIS (Netherlands)

    van der Heijden, J.

    2012-01-01

    Voluntary environmental governance arrangements have focal attention in studies on environmental policy, regulation and governance. The four major debates in the contemporary literature on voluntary environmental governance arrangements are studied. The literature falls short of sufficiently specify

  5. Voluntary Service System (VSS)

    Data.gov (United States)

    Department of Veterans Affairs — Voluntary Service System (VSS) is a national-level application which replaced the site-based Voluntary Timekeeping System (VTK). VTK was used for many years at the...

  6. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  7. The Role of Anonymity in Peer Assessment

    Science.gov (United States)

    Li, Lan

    2017-01-01

    This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students' performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students…

  8. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  9. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receive...

  10. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  11. Voluntary Medical Incident Reporting Tool to Improve Physician Reporting of Medical Errors in an Emergency Department

    Directory of Open Access Journals (Sweden)

    Nnaemeka G. Okafor

    2015-12-01

    Full Text Available Introduction: Medical errors are frequently under-reported, yet their appropriate analysis, coupled with remediation, is essential for continuous quality improvement. The emergency department (ED is recognized as a complex and chaotic environment prone to errors. In this paper, we describe the design and implementation of a web-based ED-specific incident reporting system using an iterative process. Methods: A web-based, password-protected tool was developed by members of a quality assurance committee for ED providers to report incidents that they believe could impact patient safety. Results: The utilization of this system in one residency program with two academic sites resulted in an increase from 81 reported incidents in 2009, the first year of use, to 561 reported incidents in 2012. This is an increase in rate of reported events from 0.07% of all ED visits to 0.44% of all ED visits. In 2012, faculty reported 60% of all incidents, while residents and midlevel providers reported 24% and 16% respectively. The most commonly reported incidents were delays in care and management concerns. Conclusion: Error reporting frequency can be dramatically improved by using a web-based, userfriendly, voluntary, and non-punitive reporting system.

  12. Anonymous-address-resolution model

    Institute of Scientific and Technical Information of China (English)

    Guang-jia SONG; Zhen-zhou JI

    2016-01-01

    Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node. The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.

  13. Towards a Theory of Anonymous Networking

    CERN Document Server

    Ghaderi, J

    2009-01-01

    The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.

  14. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  15. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  16. Scalable and Anonymous Group Communication with MTor

    National Research Council Canada - National Science Library

    Dong Lin; Micah Sherr; Boon Thau Loo

    2016-01-01

    This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure...

  17. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  18. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  19. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  20. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    Science.gov (United States)

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.

  1. Authentication Without Identification using Anonymous Credential System

    CERN Document Server

    Damodaram, A

    2009-01-01

    Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely due to privacy and security concerns. The solution is to perform authentication without identification. In fact, all on-line actions should be as anonymous as possible, for this is the only way to guarantee security for the overall system. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users.

  2. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  3. Deterministic Leader Election Among Disoriented Anonymous Sensors

    CERN Document Server

    dieudonné, Yoann; Petit, Franck; Villain, Vincent

    2012-01-01

    We address the Leader Election (LE) problem in networks of anonymous sensors sharing no kind of common coordinate system. Leader Election is a fundamental symmetry breaking problem in distributed computing. Its goal is to assign value 1 (leader) to one of the entities and value 0 (non-leader) to all others. In this paper, assuming n > 1 disoriented anonymous sensors, we provide a complete charac- terization on the sensors positions to deterministically elect a leader, provided that all the sensors' positions are known by every sensor. More precisely, our contribution is twofold: First, assuming n anonymous sensors agreeing on a common handedness (chirality) of their own coordinate system, we provide a complete characterization on the sensors positions to deterministically elect a leader. Second, we also provide such a complete chararacterization for sensors devoided of a common handedness. Both characterizations rely on a particular object from combinatorics on words, namely the Lyndon Words.

  4. A Parallelism-Based Approach to Network Anonymization

    CERN Document Server

    Margasinski, Igor

    2009-01-01

    Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between a level of privacy and a speed of communication. This paper introduces a framework of a novel architecture for anonymous networks that hides initiators of communications by parallelization of anonymous links. The new approach, which is based on the grounds of the anonymous P2P network called P2Priv, does not require content forwarding via a chain of proxy nodes to assure high degree of anonymity. Contrary to P2Priv, the new architecture can be suited to anonymization of various network communications, including anonymous access to distributed as well as client-server services. In particular, it can be considered as an anonymization platform for these network applications where both privacy and low delays are required.

  5. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  6. Community engagement research and dual diagnosis anonymous.

    Science.gov (United States)

    Roush, Sean; Monica, Corbett; Pavlovich, Danny; Drake, Robert E

    2015-01-01

    Community engagement research is widely discussed but rarely implemented. This article describes the implementation of a community engagement research project on Dual Diagnosis Anonymous, a rapidly spreading peer support program in Oregon for people with co-occurring mental illness and substance use disorders. After three years of discussions, overcoming barriers, and involving several institutions, this grassroots research project has been implemented and is expanding. Active participants in Dual Diagnosis Anonymous inspired and instructed policy makers, professionals, and students. Community engagement research requires frontline participants, community members, and professional collaborators to overcome multiple barriers with persistence and steadfastness. Building trust, collaboration, and structures for community engagement research takes time and a community effort.

  7. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  8. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  9. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  10. Altruism and anonymity: A behavioral analysis.

    Science.gov (United States)

    Locey, Matthew L; Rachlin, Howard

    2015-09-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting - the rate at which increases in social distance decrease value to the participant - was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  12. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  13. Altruism and Anonymity: A Behavioral Analysis

    Science.gov (United States)

    Locey, Matthew L.; Rachlin, Howard

    2015-01-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting – the rate at which increases in social distance decrease value to the participant – was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  14. Alcoholics Anonymous Meetings for Teaching Sociology.

    Science.gov (United States)

    Schwartz, T. P.

    1992-01-01

    Discusses using open Alcoholics Anonymous meetings for teaching sociology courses. Suggests that the meetings provide excellent case studies and can exemplify a variety of topics. Stresses that three conditions must be present: (1) easy access to meetings and high student interest; (2) meeting experience is integrated into course; and (3) student…

  15. Dissent in Numbers: Making Strong Anonymity Scale

    Science.gov (United States)

    2012-10-01

    transmit anonymously in each bit-time with- out colliding and yielding garbled output, an arbitration or scheduling mechanism is needed. Second, any misbe...http://www.nytimes.com/2010/05/ 14/technology/personaltech/14talk.html. [62] J. Wright, T. de Souza, and I. Brown. Fine-grained censorship mapping information sources, legality and ethics . In FOCI, Aug. 2011. 14

  16. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    Science.gov (United States)

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  17. Rethinking voluntary euthanasia.

    Science.gov (United States)

    Stoyles, Byron J; Costreie, Sorin

    2013-12-01

    Our goal in this article is to explicate the way, and the extent to which, euthanasia can be voluntary from both the perspective of the patient and the perspective of the health care providers involved in the patient's care. More significantly, we aim to challenge the way in which those engaged in ongoing philosophical debates regarding the morality of euthanasia draw distinctions between voluntary, involuntary, and nonvoluntary euthanasia on the grounds that drawing the distinctions in the traditional manner (1) fails to reflect what is important from the patient's perspective and (2) fails to reflect the significance of health care providers' interests, including their autonomy and integrity.

  18. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  19. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  20. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  1. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  2. Remote Electronic Voting with Revocable Anonymity

    Science.gov (United States)

    Smart, Matt; Ritter, Eike

    We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea of revocable anonymity in electronic voting, on the grounds of it being a legal requirement in the United Kingdom, and show a method of proving the validity of a ballot to a verifier in zero knowledge, by extension of known two-candidate proofs.

  3. Structure Preserving Anonymization of Router Configuration Data

    Science.gov (United States)

    2009-04-01

    2009 IEEE Authorized licensed use limited to: Naval Postgraduate School. Downloaded on December 18, 2009 at 13:53 from IEEE Xplore . Restrictions apply... IEEE Xplore . Restrictions apply. MALTZ et al.: STRUCTURE PRESERVING ANONYMIZATION OF ROUTER CONFIGURATION DATA 351 1 hostname cr1.lax.foo.com 2 ! 3... IEEE Xplore . Restrictions apply. 352 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 3, APRIL 2009 lines 14 and 30 (255.255.255.252

  4. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  5. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  6. satisfies probabilistic k-anonymity criterion

    Directory of Open Access Journals (Sweden)

    Anna Oganian

    2017-04-01

    Full Text Available Before releasing databases which contain sensitive information about individuals, data publishers must apply Statistical Disclosure Limitation (SDL methods to them, in order to avoid disclosure of sensitive information on any identifiable data subject. SDL methods often consist of masking or synthesizing the original data records in such a way as to minimize the risk of disclosure of the sensitive information while providing data users with accurate information about the population of interest. In this paper we propose a new scheme for disclosure limitation, based on the idea of local synthesis of data. Our approach is predicated on model-based clustering. The proposed method satisfies the requirements of k-anonymity; in particular we use a variant of the k-anonymity privacy model, namely probabilistic k-anonymity, by incorporating constraints on cluster cardinality. Regarding data utility, for continuous attributes, we exactly preserve means and covariances of the original data, while approximately preserving higher-order moments and analyses on subdomains (defined by clusters and cluster combinations. For both continuous and categorical data, our experiments with medical data sets show that, from the point of view of data utility, local synthesis compares very favorably with other methods of disclosure limitation including the sequential regression approach for synthetic data generation.

  7. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  8. Voluntary Public Unemployment Insurance

    DEFF Research Database (Denmark)

    O. Parsons, Donald; Tranæs, Torben; Bie Lilleør, Helene

    Denmark has drawn much attention for its active labor market policies, but is almost unique in offering a voluntary public unemployment insurance program requiring a significant premium payment. A safety net program – a less generous, means-tested social assistance plan – completes the system...

  9. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  10. On the Anonymity of Identity-Based Encryption

    Directory of Open Access Journals (Sweden)

    Song Luo

    2013-01-01

    Full Text Available Anonymity of identity-based encryption (IBE means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.

  11. Griffith Edwards' rigorous sympathy with Alcoholics Anonymous.

    Science.gov (United States)

    Humphreys, Keith

    2015-07-01

    Griffith Edwards made empirical contributions early in his career to the literature on Alcoholics Anonymous (AA), but the attitude he adopted towards AA and other peer-led mutual help initiatives constitutes an even more important legacy. Unlike many treatment professionals who dismissed the value of AA or were threatened by its non-professional approach, Edwards was consistently respectful of the organization. However, he never became an uncritical booster of AA or overgeneralized what could be learnt from it. Future scholarly and clinical endeavors concerning addiction-related mutual help initiatives will benefit by continuing Edwards' tradition of 'rigorous sympathy'. © 2015 Society for the Study of Addiction.

  12. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  13. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  14. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  15. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  16. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  17. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    Science.gov (United States)

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  18. How To Break Anonymity of the Netflix Prize Dataset

    OpenAIRE

    Narayanan, Arvind; Shmatikov, Vitaly

    2006-01-01

    We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. ...

  19. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  20. Voluntary Simplicity: A Lifestyle Option.

    Science.gov (United States)

    Pestle, Ruth E.

    This guide provides practical ideas for incorporating the concept of voluntary simplicity into home economics classes. Discussed in the first chapter are the need to study voluntary simplicity, its potential contributions to home economics, and techniques and a questionnaire for measuring student attitudes toward the concept. The remaining…

  1. Operant Variability and Voluntary Action

    Science.gov (United States)

    Neuringer, Allen; Jensen, Greg

    2010-01-01

    A behavior-based theory identified 2 characteristics of voluntary acts. The first, extensively explored in operant-conditioning experiments, is that voluntary responses produce the reinforcers that control them. This bidirectional relationship--in which reinforcer depends on response and response on reinforcer--demonstrates the functional nature…

  2. Toward voluntary parenthood.

    Science.gov (United States)

    Scarr, S

    2000-06-01

    David Lykken's proposal to license married parents for child rearing, and to deny the same opportunity to single and inept parents, springs from his deep concern for millions of youngsters cruelly subjected to abusive and neglectful rearing circumstances. Children from such inadequate homes grow up to have high rates of school failure, criminality, and drug addiction. The problem is clear, but Lykken's remedies of mandated marriage and parental licensure are unacceptable in U.S. society, where our reproductive rights are fortunately protected by our Constitution. As a devoted proponent of reproductive rights, I propose a legally and morally acceptable proposal to the same end. Increasing women's effective control of reproduction and moving toward entirely voluntary parenthood will accomplish the same goals without compromising our civil liberties.

  3. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  4. Alcoholics anonymous effectiveness: faith meets science.

    Science.gov (United States)

    Kaskutas, Lee Ann

    2009-01-01

    Research on the effectiveness of Alcoholics Anonymous (AA) is controversial and subject to widely divergent interpretations. The goal of this article is to provide a focused review of the literature on AA effectiveness that will allow readers to judge the evidence effectiveness of AA for themselves. The review organizes the research on AA effectiveness according to six criterion required for establishing causation: (1) magnitude of effect; (2) dose response effect; (3) consistent effect; (4) temporally accurate effects; (5) specific effects; (6) plausibility. The evidence for criteria 1- 4 and 6 is strong: rates of abstinence are about twice as high among those who attend AA (criteria 1, magnitude); higher levels of attendance are related to higher rates of abstinence (criteria 2, dose-response); these relationships are found for different samples and follow-up periods (criteria 3, consistency); prior AA attendance is predictive of subsequent abstinence (criteria 4, temporal); and mechanisms of action predicted by theories of behavior change are present in AA (criteria 6, plausibility). However, rigorous experimental evidence establishing the specificity of an effect for AA or Twelve Step Facilitation/TSF (criteria 5) is mixed, with 2 trials finding a positive effect for AA, 1 trial finding a negative effect for AA, and 1 trial finding a null effect. Studies addressing specificity using statistical approaches have had two contradictory findings, and two that reported significant effects for AA after adjusting for potential confounders such as motivation to change.

  5. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  6. Alcoholics Anonymous and other 12-step programmes for alcohol dependence.

    Science.gov (United States)

    Ferri, M; Amato, L; Davoli, M

    2006-07-19

    Alcoholics Anonymous (AA) is an international organization of recovering alcoholics that offers emotional support through self-help groups and a model of abstinence for people recovering from alcohol dependence, using a 12-step approach. Although it is the most common, AA is not the only 12-step intervention available there are other 12-step approaches (labelled Twelve Step Facilitation (TSF)). To assess the effectiveness of AA or TSF programmes compared to other psychosocial interventions in reducing alcohol intake, achieving abstinence, maintaining abstinence, improving the quality of life of affected people and their families, and reducing alcohol associated accidents and health problems. We searched the Specialized Register of Trials of the Cochrane Group on Drugs and Alcohol, the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE from 1966, EMBASE from 1980, CINAHL from 1982, PsychINFO from 1967. Searches were updated in February 2005. We also inspected lists of references for relevant studies. Studies involving adults (alcohol dependence attending on a voluntary or coerced basis AA or TSF programmes comparing no treatment, other psychological interventions, 12-step variants. One reviewer (MF) assessed studies for inclusion and extracted data using a pre-defined data extraction form. Studies were evaluated for methodological quality and discussed by all reviewers. Eight trials involving 3417 people were included. AA may help patients to accept treatment and keep patients in treatment more than alternative treatments, though the evidence for this is from one small study that combined AA with other interventions and should not be regarded as conclusive. Other studies reported similar retention rates regardless of treatment group. Three studies compared AA combined with other interventions against other treatments and found few differences in the amount of drinks and percentage of drinking days. Severity of addiction and drinking consequence did

  7. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  8. Analyzing voluntary medical incident reports.

    Science.gov (United States)

    Gong, Yang; Richardson, James; Zhijian, Luan; Alafaireet, Patricia; Yoo, Illhoi

    2008-11-06

    Voluntary medical incident reports lacking consistency and accuracy impede the ultimate use of the reports for patient safety research. To improve this, two coders examined harm score usage in a voluntary medical incident reporting system where the harm scores were selected from a predefined list by different reporters. The two coders inter-rater agreement percent was 82%. The major categories and reviewed harm score jointly demonstrate that this process is critical and necessary in preparing the voluntary reports for further content and semantics analysis.

  9. Survey on Anonymity in Unstructured Peer-to-Peer Systems

    Institute of Scientific and Technical Information of China (English)

    Ren-Yi Xiao

    2008-01-01

    Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches,we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor reliability. We also discuss the open problems in this field and propose several future research directions.

  10. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs

    Institute of Scientific and Technical Information of China (English)

    Ying-pu Deng; Li-feng Guo; Mu-lan Liu

    2007-01-01

    In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let υ(t, ω, q) denote the minimum size of the set of shares of a perfect anonymous (t, ω) threshold secret sharing scheme with q secrets. In this paper we prove that υ(t, ω, q) = Θ(q) if t and ω are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.

  11. A NEW ANONYMITY CONTROLLED E-CASH SCHEME

    Institute of Scientific and Technical Information of China (English)

    Zhang Fangguo; Wang Changjie; Wang Yumin

    2002-01-01

    E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.

  12. Adolescents' participation in Alcoholics Anonymous and Narcotics Anonymous: review, implications and future directions.

    Science.gov (United States)

    Kelly, John F; Myers, Mark G

    2007-09-01

    Youth treatment programs frequently employ 12-Step concepts and encourage participation in Alcoholics Anonymous (AA) and Narcotics Anonymous (NA). Since AA/NA groups are easily accessible at no charge and provide flexible support at times of high relapse risk they hold promise as a treatment adjunct in an increasingly cost-constricting economic climate. Yet, due to concerns related to adolescents' developmental status, skepticism exists regarding the utility of AA/NA for youth. This review evaluates the empirical evidence in this regard, identifies and discusses knowledge gaps, and recommends areas for future research. Searches were conducted in PsychINFO, Medline, relevant literature and by personal correspondence. Findings suggest youth may benefit from AA/NA participation following treatment, but conclusions are limited by four important factors: (1) a small number of studies; (2) no studies with outpatients; (3) existing evidence is solely observational; and (4) only partial measurement of the 12-Step construct. While surveys of adolescent SUD treatment programs indicate widespread clinical interest and application of adult-derived 12-Step approaches this level of enthusiasm has not been reflected in the research community. Qualitative research is needed to improve our understanding of youth-specific AA/NA barriers, and efficacy, comparative effectiveness, and process studies are still needed to inform clinical practice guidelines for youth providers.

  13. The Notion of Voluntary Unemployment.

    Science.gov (United States)

    Standing, Guy

    1981-01-01

    Considers the distinction between voluntary and involuntary unemployment by analyzing six behavioral characteristics attributed to groups of workers suspected of indulging in the former, and the labor market mechanisms supposedly encouraging them. (Author/CT)

  14. Design and analysis of two-layer anonymous communication system

    Institute of Scientific and Technical Information of China (English)

    WANG Wei-ping; WANG Jian-xin

    2007-01-01

    A new architecture for scalable anonymous communication system(SACS) was proposed. The users were divided into several subgroups managed by different sub-blenders, and all sub-blenders were managed by the main-blender using two layers management scheme. The identity information of members are distributed on different sub-blenders, which makes each member keep much less information and network overload greatly reduce. The anonymity and the overhead of the new scheme were analyzed and compared with that of Crowds, which shows the cost of storage and network overhead for the new scheme largely decreases while the anonymity is little degraded. The experiment results also show that the new system architecture is well scalable. The ratio of management cost of SACS to that of Crowds is about 1:25 while the value of P(I|H1+) only increases by 0.001-0.020, which shows that SACS keeps almost the same anonymity with Crowds.

  15. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  16. Measuring Perceived Anonymity: The Development of a Context Independent Instrument

    Directory of Open Access Journals (Sweden)

    Dwight M. Hite

    2014-09-01

    Full Text Available In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.  To date, no such measurement instrument exists that has been shown to be reliable and valid.  The authors employ a rigorous design methodology to develop, test, and substantiate a reliable and valid instrument for measuring perceptions of anonymity across different contexts. The PA measure presented is a five item Likert scale designed to measure perceptions of anonymity across multiple contexts. Results from two separate EFA pilot tests (n=61 and n=60, a test-retest, and a CFA final test (n=292 indicate that the PA measure has good internal consistency reliability (a=.82, test-retest reliability, factorial validity, and a single factor structure. DOI: 10.2458/azu_jmmss.v5i1.18305

  17. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  18. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  19. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier

    OpenAIRE

    Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa

    2009-01-01

    In IEEE ISI 2008, an anonymous attribute authentication scheme has been proposed using a self-blindable certificate scheme. This scheme enables the anonymity and certificate revocation. A Certificate Revocation List (CRL) is used in the revocation check. Even if an attacker can obtain a CRL, the attacker cannot execute the revocation check. This means that this scheme enables the designated revocation. However, this scheme is not secure, namely, a user can make a forged proof using a public v...

  20. Unraveling an Old Cloak: k-anonymity for Location Privacy

    OpenAIRE

    Shokri, Reza; Troncoso, Carmela; Diaz, Claudia; Freudiger, Julien; Hubaux, Jean-Pierre

    2010-01-01

    There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency b...

  1. Alcohol & drug abuse: Dual Diagnosis Anonymous of Oregon.

    Science.gov (United States)

    Monica, Corbett; Nikkel, Robert E; Drake, Robert E

    2010-08-01

    Many people with addictions report that support from peer groups fosters recovery. For people with co-occurring mental illnesses, dual-diagnosis peer support groups are considered helpful, but they are often unavailable. Recently, Dual Diagnosis Anonymous peer support groups have spread widely throughout Oregon as a complement to integrated dual diagnosis treatments. This column describes Dual Diagnosis Anonymous and its rapid implementation in Oregon.

  2. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  3. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  4. Comparing Voluntary and Mandatory Gameplay

    Directory of Open Access Journals (Sweden)

    Esther Kuindersma

    2016-09-01

    Full Text Available Gameplay is commonly considered to be a voluntary activity. Game designers generally believe that voluntary gameplay is essentially different from mandatory gameplay. Such a belief may be a challenge for serious games, as instruction is usually mandatory. The article describes the outcomes of two experiments on the impact of voluntariness on the learning effect and enjoyment of a serious game. In the first experiment freedom of choosing to play a serious game was studied, with participants who had volunteered to participate. The results suggested that, contrary to the opinion of many game designers, being required to play a serious game does not automatically take the fun out of the game. The second experiment had voluntary participants and mandatory participants, who had to participate as part of a homework assignment. The outcomes show that mandatory participants enjoyed the game as much as the voluntary participants, even if they had to play the game for a minimum required time. These studies indicate that mandatory gameplay does not reduce enjoyment and learning effect.

  5. Voluntary organisation and adult education

    Directory of Open Access Journals (Sweden)

    Konrad Elsdon

    1998-12-01

    Full Text Available The author starts by offering a definition of voluntary organisations. He then discusses their importance and role, focusing on the issue of adult education wi­ thin these organisations. He also wells upon learning and change of voluntary organisation members, making use of the results of a study he conducted together with his collaborators. One of their fin­dings has been that voluntary organisati­ons, due to their organisational targets li­ke painting, singing or caring for people in need, lead their members to learning, i.e. essentially content learning. Moreo­ver, voluntary organisations offer a fair number of opportunities for social lear­ning and change. ln spite of the fact that the respondents were mostly not aware of the outcomes of their learning and change, careful listeners conducting the interview made them understand the im­portance of the learning they had gone through. The author concludes by poin­ ting out that formal education of adults can get its inspiration in learning in voluntary organisations. On the other hand, such learning would benefit greatly from findings and methods of formal education of adults.

  6. Predictors of return rate for an HIV-positive result in a French Voluntary Counseling and Testing centre.

    Science.gov (United States)

    Pahlavan, Golriz; Burdet, Charles; Laouénan, Cédric; Guiroy, Frédérique; Bouscarat, Fabrice; Tosini, William; Yazdanpanah, Yazdan; Bouvet, Elisabeth

    2015-01-01

    Bichat Hospital's free and anonymous Voluntary Counseling and Testing centre in Paris is widely visited, with a high rate of HIV-positive diagnosis. This study proposed, in this centre, to describe the HIV newly-diagnosed patients over an 8-year period and to determinate risk factors for failure to return for a positive result. Higher risk for failure to return was found among the heterosexual subjects regardless of their socio-economic background.

  7. Restricted common data in anonymous E-cash system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang-jun; CHEN Ke-fei

    2006-01-01

    Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don't break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.

  8. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  9. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  10. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  11. Voluntary euthanasia: a utilitarian perspective.

    Science.gov (United States)

    Singer, Peter

    2003-10-01

    Belgium legalised voluntary euthanasia in 2002, thus ending the long isolation of the Netherlands as the only country in which doctors could openly give lethal injections to patients who have requested help in dying. Meanwhile in Oregon, in the United States, doctors may prescribe drugs for terminally ill patients, who can use them to end their life--if they are able to swallow and digest them. But despite President Bush's oft-repeated statements that his philosophy is to 'trust individuals to make the right decisions' and his opposition to 'distant bureaucracies', his administration is doing its best to prevent Oregonians acting in accordance with a law that its voters have twice ratified. The situation regarding voluntary euthanasia around the world is therefore very much in flux. This essay reviews ethical arguments regarding voluntary euthanasia and physician-assisted suicide from a utilitarian perspective. I shall begin by asking why it is normally wrong to kill an innocent person, and whether these reasons apply to aiding a person who, when rational and competent, asks to be killed or given the means to commit suicide. Then I shall consider more specific utilitarian arguments for and against permitting voluntary euthanasia.

  12. Social Cohesion and Voluntary Associations

    Science.gov (United States)

    Heuser, Brian L.

    2005-01-01

    Voluntary organizations exert great influence over how social norms and ethical codes are guided into action. As such, they have a significant impact on societal levels of social cohesion. Although social capital involves generalized trust becoming manifest as spontaneous sociability, social cohesion is determined by how that sociability is…

  13. Voluntary Incentive Early Retirement Programs.

    Science.gov (United States)

    Research Dialogues, 1988

    1988-01-01

    Arrangements in educational institutions for voluntary early retirement programs are discussed. Retirement at any age can be a profound and stressful lifetime change; and it can also represent a welcome transition into newly satisfying and rewarding opportunities. The focus is on: mandatory retirement (exceptions and the new meaning of "early");…

  14. Voluntary disclosure: Evidence from UK

    NARCIS (Netherlands)

    N.S. Zourarakis (Nicolaos)

    2009-01-01

    textabstractThis paper investigates the voluntary disclosure of Intellectual Capital (IC) of British firms and provides some evidence on an unexplored area of the literature; that of the association of Corporate Governance (CG) with IC disclosure. Inconsistent with expectations, the results show tha

  15. Completely anonymous multi-recipient signcryption scheme with public verification.

    Science.gov (United States)

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  16. Completely anonymous multi-recipient signcryption scheme with public verification.

    Directory of Open Access Journals (Sweden)

    Liaojun Pang

    Full Text Available Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  17. Collecting substance use data with an anonymous mailed survey.

    Science.gov (United States)

    Trinkoff, A M; Storr, C L

    1997-10-25

    Because mailed surveys minimize personal contact, they are useful for collecting sensitive data on substance use, as long as the problems of achieving adequate response rates can be conquered. To address these issues, we report on an anonymous mailed survey of substance use with a 78% response rate, including data collection and survey methods. Analysis of sociodemographic effects on responding found certain groups required additional contacts. Substance use estimates were not affected by non-response bias, suggesting that anonymous mailed surveys can be a feasible means of collecting data on substance use.

  18. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  19. Impact of Knowledge on Election Time in Anonymous Networks

    OpenAIRE

    Dieudonné, Yoann; Pelc, Andrzej

    2016-01-01

    Leader election is one of the basic problems in distributed computing. For anonymous networks, the task of leader election is formulated as follows: every node v of the network must output a simple path, which is coded as a sequence of port numbers, such that all these paths end at a common node, the leader. In this paper, we study deterministic leader election in arbitrary anonymous networks. It is well known that leader election is impossible in some networks, regardless of the allocated am...

  20. Voluntary sterilization in Serbia: Unmet need?

    OpenAIRE

    Rašević Mirjana M.

    2002-01-01

    Is voluntary sterilization as a birth control method accepted in Serbia? This is certainly a question that is being imposed for research, regardless of the fact that voluntary sterilization is neither accessible nor promoted. Most importantly because there is no understanding in the social nor political sphere for legalization of voluntary sterilization as a form of birth control, apart from the clear necessity for this, first, step. They are: the recognition that voluntary sterilization is a...

  1. 22 CFR 513.210 - Voluntary exclusion.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Voluntary exclusion. 513.210 Section 513.210... GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (GRANTS) Effect of Action § 513.210 Voluntary exclusion. Persons who accept voluntary exclusions under § 513.315 are excluded in accordance with the terms of...

  2. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  3. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  4. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  5. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  6. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  7. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  8. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  9. Student Feedback, Anonymity, Observable Change and Course Barometers.

    Science.gov (United States)

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  10. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  11. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  12. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  13. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  14. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2004-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space exploration; we used

  15. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    Science.gov (United States)

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  16. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  17. Values and Recovery from Alcoholism through Alcoholics Anonymous.

    Science.gov (United States)

    Brown, Howard P. Jr.; Peterson, John H. Jr.

    1990-01-01

    Analyzed Rokeach Value Surveys completed by 57 alcoholics and addicts who had obtained at least 3 years' abstinence using a 12-step program of recovery. Data suggested a shift in values is involved in recovery from alcoholism through participation in Alcoholics Anonymous and that values clarification and value therapy may be useful in chemical…

  18. Attitudes toward Spirituality and the Core Principles of Alcoholics Anonymous

    Science.gov (United States)

    Davis, S. J.; Benshoff, John J.; Koch, D. Shane

    2006-01-01

    One-hundred and fifty-one students enrolled in substance abuse counselor training classes were surveyed on their attitudes about spirituality in substance abuse treatment and their beliefs about the principles of Alcoholics Anonymous (AA). Significant correlations were found between the subjects' spirituality and their attitudes toward…

  19. Radical Reeducation: Alcoholics Anonymous as a Model in Adult Education.

    Science.gov (United States)

    Crossman, Lenard H.

    1980-01-01

    The peer self-help group approach used by Alcoholics Anonymous can be a model for other types of adult learning. The group's power, solidarity, experience sharing, and values clarification can provide positive social and educational experiences to others such as the chronically unemployed, illiterate adults, and high school dropouts. (SK)

  20. Alcoholics Anonymous and the Counseling Profession: Philosophies in Conflict.

    Science.gov (United States)

    Le, Christine; And Others

    1995-01-01

    Describes contributions of Alcoholics Anonymous (AA) to drug and alcohol treatment. Discusses potential for AA's steps to encourage growth, and examines their consistency with counseling philosophy. Proposes and contrasts 12 new steps based on counseling theory to stimulate constructive discussion. Advocates more solid boundaries between AA and…

  1. Spirituality, Evidence-Based Medicine, and Alcoholics Anonymous

    National Research Council Canada - National Science Library

    Galanter, Marc

    2008-01-01

    ... work. For example, Alcoholics Anonymous (AA), a self-designated "spiritual fellowship," is a useful adjunct to the practice of evidence-based addiction medicine. Evidence is developing for a specific role of spirituality in its effectiveness. A Biopsychosocial Perspective As a social phenomenon, spirituality has become a focus of interest in the...

  2. Alcoholics Anonymous: A Wonderful Medication with Some Possible Side Effects.

    Science.gov (United States)

    Machell, David F.

    1989-01-01

    Describes Alcoholics Anonymous as an effective self-help treatment modality for many alcoholics. Notes that organization would seem to initially necessitate "tolerated unhealthiness" psychologically to help consolidate sobriety, suggesting abstinence first, psychological healthiness second regimen. Suggests that psychotherapists learn to…

  3. Social distance and anonymity modulate fairness consideration: An ERP study.

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-08-21

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity.

  4. Leader election in anonymous rings: Franklin goes probabilistic

    NARCIS (Netherlands)

    Bakhshi, R.; Fokkink, W.J.; Pang, J.; Pol, J.C. van de; Ausiello, G.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  5. Leader Election in Anonymous Rings: Franklin Goes Probabilistic

    NARCIS (Netherlands)

    Bakhshi, Rena; Fokkink, Wan; Pang, Jun; Pol, van de Jaco; Ausiello, G.; Karhumäki, J.; Mauri, G.; Ong, L.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  6. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  7. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  8. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  9. International Voluntary Renewable Energy Markets (Presentation)

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, J.

    2012-06-01

    This presentation provides an overview of international voluntary renewable energy markets, with a focus on the United States and Europe. The voluntary renewable energy market is the market in which consumers and institutions purchase renewable energy to match their electricity needs on a voluntary basis. In 2010, the U.S. voluntary market was estimated at 35 terawatt-hours (TWh) compared to 300 TWh in the European market, though key differences exist. On a customer basis, Australia has historically had the largest number of customers, pricing for voluntary certificates remains low, at less than $1 megawatt-hour, though prices depend on technology.

  10. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  11. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  12. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  13. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  14. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  15. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  16. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  17. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    simple yet powerful attack against one scheme (Park, Itoh, and Kurosawa 1994) trivially breaks an honest member’s anonymity if an attacker can create a...probably secure (Jakobsson 1998) was given by Mitomo and Kurosawa (2000). A corrupted mix server can alter intermediate ciphertexts, affect- ing the...Pfizmann 1990; Desmedt and Kurosawa 2000) general design flaws as well 62 as the ability of mix servers to use incorrect and specially-prepared inputs

  18. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...... to the HCI community to take up this discussion not only as an ethical consideration but also as a socio-technical research and design opportunity....

  19. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  20. Twelve defining moments in the history of alcoholics anonymous.

    Science.gov (United States)

    White, William L; Kurtz, Ernest

    2008-01-01

    Misconceptions about Alcoholics Anonymous (AA) abound in spite of (or because of) the thousands of theses, dissertations, books, professional and popular articles, and Internet commentaries that have been written about AA. One of the most pervasive characterizations of AA is that it is a "treatment" for alcoholism--a characterization that distorts the meaning of both mutual aid and alcoholism treatment. This article describes 12 character-defining moments in the history of AA that highlight the differences between AA and alcoholism treatment.

  1. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle.

    Science.gov (United States)

    Pagano, Maria E; Post, Stephen G; Johnson, Shannon M

    2010-01-01

    The helper therapy principle (HTP) observes the helper's health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry.

  2. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  3. Time Lag and Anonymity as Variables in Student Evaluation of Curricula

    Science.gov (United States)

    Pierce, Walter D.; Getz, Howard G.

    1975-01-01

    The major concern of this study was the effect on evaluation data of anonymity and differing time spans between completion of specific programs by students and their responses to anonymous questionnaires. (Author)

  4. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  5. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  6. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

    Directory of Open Access Journals (Sweden)

    Maged Hamada Ibrahim

    2015-09-01

    Full Text Available In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

  7. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  8. Utility-guided Clustering-based Transaction Data Anonymization

    Directory of Open Access Journals (Sweden)

    Aris Gkoulalas-Divanis

    2012-04-01

    Full Text Available Transaction data about individuals are increasingly collected to support a plethora of applications, spanning from marketing to biomedical studies. Publishing these data is required by many organizations, but may result in privacy breaches, if an attacker exploits potentially identifying information to link individuals to their records in the published data. Algorithms that prevent this threat by transforming transaction data prior to their release have been proposed recently, but they may incur significant utility loss due to their inability to: (i accommodate a range of different privacy requirements that data owners often have, and (ii guarantee that the produced data will satisfy data owners’ utility requirements. To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. Additionally, the second algorithm allows the specification and enforcement of utility requirements, thereby ensuring that the anonymized data remain useful in intended tasks. Experiments with both benchmark and real medical datasets verify that our algorithms significantly outperform the current state-of-the-art algorithms in terms of data utility, while being comparable in terms of efficiency.

  9. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  10. 78 FR 49382 - Voluntary Education Programs

    Science.gov (United States)

    2013-08-14

    ... English, reading, writing, speaking, mathematics, and computer skills that are essential to successful job... education advisor: Education Services Specialist, Education Services Officer (ESO), Voluntary...

  11. Dynamics of Voluntary Cough Maneuvers

    Science.gov (United States)

    Naire, Shailesh

    2008-11-01

    Voluntary cough maneuvers are characterized by transient peak expiratory flows (PEF) exceeding the maximum expiratory flow-volume (MEFV) curve. In some cases, these flows can be well in excess of the MEFV, generally referred to as supramaximal flows. Understanding the flow-structure interaction involved in these maneuvers is the main goal of this work. We present a simple theoretical model for investigating the dynamics of voluntary cough and forced expiratory maneuvers. The core modeling idea is based on a 1-D model of high Reynolds number flow through flexible-walled tubes. The model incorporates key ingredients involved in these maneuvers: the expiratory effort generated by the abdominal and expiratory muscles, the glottis and the flexibility and compliance of the lung airways. Variations in these allow investigation of the expiratory flows generated by a variety of single cough maneuvers. The model successfully reproduces PEF which is shown to depend on the cough generation protocol, the glottis reopening time and the compliance of the airways. The particular highlight is in simulating supramaximal PEF for very compliant tubes. The flow-structure interaction mechanisms behind these are discussed. The wave speed theory of flow limitation is used to characterize the PEF. Existing hypotheses of the origin of PEF, from cough and forced expiration experiments, are also tested using this model.

  12. 75 FR 47504 - Voluntary Education Programs

    Science.gov (United States)

    2010-08-06

    ... America. TTT helps relieve teacher shortages, especially in math, science, special education, and other... of the Secretary 32 CFR Part 68 RIN 0790-AI50 Voluntary Education Programs AGENCY: Office of the... for the operation of voluntary education programs within DoD. Included are: Procedures for Service...

  13. Pedagogical Aspects of Voluntary School Work

    Science.gov (United States)

    Mária Jármai, Erzsébet; Palányi, Ildikó Zsupanekné

    2015-01-01

    The economic importance of voluntary work has been exceedingly appreciated in the last few decades. This is not surprising at all, because it is highly profitable according to the related estimated data. There are 115,9 million people doing voluntary work only in Europe, which means that they would create the world's 7th biggest economy with EUR…

  14. 14 CFR 234.7 - Voluntary reporting.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Voluntary reporting. 234.7 Section 234.7 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE REPORTS § 234.7 Voluntary reporting. (a) In addition to the...

  15. Changing Dynamics in the Voluntary Market (Presentation)

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, J.

    2014-12-01

    Voluntary green power markets are those in which consumers and institutions voluntarily purchase renewable energy to match their electricity needs. This presentation, presented at the Renewable Energy Markets Conference in December 2014, outlines the voluntary market in 2013, including community choice aggregation and community solar.

  16. 12 CFR 546.4 - Voluntary dissolution.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Voluntary dissolution. 546.4 Section 546.4... ASSOCIATIONS-MERGER, DISSOLUTION, REORGANIZATION, AND CONVERSION § 546.4 Voluntary dissolution. A Federal savings association's board of directors may propose a plan for dissolution of the association. The plan...

  17. The implications of stigma and anonymity for self-disclosure in health blogs.

    Science.gov (United States)

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  18. Between voluntary agreement and legislation

    DEFF Research Database (Denmark)

    Gwozdz, Wencke; Hedegaard, Liselotte; Reisch, Lucia

    2009-01-01

    Voluntary agreements and self-imposed standards are broadly applied to restrict the influence food advertising exerts on children’s food choices – yet their effects are unknown. The current project will therefore investigate whether and, if yes, how the Danish Code for Responsible Food Marketing...... Communication towards Children (hereafter: CODE) – with its dependence on a supportive institutional environment and acceptance of as well as dynamics between involved key stakeholders like consumers, political actors and firms – contributes to fighting the obesity pandemic.Thus, we explore within this article...... what information about the process of implementing the CODE as well as about the evolved dynamics between key stakeholders is already available. Here, the recently published report of the PolMark project sheds light on the dynamics between the key stakeholders in relation to the current Danish...

  19. A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Manabu Okamoto

    2011-10-01

    Full Text Available Electronic voting is an important application for security protocols. Most existing voting schemes aredesigned for elections in which each voter has only one ballot. However, some elections permit voters tocast multiple ballots. In this paper, we present a new voting scheme in which each voter can havemultiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simplypick their candidates and post a single encrypted message. Anonymous distribution of secret informationis used so that no one knows which information is being passed to whom.

  20. Quantum election scheme based on anonymous quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.

  1. Alcoholics anonymous and other twelve-step programs in recovery.

    Science.gov (United States)

    Detar, D Todd

    2011-03-01

    Recovery is a new way of life for many patients; a life without substances to alter their moods but with a major change improving the physical, psychological, and emotional stability with improved overall health outcomes. The Twelve Steps of the Alcoholics Anonymous (AA) are the foundation of the AA, describing both the necessary actions and the spiritual basis for the recovery program of the AA. The Twelve Steps of the AA provide a structure for which a patient with alcoholism may turn for an answer to their problem of alcohol use, abuse, or dependence. Copyright © 2011 Elsevier Inc. All rights reserved.

  2. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  3. Resisting stigma, embracing solidarity: An ethnographic study of shopaholics anonymous

    Directory of Open Access Journals (Sweden)

    Rachel Demerling

    2011-03-01

    Full Text Available In recent years, an increased interest in the phenomenon of compulsive buying, which is better known as “shopaholism”, has occurred. This behaviour has been conceptualized as being an uncontrollable urge to purchase things which is pleasurable for an individual or relieves their distress and which results in negative consequences for that individual. This article examines the experiences of individuals within a Shopaholics Anonymous group to understand why individuals decide to join a support group and explore the dynamics of interaction among participants and how that shapes the outcome of their addiction.

  4. Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace

    Directory of Open Access Journals (Sweden)

    Jianwen Sun

    2012-02-01

    Full Text Available Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable length character n-gram is used to represent the author’s writing style. The technique of IG seeded GA based feature selection for Ensemble (IGAE is also developed to build an identification model based on individual author level features. Several specific components for dealing with the individual feature set are integrated to improve the performance. The proposed feature and technique are evaluated on a real world data set encompassing reviews posted by 50 Amazon customers. The experimental results show the effectiveness of the proposed framework, with accuracy over 94% for 20 authors and over 80% for 50 ones. Compared with the baseline technique (Support Vector Machine, a higher performance is achieved by using IGAE, resulting in a 2% and 8% improvement over SVM for 20 and 50 authors respectively. Moreover, it has been shown that IGAE is more scalable in terms of the number of authors, than author group level based methods.

  5. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  6. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  7. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  8. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    Directory of Open Access Journals (Sweden)

    Jinying Jia

    2014-01-01

    Full Text Available This paper tackles location privacy protection in current location-based services (LBS where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user’s accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR, nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user’s accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  9. Nonexposure accurate location K-anonymity algorithm in LBS.

    Science.gov (United States)

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  10. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  11. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  12. How safe are adolescents at Alcoholics Anonymous and Narcotics Anonymous meetings? A prospective investigation with outpatient youth.

    Science.gov (United States)

    Kelly, John F; Dow, Sarah J; Yeterian, Julie D; Myers, Mark

    2011-06-01

    Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) have proven to be cost-effective recovery resources for adults and also appear helpful for youth. However, anecdotal concerns about adolescents' safety at meetings have dampened enthusiasm regarding youth participation. Unfortunately, little information exists to evaluate such concerns. Outpatients (N = 127; 24% female) were assessed at intake and at 3, 6, and 12 months regarding perceived safety at AA/NA, experience of negative incidents, and reasons for nonattendance/discontinuation. By 12-month follow-up, 57.5% reported some AA/NA attendance with a combined lifetime exposure of 5,340 meetings. Of these, 21.9% reported at least one negative experience, which was more common among NA than AA attendees. Overall, youth reported feeling very safe at meetings, and ratings did not differ by age or gender. Reasons for discontinuation or nonattendance were unrelated to safety or negative incidents. Weighing risks against documented benefits, these preliminary findings suggest that referral to AA/NA should not be discouraged, but, similar to adults, youth experiences at meetings should be monitored. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. AN ECONOMETRIC APPROACH ABOUT VOLUNTARY TURNOVER

    Directory of Open Access Journals (Sweden)

    ADALET EREN

    2013-06-01

    Full Text Available This study analyzes individual and organizational variables that affect voluntary turnover are determined in the special defence and security companies. A binomial logistic regression model is used to estimate voluntary turnover.  Binomial Logistic regression, reliability test (scale alfa, variance (ANOVA, Post-hoc/Tukey, correlation (Pearson and other basic statistical techniques  with SPSS 13 statistical packet program was used in the analyzes ofresearch data. The study finds that; situation of suppose working, number of child, number of death child, number of home’s moving, support of rent, total monthly income of household, last work’s region, number of prizes, affect voluntary turnover are determined.

  14. Evaluating the impact of k-anonymization on the inference of interaction networks

    Directory of Open Access Journals (Sweden)

    Pedro Rijo

    2016-04-01

    Full Text Available We address the publication of a large academic information dataset while ensuring privacy. We evaluate anonymization techniques achieving the intended protection, while retaining the utility of the anonymized data. The published data can help to infer behaviors and study interaction patterns in an academic population. These could subsequently be used to improve the planning of campus life, such as defining cafeteria opening hours or assessing student performance. Moreover, the nature of academic data is such that many implicit social interaction networks can be derived from available datasets, either anonymized or not, raising the need for researching how anonymity can be assessed in this setting. Hence we quantify the impact of anonymization techniques over data utility and the impact of anonymization on behavioural patterns analysis.

  15. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  16. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  17. [Representations of alcoholism in a former alcoholics' association: Alcoholics Anonymous].

    Science.gov (United States)

    Campos, Edemilson Antunes de

    2004-01-01

    This article is designed to review the representations of alcoholism provided by members of an association of former alcoholics, namely Alcoholics Anonymous (AA), based on partial results from a qualitative survey conducted in the Sapopemba group of AA in a neighborhood on the outskirts of the city of Sao Paulo, Brazil. The article thus analyzes alcoholism from an emic perspective, i.e., how it is conceived and managed by those who acknowledge themselves as being "sick as alcoholics", how they explain the sickness, how they experience it, and how they endeavor to overcome it. The purpose is to present AA and its treatment strategy and to highlight the link made by the association by conceiving of alcoholism as a physical, moral, and spiritual illness.

  18. Alcoholics Anonymous and reduced impulsivity: a novel mechanism of change.

    Science.gov (United States)

    Blonigen, Daniel M; Timko, Christine; Moos, Rudolf H

    2013-01-01

    ABSTRACT   Reduced impulsivity is a novel, yet plausible, mechanism of change associated with the salutary effects of Alcoholics Anonymous (AA). Here, the authors review their work on links between AA attendance and reduced impulsivity using a 16-year prospective study of men and women with alcohol use disorders (AUDs) who were initially untreated for their drinking problems. Across the study period, there were significant mean-level decreases in impulsivity, and longer AA duration was associated with reductions in impulsivity. In turn, decreases in impulsivity from baseline to Year 1 were associated with fewer legal problems and better drinking and psychosocial outcomes at Year 1, and better psychosocial functioning at Year 8. Decreases in impulsivity mediated associations between longer AA duration and improvements on several Year 1 outcomes, with the indirect effects conditional on participants' age. Findings are discussed in terms of their potential implications for research on AA and, more broadly, interventions for individuals with AUDs.

  19. Alcoholics Anonymous in Ireland: AA's first European experience.

    Science.gov (United States)

    Butler, Shane; Jordan, Tony

    2007-06-01

    To trace the evolution of Alcoholics Anonymous in Ireland from its establishment there in 1946, focusing on the efforts of early members to publicize the fellowship and negotiate a role for themselves in relation to existing religious and healthcare institutions. Archival research, drawing mainly on primary sources in AA archives in New York and Dublin. Anticipated tensions between this fellowship, which had its roots in Evangelical Protestantism, and the politically powerful Roman Catholic Church in Ireland were skillfully avoided; initial hostility from the medical profession quickly dissipated; and AA distanced itself from policy debate on the wider topic of alcoholism as disease. The relatively smooth introduction of AA to Ireland, the first European country in which it was established, may be attributed to the essentially pragmatic nature of the fellowship and the strategic abilities of its early members.

  20. Evaluating alcoholics anonymous sponsor attributes using conjoint analysis.

    Science.gov (United States)

    Stevens, Edward B; Jason, Leonard A

    2015-12-01

    Alcoholics Anonymous (AA) considers sponsorship an important element of the AA program, especially in early recovery. 225 adult individuals who had experience as either a sponsor, sponsee, or both, participated in a hypothetical sponsor ranking exercise where five attributes were varied across three levels. Conjoint analysis was used to compute part-worth utility of the attributes and their levels for experience, knowledge, availability, confidentiality, and goal-setting. Differences in utilities by attribute were found where confidentiality had the greatest overall possible impact on utility and sponsor knowledge had the least. These findings suggest qualitative differences in sponsors may impact their effectiveness. Future research on AA should continue to investigate sponsor influence on an individual's overall recovery trajectory. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  2. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  3. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  4. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  5. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  6. Anticipatory signatures of voluntary memory suppression.

    Science.gov (United States)

    Hanslmayr, Simon; Leipold, Philipp; Pastötter, Bernhard; Bäuml, Karl-Heinz

    2009-03-04

    Voluntary memory suppression can keep unwanted memories from entering consciousness, inducing later forgetting of the information. In the present study, we searched for the existence of anticipatory processes, mediating such voluntary memory suppression. Using the think/no-think paradigm, subjects received a cue whether to prepare to think of a previously studied cue-target pair or whether to not let a previously studied cue-target pair enter consciousness. Examining event-related potentials, we identified two electrophysiological processes of voluntary memory suppression: (1) an early anticipatory process operating before the memory cue for a to-be-suppressed memory was provided, and (2) a later process operating after memory cue presentation. Both ERP effects were due to a decreased right frontal and left parietal positivity. They were positively related and predicted later forgetting. The results point to the existence of anticipatory processes, mediating voluntary memory suppression.

  7. Pedagogical Aspects of Voluntary School Work

    Directory of Open Access Journals (Sweden)

    Mária Jármai Erzsébet

    2015-03-01

    Full Text Available The economic importance of voluntary work has been exceedingly appreciated in the last few decades. This is not surprising at all, because it is highly profitable according to the related estimated data. There are 115,9 million people doing voluntary work only in Europe, which means that they would create the world's 7th biggest economy with EUR 282 billion value creation if they formed an individual state. The organizations know that voluntary work has several advantages apart from the economic benefits. It is profitable both for the society and for the individuals as well. Several researches have proven that voluntary work positively influences the development of the personality, because the key-competencies - such as: co-operation, empathy, solidarity, conflict handling, problem solving, etc. - expected in the labor market can be improved.

  8. Managing voluntary turnover through challenging assignments

    NARCIS (Netherlands)

    Preenen, P.T.Y.; Pater, I.E. de; Vianen, A.E.M. van; Keijzer, L.

    2011-01-01

    This study examines employees' challenging assignments as manageable means to reduce turnover intentions, job search behaviors, and voluntary turnover. Results indicate that challenging assignments are negatively related to turnover intentions and job search behaviors and that these relationships

  9. Corticospinal excitability in human voluntary movement

    NARCIS (Netherlands)

    Elswijk, G.A.F. van

    2008-01-01

    The research described in this thesis addressed the neurophysiologic changes in the human corticospinal system during preparation and execution of voluntary hand movements. The experiments involved transcranial magnetic stimulation (TMS) of the motor cortex combined with electromyography (EMG) and e

  10. Contemplated Suicide Among Voluntary and Involuntary Retirees

    Science.gov (United States)

    Peretti, Peter O.; Wilson, Cedric

    1978-01-01

    This study explored anomic and egoistic dimensions of contemplated suicide among voluntary and involuntary retired males. Results indicated a direct relationship between anomie and egoism on the one hand, and contemplation of suicide on the other. (Author)

  11. A Free Market Requires Voluntary Actions

    DEFF Research Database (Denmark)

    Sløk-Madsen, Stefan Kirkegaard

    are essential to the construct of consumer sovereignty. Understanding the degree of voluntary actions in a given commercial setting has implications for both business strategy and policy making. This paper thus aims to contribute to explain why restricted markets become crony capitalism.......This paper draws attention to the importance of the understanding of voluntary actions in the free market construct. Failing to understand the role of voluntary actions in the free market construct will often result in discussions of capitalism versus socialism focusing on asset ownership...... and not consumer sovereignty. I argue that asset ownership is less important than true consumer sovereignty, which again is the essential argument for why capitalism is the superior mode of resource allocation and social organization. The paper analyzes how our understanding of markets and voluntary actions...

  12. Contemplated Suicide Among Voluntary and Involuntary Retirees

    Science.gov (United States)

    Peretti, Peter O.; Wilson, Cedric

    1978-01-01

    This study explored anomic and egoistic dimensions of contemplated suicide among voluntary and involuntary retired males. Results indicated a direct relationship between anomie and egoism on the one hand, and contemplation of suicide on the other. (Author)

  13. Pull factors of Finland and voluntary work

    OpenAIRE

    Jurvakainen, Janika

    2016-01-01

    This thesis studies pull factors of Finland and voluntary work. The aim of this study is to understand the pull factors of Finland from the perspective of young travelers. Which pull factors attract to choose Finland as their destination? In addition, which pull factors attract young travelers to participate in international voluntary work? The commissioner of this thesis is Allianssi Youth Exchange. The thesis is research-based and includes a quantitative Webropol survey and some qualit...

  14. 47 CFR 80.310 - Watch required by voluntary vessels.

    Science.gov (United States)

    2010-10-01

    ... Watches § 80.310 Watch required by voluntary vessels. Voluntary vessels not equipped with DSC must.... Voluntary vessels equipped with VHF-DSC equipment must maintain a watch on 2182 kHz and on either 156.525... used to communicate. Voluntary vessels equipped with MF-HF DSC equipment must have the radio turned...

  15. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis.

    Science.gov (United States)

    Kelly, John F; Greene, M Claire; Bergman, Brandon G

    2014-11-01

    Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for 'primary drug' patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. © The Author 2014. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  16. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  17. "Sobriety's Kind of Like Freedom": Integrating Ideals of Leisure into the Ideology of Alcoholics Anonymous.

    Science.gov (United States)

    McCormick, Bryan; Dattilo, John

    1995-01-01

    This study examined the integration of "leisure" into the ideology of Alcoholics Anonymous. Participant-observation and in-depth interviews found parallels between the concept of sobriety in Alcoholics Anonymous and philosophical ideals of leisure both as conditions of freedom from compelled activity and freedom to engage in meaningful…

  18. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    Science.gov (United States)

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  19. Voluntary attention increases perceived spatial frequency.

    Science.gov (United States)

    Abrams, Jared; Barbot, Antoine; Carrasco, Marisa

    2010-08-01

    Voluntary covert attention selects relevant sensory information for prioritized processing. The behavioral and neural consequences of such selection have been extensively documented, but its phenomenology has received little empirical investigation. Involuntary attention increases perceived spatial frequency (Gobell & Carrasco, 2005), but involuntary attention can differ from voluntary attention in its effects on performance in tasks mediated by spatial resolution (Yeshurun, Montagna, & Carrasco, 2008). Therefore, we ask whether voluntary attention affects the subjective appearance of spatial frequency--a fundamental dimension of visual perception underlying spatial resolution. We used a demanding rapid serial visual presentation task to direct voluntary attention and measured perceived spatial frequency at the attended and unattended locations. Attention increased the perceived spatial frequency of suprathreshold stimuli and also improved performance on a concurrent orientation discrimination task. In the control experiment, we ruled out response bias as an alternative account by using a lengthened interstimulus interval, which allows observers to disengage attention from the cued location. In contrast to the main experiment, the observers showed neither increased perceived spatial frequency nor improved orientation discrimination at the attended location. Thus, this study establishes that voluntary attention increases perceived spatial frequency. This phenomenological consequence links behavioral and neurophysiological studies on the effects of attention.

  20. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  1. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  2. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  3. Deterministic gathering of anonymous agents in arbitrary networks

    CERN Document Server

    Dieudonné, Yoann

    2011-01-01

    A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network. Which configurations are gatherable and how to gather all of them deterministically by the same algorithm? We give a complete solution of this gathering problem in arbitrary networks. We characterize all gatherable configurations and give two universal deterministic gathering algorithms, i.e., algorithms that gather all gatherable configurations. The first algorithm works under the assumption that an upper bound n on the size of the network is known. In this case our algorithm guarantees gathering with detection, i.e., the existence of a round for any gatherable configuration, such that all agents are at the same node and all declare that gathering is accomplished. If no upper bound on the size of the network i...

  4. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  5. Is it beneficial to have an alcoholics anonymous sponsor?

    Science.gov (United States)

    Tonigan, J Scott; Rice, Samara L

    2010-09-01

    Alcoholics Anonymous (AA) attendance is predictive of increased abstinence for many problem drinkers and treatment referral to AA is common. Strong encouragement to acquire an AA sponsor is likewise typical, and findings about the benefits associated with social support for abstinence in AA support this practice, at least indirectly. Despite this widespread practice, however, prospective tests of the unique contribution of having an AA sponsor are lacking. This prospective study investigated the contribution of acquiring an AA sponsor using a methodologically rigorous design that isolated the specific effects of AA sponsorship. Participants were recruited from AA and outpatient treatment. Intake and follow-up assessments included questionnaires, semi-structured interviews, and urine toxicology screens. Eligibility criteria limited prior treatment and AA histories to clarify the relationship of interest while, for generalizability purposes, broad substance abuse criteria were used. Of the 253 participants, 182 (72%) provided complete data on measures central to the aims of this study. Overall reductions in alcohol, marijuana, and cocaine use were found over 12-months and lagged analyses indicated that AA attendance significantly predicted increased abstinence. During early AA affiliation but not later logistic regressions showed that having an AA sponsor predicted increased alcohol-abstinence and abstinence from marijuana and cocaine after first controlling for a host of AA-related, treatment, and motivational measures that are associated with AA exposure or are generally prognostic of outcome.

  6. Teaching college students about Alcoholics Anonymous: an experiential approach.

    Science.gov (United States)

    Strobbe, Stephen; Thompson, Stephanie M; Zucker, Robert A

    2013-01-01

    Alcohol use disorders and their related consequences continue to be among the nation's most prevalent and persistent healthcare problems across the lifespan. The vast majority of treatment facilities for substance use disorders in the United States report using some form of 12-step facilitation to help direct their patients to mutual help groups such as Alcoholics Anonymous (AA). Yet, many students in various healthcare disciplines may lack familiarity and direct experience with this readily accessible and potentially lifesaving, low-cost resource. AA has a long-standing tradition of extending an open invitation to professionals and providing educational materials about this worldwide program of recovery. The purpose of this article is to describe an experiential, interdisciplinary approach that has been used to teach undergraduate psychology students about AA. Associated activities included (a) selected readings, (b) attendance at an open AA meeting, (c) the formulation of thoughtful questions by the students, and (d) a single, interactive didactic session. Undergraduate psychology students responded positively when principles of experiential learning were applied to educational activities related to AA.

  7. Social network variables in alcoholics anonymous: a literature review.

    Science.gov (United States)

    Groh, D R; Jason, L A; Keys, C B

    2008-03-01

    Alcoholics Anonymous (AA) is the most commonly used program for substance abuse recovery and one of the few models to demonstrate positive abstinence outcomes. Although little is known regarding the underlying mechanisms that make this program effective, one frequently cited aspect is social support. In order to gain insight into the processes at work in AA, this paper reviewed 24 papers examining the relationship between AA and social network variables. Various types of social support were included in the review such as structural support, functional support, general support, alcohol-specific support, and recovery helping. Overall, this review found that AA involvement is related to a variety of positive qualitative and quantitative changes in social support networks. Although AA had the greatest impact on friend networks, it had less influence on networks consisting of family members or others. In addition, support from others in AA was found to be of great value to recovery, and individuals with harmful social networks supportive of drinking actually benefited the most from AA involvement. Furthermore, social support variables consistently mediated AA's impact on abstinence, suggesting that social support is a mechanism in the effectiveness of AA in promoting a sober lifestyle. Recommendations are made for future research and clinical practice.

  8. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  9. From Voluntary Collective Action to Organized Collaboration?

    DEFF Research Database (Denmark)

    Hattke, Fabian; Blaschke, Steffen; Frost, Jetta

    2016-01-01

    internationalization. Based on our results, we suggest that, depending on the field of action, voluntary collective action and organized collaboration are substitutes with regard to performance. Our study contributes to the literature on collective action and to research on public organizations in pluralistic......Our study examines the relationship between voluntary collective action, organized collaboration, and the provision of public goods in pluralistic organizations. Using German higher education as a context, we investigate whether specialized central support structures contribute to performance...... in three fields of action: the training of young scientists, internationalization, and gender diversity. The findings indicate that organized collaboration may lead to improved performance in the training of young scientists and gender diversity. Conversely, voluntary collective action enhances...

  10. Voluntary reporting of greenhouse gases, 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-07-01

    The Voluntary Reporting Program for greenhouse gases is part of an attempt by the U.S. Government to develop innovative, low-cost, and nonregulatory approaches to limit emissions of greenhouse gases. It is one element in an array of such programs introduced in recent years as part of the effort being made by the United States to comply with its national commitment to stabilize emissions of greenhouse gases under the Framework Convention on Climate Change. The Voluntary Reporting Program, developed pursuant to Section 1605(b) of the Energy Policy Act of 1992, permits corporations, government agencies, households, and voluntary organizations to report to the Energy Information Administration (EIA) on actions taken that have reduced or avoided emissions of greenhouse gases.

  11. Hemochromatosis Patients as Voluntary Blood Donors

    Directory of Open Access Journals (Sweden)

    Tara E Power

    2004-01-01

    Full Text Available The present study was designed to investigate hemochromatosis patients' suitability as blood donors as well as their perceptions and experience with the current public donation system. Participants were gathered from a list of current hemochromatosis patients (n=120 and members of the Canadian Hemochromatosis Society (n=1000. Of the 1120 surveys mailed out to these groups, 801 surveys were returned completed. The sample respondents had a mean age of 57.44 years (SD=12.73; range 19 to 87 years, and 57% were men. It was found that 20% (160 of the respondents have donated blood since their diagnosis; however, only 12% of the respondents indicated that they use voluntary blood donation as a means of maintaining their iron levels. Forty per cent of the respondents indicated that they had been refused from voluntary donation. Despite the fact that in May 2001 the Canadian Blood Services, in collaboration with the Canadian Hemochromatosis Society, began a promotion campaign to encourage hemochromatosis patients to become voluntary blood donors, the present study found that 15% of the respondents reported having been refused from the voluntary blood donation service due to the diagnosis of hemochromatosis. With respect to quality of life, it was found that individuals who donate blood were generally healthier with respect to physical functioning and bodily pain, however, these findings may indicate that hemochromatosis patients who are healthier are better able to donate at public blood banks, rather than that voluntary blood donation has an effect on the donors' physical functioning over phlebotomy clinic users. These study findings suggest that although there may be other medical factors limiting individuals from donating, hemochromatosis patients are interested in being voluntary blood donors and this potential resource is currently under-used.

  12. Mechanisms of behavior change in alcoholics anonymous: does Alcoholics Anonymous lead to better alcohol use outcomes by reducing depression symptoms?

    Science.gov (United States)

    Kelly, John F; Stout, Robert L; Magill, Molly; Tonigan, J Scott; Pagano, Maria E

    2010-04-01

    Indices of negative affect, such as depression, have been implicated in stress-induced pathways to alcohol relapse. Empirically supported continuing care resources, such as Alcoholics Anonymous (AA), emphasize reducing negative affect to reduce relapse risk, but little research has been conducted to examine putative affective mechanisms of AA's effects. Using lagged, controlled, hierarchical linear modeling and mediational analyses this study investigated whether AA participation mobilized changes in depression symptoms and whether such changes explained subsequent reductions in alcohol use. Alcohol-dependent adults (n = 1706), receiving treatment as part of a clinical trial, were assessed at intake, 3, 6, 9, 12 and 15 months. Findings revealed elevated levels of depression compared to the general population, which decreased during treatment and then remained stable over follow-up. Greater AA attendance was associated with better subsequent alcohol use outcomes and decreased depression. Greater depression was associated with heavier and more frequent drinking. Lagged mediation analyses revealed that the effects of AA on alcohol use was mediated partially by reductions in depression symptoms. However, this salutary effect on depression itself appeared to be explained by AA's proximal effect on reducing concurrent drinking. AA attendance was associated both concurrently and predictively with improved alcohol outcomes. Although AA attendance was associated additionally with subsequent improvements in depression, it did not predict such improvements over and above concurrent alcohol use. AA appears to lead both to improvements in alcohol use and psychological and emotional wellbeing which, in turn, may reinforce further abstinence and recovery-related change.

  13. The institutional dynamics of voluntary organisations

    DEFF Research Database (Denmark)

    Aagaard, Peter

    this theoretical frame to analyse case studies of three voluntary organisations.  As a part of the analysis I describe four sets of institutional settings that can influence voluntary organisations ability to create institutional dynamic: institutionalization, moderation, self-organisation and loose-coupling....... organisations. I establish a theoretical frame of institutional dynamic, build primarily on J.G. March's theory on exploration and exploitation. I focus on two organisational arrangements drawn from the theory: The degree of strategic decision-making and the degree of diversity among the volunteers. I use...

  14. Development and validation of the Alcoholics Anonymous Intention Measure (AAIM).

    Science.gov (United States)

    Zemore, Sarah E; Kaskutas, Lee Ann

    2009-10-01

    Drop-out from 12-step groups is notoriously high, yet the field lacks strong models and scales for addressing this problem. We aim to determine whether the theory of planned behavior (TPB) can be applied to 12-step involvement, and to develop and validate a scale of 12-step readiness based on that theory: the Alcoholics Anonymous Intention Measure (AAIM). Data were from a longitudinal trial of a manual-guided 12-step facilitation intervention called Making AA Easier (MAAEZ) involving two treatment programs in California (N=508). Participants completed surveys at baseline, 7 weeks, 6 months, and 12 months. Surveys included the preliminary AAIM, a 12-step involvement measure, other readiness measures, and substance use outcomes. The final, 17-item AAIM measured Attitude (5-item alpha's=.75-.83), Subjective Norm (4-item alpha's=.56-.81), Perceived Control (5-item alpha's=.78-.85), and Intention (3-item alpha's=.80-.95) regarding attendance at 12-step groups. Components were correlated with each other and other readiness measures as expected, supporting the AAIM's validity. Scale components predicted 31% of the variance in Intention to attend 12-step groups at 6 months and 41% of the variance in 12-step involvement at 12 months. Social factors were among the strongest predictors of 12-step involvement. Results did not support the expectancy-value formulation of the TPB, as unweighted (vs. weighted) belief items performed optimally. Results generally support the TPB as a model of 12-step involvement and suggest specific targets for 12-step facilitation interventions within attitude, norm, and control components. Findings also support the AAIM as a tool for identifying drop-out risks and tailoring individual interventions.

  15. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  16. 77 FR 72941 - Voluntary Education Programs

    Science.gov (United States)

    2012-12-07

    ... decision will be made by the selected DoD contractor for the complete `third party review' process. Comment... seeks to enhance the educational opportunities to Service members who may have difficulty in completing... transitions to second careers in teaching. Voluntary education programs. Continuing, adult, or...

  17. Decentralized trade with bargaining and voluntary matching

    DEFF Research Database (Denmark)

    Tranæs, Torben; Sloth, Birgitte; Hendon, Ebbe

    1994-01-01

    Rubinstein and Wolinsky (1990) study a market with one seller, two buyers, and voluntary matching. Both the competitive outcomepc and the bilateral bargaining outcomepb are possible in subgame perfect equilibrium. We consider two variations. First, if there is a cost larger thanpc−pc to the seller...

  18. Social orienting: reflexive versus voluntary control.

    Science.gov (United States)

    Hill, Julia L; Patel, Saumil; Gu, Xue; Seyedali, Nassim S; Bachevalier, Jocelyne; Sereno, Anne B

    2010-09-24

    Many studies have shown that the direction of gaze of a face covertly facilitates the response to a target presented in the matching direction. In this study we seek to determine whether there exist separate reflexive and voluntary forms of such covert social orienting and how they interact with each other. We measured the effect of the predictive value of a gaze cue on manual choice reaction times. When the predictive value of the gaze cue was zero, a facilitatory cueing effect was still observed which peaked at a cue onset to target onset delay (CTD) of 150ms and largely diminished beyond a CTD of 500ms. When the gaze cue was 100% predictive of the future location of the target, at CTDs greater than 200, the predictive cue resulted in a significantly greater facilitation of response than occurred with a non-predictive cue. These results suggest that given enough time (about 200ms), the social cue is interpreted and a willful or voluntary spatially-specific social cueing effect occurs. In addition, we found that a predictive cue resulted in a significant slowing of the observer's responses up to a CTD of 200ms. These findings show that, similar to non-social spatial orienting, there appear to be two forms of social orienting including a reflexive component and voluntary component. We suggest a model of social orienting in which the voluntary social orienting system modulates tonic inhibition of the reflexive social orienting system. Published by Elsevier Ltd.

  19. Equality, self‐respect and voluntary separation

    NARCIS (Netherlands)

    M.S. Merry

    2012-01-01

    This paper argues that self‐respect constitutes an important value, and further, an important basis for equality. It also argues that under conditions of inequality‐producing segregation, voluntary separation in schooling may be more likely to provide the resources necessary for self‐respect. A prim

  20. School Ethical Climate and Teachers' Voluntary Absence

    Science.gov (United States)

    Shapira-Lishchinsky, Orly; Rosenblatt, Zehava

    2010-01-01

    Purpose: This paper aims to offer a theoretical framework for linking school ethical climate with teachers' voluntary absence. The paper attempts to explain this relationship using the concept of affective organizational commitment. Design/methodology/approach: Participants were 1,016 school teachers from 35 high schools in Israel. Data were…

  1. Voluntary Oral Administration of Losartan in Rats.

    Science.gov (United States)

    Diogo, Lucília N; Faustino, Inês V; Afonso, Ricardo A; Pereira, Sofia A; Monteiro, Emília C; Santos, Ana I

    2015-09-01

    Gavage is a widely performed technique for daily dosing in laboratory rodents. Although effective, gavage comprises a sequence of potentially stressful procedures for laboratory animals that may introduce bias into experimental results, especially when the drugs to be tested interfere with stress-dependent parameters. We aimed to test vehicles suitable for drug delivery by voluntary ingestion in rats. Specifically, Male Wistar rats (age, 2 to 3 mo) were used to test nut paste (NUT), peanut butter (PB), and sugar paste (SUG) as vehicles for long-term voluntary oral administration of losartan, an angiotensin II receptor blocker. Vehicles were administered for 28 d without drug to assess effects on the glucose level and serum lipid profile. Losartan was mixed with vehicles and either offered to the rats or administered by gavage (14 d) for subsequent quantification of losartan plasma levels by HPLC. After a 2-d acclimation period, all rats voluntarily ate the vehicles, either alone or mixed with losartan. NUT administration reduced blood glucose levels. The SUG group had higher concentrations of losartan than did the gavage group, without changes in lipid and glucose profiles. Our results showed that NUT, PB, and SUG all are viable for daily single-dose voluntary ingestion of losartan and that SUG was the best alternative overall. Drug bioavailability was not reduced after voluntary ingestion, suggesting that this method is highly effective for chronic oral administration of losartan to laboratory rodents.

  2. Staff's perceptions of voluntary assertiveness skills training.

    Science.gov (United States)

    McVanel, Sarah; Morris, Beth

    2010-01-01

    Clinicians' ability to be assertive when unsure or concerned about procedures, treatment modalities, or patients' symptoms is key in reducing risk and preventing sentinel events. In this article, the authors provide a framework for generic, voluntary assertiveness communication skills workshops that any educator can implement.

  3. Voluntary Organizations: Commitment, Leadership, and Organizational Effectiveness

    Science.gov (United States)

    Ekeland, Terry P.

    2004-01-01

    Voluntary organizations offer a unique opportunity to interpret participant relationships, leadership influences, and organizational effectiveness unencumbered by employment relationships. Regardless of organizational structure or purpose, all organizations are affected to some degree by their leadership and their membership. Based on the…

  4. Environmental Voluntary Agreements in the Dutch Context

    NARCIS (Netherlands)

    Bressers, Johannes T.A.; de Bruijn, Theo; Croci, Edoardo

    2005-01-01

    This paper describes and analyses the use of environmental voluntary agreements, or covenants, in Dutch environmental policy. Covenants have become a widely used policy instrument in the Netherlands. This trend reinforces the strong neo-corporatist traits of Dutch society with its tendency towards

  5. Voluntary Community Organisations in Metropolitan Development

    DEFF Research Database (Denmark)

    Larsen, Jacob Norvig

    While short-term enrolling of citizens in urban regeneration projects often has proven quite successful, permanent embedding of projects in voluntary community-based settings seems to be much more difficult to obtain. This has implications for long term sustainability of urban regeneration projec...

  6. Eligibility and Exclusion of Hemochromatosis Patients as Voluntary Blood Donors

    Directory of Open Access Journals (Sweden)

    M Levstik

    1998-01-01

    Full Text Available BACKGROUND: Hereditary hemochromatosis patients are excluded in many countries as voluntary blood donors. In 1991, changes in the Canadian Red Cross policy allowed healthy hemochromatosis patients to become voluntary donors.

  7. Results of the global survey on Voluntary Sustainability Standards

    OpenAIRE

    Lernoud, Julia

    2015-01-01

    Results of the global survey on Voluntary Sustainability Standards: - Voluntary Sustainability Standards (VSS) area worldwide and selected commodities - Cocoa: Area growth by VSS 2008-2014 - Growth of VSS compliant area worldwide 2008-2013 (selected crops)

  8. China Initiates Voluntary Certification of Public Security Products

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ Reporters learned from the Certification and Accreditation Administration of China(CNCA)that burglar-proof door became the first batch of voluntary certification product in public security products.China has formally initiated voluntary certification of public security products.

  9. Voluntary sterilization in Serbia: Unmet need?

    Directory of Open Access Journals (Sweden)

    Rašević Mirjana M.

    2002-01-01

    Full Text Available Is voluntary sterilization as a birth control method accepted in Serbia? This is certainly a question that is being imposed for research, regardless of the fact that voluntary sterilization is neither accessible nor promoted. Most importantly because there is no understanding in the social nor political sphere for legalization of voluntary sterilization as a form of birth control, apart from the clear necessity for this, first, step. They are: the recognition that voluntary sterilization is an efficient and safe birth control method, respectability of basic human as well as sexual and reproductive rights, spreading of sterilization as a form of birth control among population of both developed and developing countries and an epidemic diffusion of repeated induced abortions in Serbia. Thus individual recognition of the advantages of relying on voluntary sterilization, in a non-encouraging atmosphere, certainly represents one more argument to enable couples to prevent conception by sterilization. Since it was impossible to carry out a representative research among the population of men and women who are at risk for conception, an attempt was made to obtain a reply to the set question among women who decided to induce abortion. It was done out of at least two reasons. The first being that women with induced abortion in their reproductive history were the target group for voluntary sterilization. The second reason was based on the assumption that bringing a decision on induced abortion is preceded by the reconsideration of an earlier adopted strategy regarding children, giving birth and contraception and thus its rational component is revealed more and therefore more easily measurable. The research was carried out in the University Clinic of Obstetrics and Gynecology 'Narodni front' in Belgrade from January 21st o March 1st 2002, and included 296 women. By comparing the social and demographic characteristics of the female respondents, as well as

  10. Effects of transcranial magnetic stimulation during voluntary and non-voluntary stepping movements in humans.

    Science.gov (United States)

    Solopova, I A; Selionov, V A; Kazennikov, O V; Ivanenko, Y P

    2014-09-05

    Here, we compared motor evoked potentials (MEP) in response to transcranial magnetic stimulation of the motor cortex and the H-reflex during voluntary and vibration-induced air-stepping movements in humans. Both the MEPs (in mm biceps femoris, rectus femoris and tibialis anterior) and H-reflex (in m soleus) were significantly smaller during vibration-induced cyclic leg movements at matched amplitudes of angular motion and muscle activity. These findings highlight differences between voluntary and non-voluntary activation of the spinal pattern generator circuitry in humans, presumably due to an extra facilitatory effect of voluntary control/triggering of stepping on spinal motoneurons and interneurons. The results support the idea of active engagement of supraspinal motor areas in developing central pattern generator-modulating therapies. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Moving from voluntary euthanasia to non-voluntary euthanasia: equality and compassion.

    Science.gov (United States)

    Amaraskekara, Kumar; Bagaric, Mirko

    2004-09-01

    The recent Dutch law legalising active voluntary euthanasia will reignite the euthanasia debate. An illuminating method for evaluating the moral status of a practice is to follow the implications of the practice to its logical conclusion. The argument for compassion is one of the central arguments in favour of voluntary active euthanasia. This argument applies perhaps even more forcefully in relation to incompetent patients. If active voluntary euthanasia is legalised, arguments based on compassion and equality will be directed towards legalising active non-voluntary euthanasia in order to make accelerated termination of death available also to the incompetent. The removal of discrimination against the incompetent has the potential to become as potent a catch-cry as the right to die. However, the legalisation of non-voluntary euthanasia is undesirable. A review of the relevant authorities reveals that there is no coherent and workable "best interests" test which can be invoked to decide whether an incompetent patient is better off dead. This provides a strong reason for not stepping onto the slippery path of permitting active voluntary euthanasia.

  12. 5 CFR 919.1020 - Voluntary exclusion or voluntarily excluded.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Voluntary exclusion or voluntarily excluded. 919.1020 Section 919.1020 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED...) Definitions § 919.1020 Voluntary exclusion or voluntarily excluded. (a) Voluntary exclusion means a person's...

  13. 37 CFR 351.2 - Voluntary negotiation period; settlement.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Voluntary negotiation period... CONGRESS COPYRIGHT ROYALTY JUDGES RULES AND PROCEDURES PROCEEDINGS § 351.2 Voluntary negotiation period..., the Copyright Royalty Judges will announce the beginning of a voluntary negotiation period and...

  14. 15 CFR 12.3 - Development of voluntary product standards.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Development of voluntary product... AND LABELING § 12.3 Development of voluntary product standards. (a) Invitation to participate in the development of a voluntary product standard. Whenever the Secretary publishes a final determination of...

  15. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  16. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of onl

  17. Guidelines for Professional Referral to Alcoholics Anonymous and Other Twelve Step Groups.

    Science.gov (United States)

    Riordan, Richard J.; Walsh, Lani

    1994-01-01

    Reviews 12-step programs, focusing on Alcoholics Anonymous (AA), the oldest and largest 12-step group. Explores criticisms of AA, describes its components and mechanics, and provides guidelines for client referral. Includes 28 citations. (Author/CRR)

  18. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  19. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  20. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    OpenAIRE

    Tomas A. Lipinski

    2002-01-01

    This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has alte...

  1. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  2. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...... a solution for anonymous yet reliable access control and account-ability based on ring and group signatures....

  3. Burrowing as a novel voluntary strength training method for mice : A comparison of various voluntary strength or resistance exercise methods

    NARCIS (Netherlands)

    Roemers, P; Mazzola, P N; De Deyn, P P; Bossers, W J; van Heuvelen, M J G; van der Zee, E A

    2017-01-01

    BACKGROUND: Voluntary strength training methods for rodents are necessary to investigate the effects of strength training on cognition and the brain. However, few voluntary methods are available. NEW METHOD: The current study tested functional and muscular effects of two novel voluntary strength

  4. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  5. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    Science.gov (United States)

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  6. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  7. Voluntary reporting of greenhouse gases 1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-05-01

    The Voluntary Reporting of Greenhouse Gases Program, required by Section 1605(b) of the Energy Policy Act of 1992, records the results of voluntary measures to reduce, avoid, or sequester greenhouse gas emissions. In 1998, 156 US companies and other organizations reported to the Energy information Administration that, during 1997, they had achieved greenhouse gas emission reductions and carbon sequestration equivalent to 166 million tons of carbon dioxide, or about 2.5% of total US emissions for the year. For the 1,229 emission reduction projects reported, reductions usually were measured by comparing an estimate of actual emissions with an estimate of what emissions would have been had the project not been implemented.

  8. Voluntary simulation workshops in nursing education

    DEFF Research Database (Denmark)

    Selberg, Hanne; Nielsen, Mette Elisabeth

    2012-01-01

    Voluntary simulation workshops in nursing education Hanne Selberg1, Mette Elisabeth Nielsen1, Mette Wenzel Horsted2, Karen Bertelsen2, Marianne Linnet Rasmussen2,Rikke Lohmann Panton3, Copenhagen, Mette Kjeldal Jensen4 Background Changes in nursing education in Denmark towards an academic approach...... with more theory and less practical training have resulted in discussions regarding the lack of practical skills amongst novice nurses. A Danish study of students’ drop-out from the nursing education indicates that difficulties in combining theory and practice are one of the motivating factors behind...... the students’ decision to drop out (Jensen et al. 2008). Within the past year our faculty has conducted several projects with the aim of integrating simulation into the curriculum. Furthermore, voluntary simulation workshop has been carried out as an additional offer in the nursing education. The purpose has...

  9. The Political Importance of Voluntary Work.

    Science.gov (United States)

    Kunneman, Harry

    This paper aims to develop a complex articulation of the civic meaningfulness of voluntary work that clarifies its political importance as a countervailing narrative pointing beyond dominant neoliberal and consumptive articulations of a good life. To start with, it sketches a hermeneutic perspective on civic meaningfulness based on the work of Paul Ricoeur. Subsequently, it introduces the ideas of 'ethical complexity', 'epistemological complexity' and 'diapoiesis', building on insights from critical complexity thinking and relational biology. It argues that these notions can provide a bridge between hermeneutic perspectives on meaning and values, on the one hand, and questions of meaning and values on the level of scientific and technological developments and within professional organizations, on the other. Thus a broader, more complex picture emerges of the civic meaningfulness of voluntary work in our times.

  10. Voluntary Management Earnings Forecasts and Discretionary Accruals

    DEFF Research Database (Denmark)

    Gramlich, Jeffrey; Sørensen, Ole Vagn

    2004-01-01

    This paper seeks to determine whether Danish managers exercise discretionary accruals to reach earnings forecast targets they voluntarily specify in conjunction with initial public offerings (IPOs). Because the Danish accounting and legal environment is more permissive than the US, we use Denmark...... as a natural laboratory for learning how business would occur without strict rules, enforcement and sanctions. Danish managers often volunteer pro forma financial statements for results that are expected to occur subsequent to the IPO. We examine a sample of 58 Danish firms that issue voluntary management...... earnings forecasts in connection with IPOs that occur between 1984 and 1996. The evidence we uncover strongly suggests that pre-managed earnings are adjusted toward these targets. In contrast with Kasznik's (1999 Kasznik, R. (1999). On the association between voluntary disclosure and earnings management...

  11. Factors that affect voluntary vaccination of children in Japan.

    Science.gov (United States)

    Shono, Aiko; Kondo, Masahide

    2015-03-10

    Some important vaccinations are not included in the routine childhood immunization schedule in Japan. Voluntary vaccinations are usually paid as an out-of-pocket expense. Low voluntary vaccination coverage rates and high target disease incidence are assumed to be a consequence of voluntary vaccination. Therefore, this study aimed to explore factors associated with voluntary vaccination patterns in children. We conducted an online survey of 1243 mothers from a registered survey panel who had at least one child 2 months to vaccination mainly correlated positively with annual household income and mothers' positive opinions about voluntary vaccinations, but negatively with number of children. Financial support, especially for low income households and households with more than one child, may motivate parents to vaccinate their children. Communication is also an important issue. More opportunities for education and information about voluntary vaccinations should be provided to mothers without distinguishing between voluntary and routine vaccination.

  12. Mitigating greenhouse gas emissions: Voluntary reporting

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-10-01

    The Voluntary Reporting Program, developed pursuant to Section 1605(b) of the Energy Policy Act of 1992, permits corporations, government agencies, households, and voluntary organizations to report on their emissions of greenhouse gases, and on actions taken that have reduced or avoided emissions or sequestered carbon, to the Energy Information Administration (EIA). This, the second annual report of the Voluntary Reporting Program, describes information provided by the participating organizations on their aggregate emissions and emissions reductions, as well as their emissions reduction or avoidance projects, through 1995. This information has been compiled into a database that includes reports from 142 organizations and descriptions of 967 projects that either reduced greenhouse gas emissions or sequestered carbon. Fifty-one reporters also provided estimates of emissions, and emissions reductions achieved, for their entire organizations. The projects described actions taken to reduce emissions of carbon dioxide from energy production and use; to reduce methane and nitrous oxide emissions from energy use, waste management, and agricultural processes; to reduce emissions of halocarbons, such as CFCs and their replacements; and to increase carbon sequestration.

  13. Voluntary Green Power Market Forecast through 2015

    Energy Technology Data Exchange (ETDEWEB)

    Bird, L.; Holt, E.; Sumner, J.; Kreycik, C.

    2010-05-01

    Various factors influence the development of the voluntary 'green' power market--the market in which consumers purchase or produce power from non-polluting, renewable energy sources. These factors include climate policies, renewable portfolio standards (RPS), renewable energy prices, consumers' interest in purchasing green power, and utilities' interest in promoting existing programs and in offering new green options. This report presents estimates of voluntary market demand for green power through 2015 that were made using historical data and three scenarios: low-growth, high-growth, and negative-policy impacts. The resulting forecast projects the total voluntary demand for renewable energy in 2015 to range from 63 million MWh annually in the low case scenario to 157 million MWh annually in the high case scenario, representing an approximately 2.5-fold difference. The negative-policy impacts scenario reflects a market size of 24 million MWh. Several key uncertainties affect the results of this forecast, including uncertainties related to growth assumptions, the impacts that policy may have on the market, the price and competitiveness of renewable generation, and the level of interest that utilities have in offering and promoting green power products.

  14. Voluntary peer review as innovative tool for quality improvement in the intensive care unit – a retrospective descriptive cohort study in German intensive care units

    Directory of Open Access Journals (Sweden)

    Kumpf, Oliver

    2014-12-01

    Full Text Available [english] Introduction: Quality improvement and safety in intensive care are rapidly evolving topics. However, there is no gold standard for assessing quality improvement in intensive care medicine yet. In 2007 a pilot project in German intensive care units (ICUs started using voluntary peer reviews as an innovative tool for quality assessment and improvement. We describe the method of voluntary peer review and assessed its feasibility by evaluating anonymized peer review reports and analysed the thematic clusters highlighted in these reports.Methods: Retrospective data analysis from 22 anonymous reports of peer reviews. All ICUs – representing over 300 patient beds – had undergone voluntary peer review. Data were retrieved from reports of peers of the review teams and representatives of visited ICUs. Data were analysed with regard to number of topics addressed and results of assessment questionnaires. Reports of strengths, weaknesses, opportunities and threats (SWOT reports of these ICUs are presented. Results: External assessment of structure, process and outcome indicators revealed high percentages of adherence to predefined quality goals. In the SWOT reports 11 main thematic clusters were identified representative for common ICUs. 58.1% of mentioned topics covered personnel issues, team and communication issues as well as organisation and treatment standards. The most mentioned weaknesses were observed in the issues documentation/reporting, hygiene and ethics. We identified several unique patterns regarding quality in the ICU of which long-term personnel problems und lack of good reporting methods were most interestingConclusion: Voluntary peer review could be established as a feasible and valuable tool for quality improvement. Peer reports addressed common areas of interest in intensive care medicine in more detail compared to other methods like measurement of quality indicators.

  15. Voluntary peer review as innovative tool for quality improvement in the intensive care unit – a retrospective descriptive cohort study in German intensive care units

    Science.gov (United States)

    Kumpf, Oliver; Bloos, Frank; Bause, Hanswerner; Brinkmann, Alexander; Deja, Maria; Marx, Gernot; Kaltwasser, Arnold; Dubb, Rolf; Muhl, Elke; Greim, Clemens-A.; Weiler, Norbert; Chop, Ines; Jonitz, Günther; Schaefer, Henning; Felsenstein, Matthias; Liebeskind, Ursula; Leffmann, Carsten; Jungbluth, Annemarie; Waydhas, Christian; Pronovost, Peter; Spies, Claudia; Braun, Jan-Peter

    2014-01-01

    Introduction: Quality improvement and safety in intensive care are rapidly evolving topics. However, there is no gold standard for assessing quality improvement in intensive care medicine yet. In 2007 a pilot project in German intensive care units (ICUs) started using voluntary peer reviews as an innovative tool for quality assessment and improvement. We describe the method of voluntary peer review and assessed its feasibility by evaluating anonymized peer review reports and analysed the thematic clusters highlighted in these reports. Methods: Retrospective data analysis from 22 anonymous reports of peer reviews. All ICUs – representing over 300 patient beds – had undergone voluntary peer review. Data were retrieved from reports of peers of the review teams and representatives of visited ICUs. Data were analysed with regard to number of topics addressed and results of assessment questionnaires. Reports of strengths, weaknesses, opportunities and threats (SWOT reports) of these ICUs are presented. Results: External assessment of structure, process and outcome indicators revealed high percentages of adherence to predefined quality goals. In the SWOT reports 11 main thematic clusters were identified representative for common ICUs. 58.1% of mentioned topics covered personnel issues, team and communication issues as well as organisation and treatment standards. The most mentioned weaknesses were observed in the issues documentation/reporting, hygiene and ethics. We identified several unique patterns regarding quality in the ICU of which long-term personnel problems und lack of good reporting methods were most interesting Conclusion: Voluntary peer review could be established as a feasible and valuable tool for quality improvement. Peer reports addressed common areas of interest in intensive care medicine in more detail compared to other methods like measurement of quality indicators. PMID:25587245

  16. Re-identification of home addresses from spatial locations anonymized by Gaussian skew

    Directory of Open Access Journals (Sweden)

    Cassa Christopher A

    2008-08-01

    Full Text Available Abstract Background Knowledge of the geographical locations of individuals is fundamental to the practice of spatial epidemiology. One approach to preserving the privacy of individual-level addresses in a data set is to de-identify the data using a non-deterministic blurring algorithm that shifts the geocoded values. We investigate a vulnerability in this approach which enables an adversary to re-identify individuals using multiple anonymized versions of the original data set. If several such versions are available, each can be used to incrementally refine estimates of the original geocoded location. Results We produce multiple anonymized data sets using a single set of addresses and then progressively average the anonymized results related to each address, characterizing the steep decline in distance from the re-identified point to the original location, (and the reduction in privacy. With ten anonymized copies of an original data set, we find a substantial decrease in average distance from 0.7 km to 0.2 km between the estimated, re-identified address and the original address. With fifty anonymized copies of an original data set, we find a decrease in average distance from 0.7 km to 0.1 km. Conclusion We demonstrate that multiple versions of the same data, each anonymized by non-deterministic Gaussian skew, can be used to ascertain original geographic locations. We explore solutions to this problem that include infrastructure to support the safe disclosure of anonymized medical data to prevent inference or re-identification of original address data, and the use of a Markov-process based algorithm to mitigate this risk.

  17. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  18. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  19. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  20. The parallel programming of voluntary and reflexive saccades.

    Science.gov (United States)

    Walker, Robin; McSorley, Eugene

    2006-06-01

    A novel two-step paradigm was used to investigate the parallel programming of consecutive, stimulus-elicited ('reflexive') and endogenous ('voluntary') saccades. The mean latency of voluntary saccades, made following the first reflexive saccades in two-step conditions, was significantly reduced compared to that of voluntary saccades made in the single-step control trials. The latency of the first reflexive saccades was modulated by the requirement to make a second saccade: first saccade latency increased when a second voluntary saccade was required in the opposite direction to the first saccade, and decreased when a second saccade was required in the same direction as the first reflexive saccade. A second experiment confirmed the basic effect and also showed that a second reflexive saccade may be programmed in parallel with a first voluntary saccade. The results support the view that voluntary and reflexive saccades can be programmed in parallel on a common motor map.

  1. Voluntary energy optimisation - Taking responsibility; Verantwortungsvoll

    Energy Technology Data Exchange (ETDEWEB)

    Baettig, I.

    2006-07-01

    This interview with Konrad Kyburz, CEO of a printing shop in Dielsdorf, Switzerland, discusses how energy consumption can be reduced on a voluntary basis. The provision free-of-charge of heat recovered from the drying ovens of the printing presses to a nearby sports facility is discussed. The realisation of an energy consumption analysis and the resulting increases in the efficiency of energy usage in the printing facility are discussed. Further improvements such as the use of variable-frequency compressor drives and heating with natural gas that helped in making energy savings of well over 15% are discussed.

  2. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    ethical challenges that take into consideration the perspectives of employees, targeted organisations, online outlet administrators and audiences. The ethical challenge for employees is to disclose problems for organisational and societal changes in a safe context and supported by a large audience, while......This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...... remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet...

  3. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...... to the legal and moral consequences of their anonymity. The child resulting from the artificial procreation, on the contrary, cannot consent to, nor be informed before being conceived, of the secrecy laid on the identity of its genetic parents. Some countries resolve this problem by allowing the children, when...... be regarded as invalid. The paper will argue that a law ensuring the complete anonymity of the parents is disregarding the informed consent and the interests of the children resulting from artificial procreation, and is thus doing more damage to society than good....

  4. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  5. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    Science.gov (United States)

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  6. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  7. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  8. Voluntary participation and cooperation in a collective-good game.

    OpenAIRE

    Kene Boun My; Benoît Chalvignac

    2009-01-01

    We study the effect of voluntary participation in the context of a collective-good experiment. We investigate whether the freedom to participate in the game or not increases contribution levels and enhances their evolution. The analysis of two voluntary participation treatments supports a positive effect of an attractive exit option on both contribution levels and their sustainability. We conclude that the voluntary contribution mechanism can provide sustainable cooperation levels and that th...

  9. Reversal of optic neuropathy secondary to voluntary globe luxation.

    Science.gov (United States)

    Yaman, Aylin; Ozturk, Taylan; Soylev, Meltem F

    2009-04-01

    Luxation of the globe is rare in the general population and may be spontaneous, voluntary, or traumatic. Spontaneous or voluntary globe luxation results from shallow orbit, floppy eyelids, lax orbital ligaments, backward displacement of orbital septum, or proptotic eyes due to orbital tumors or infiltrative processes, as in Grave's ophthalmopathy. The authors report a case with unilateral voluntary globe luxation presented with unilateral progressive visual loss.

  10. Current State of the Voluntary Renewable Energy Market (Presentation)

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, J.

    2013-09-01

    This presentation highlights the status of the voluntary green power market in 2012. The voluntary green power market totaled more than 48 million MWh in 2012, with about 1.9 million customers participating. The supply continues to be dominated by wind, though solar is increasing its share of utility green pricing programs. Prices for voluntary renewable energy certificates (RECs) increased to above $1/MWh.

  11. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  12. 电子投票匿名性分析%Anonymity Analysis of Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    黄福人; 屈玉贵

    2011-01-01

    电子投票公布计票结果会影响投票者的匿名性.针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化.分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失.%The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting. Aiming at this problem, this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy. It compares the anonymity after the release of the voting results with that before releasing the voting results. Analysis result shows that the smaller the voting scale is, the more the voters' anonymity loses. In the design of small-scale electronic-voting scheme, releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.

  13. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-06-27

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  14. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  15. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  16. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  17. Voluntary self-touch increases body ownership

    Directory of Open Access Journals (Sweden)

    Masayuki eHara

    2015-10-01

    Full Text Available Experimental manipulations of body ownership have indicated that multisensory integration is central to forming bodily self-representation. Voluntary self-touch is a unique multisensory situation involving corresponding motor, tactile and proprioceptive signals. Yet, even though self-touch is frequent in everyday life, its contribution to the formation of body ownership is not well understood. Here we investigated the role of voluntary self-touch in body ownership using a novel adaptation of the rubber hand illusion (RHI, in which a robotic system and virtual reality allowed participants self-touch of real and virtual hands. In the first experiment, active and passive self-touch were applied in the absence of visual feedback. In the second experiment, we tested the role of visual feedback in this bodily illusion. Finally, in the third experiment, we compared active and passive self-touch to the classical RHI in which the touch is administered by the experimenter. We hypothesized that active self-touch would increase ownership over the virtual hand through the addition of motor signals strengthening the bodily illusion. The results indicated that active self-touch elicited stronger illusory ownership compared to passive self-touch and sensory only stimulation, and indicate an important role of active self-touch in the formation of bodily self.

  18. Voluntary counseling and testing for HIV among high school ...

    African Journals Online (AJOL)

    abp

    2012-09-24

    Sep 24, 2012 ... Key words: HIV, VCT, knowlegde, attitudes, adolescents, youths, ... The questionnaires were administered anonymously to the students in class during their ... Students who said everybody should attend VCT services were 3 ...

  19. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  20. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and

  1. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  2. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  3. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  4. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    NARCIS (Netherlands)

    Soetevent, Adriaan R.

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When

  5. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  6. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  7. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  8. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  9. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  10. Romantic Relationship Advice from Anonymous Online Helpers: The Peer Support Adolescents Exchange

    Science.gov (United States)

    Kim, Jung-Eun; Weinstein, Emily C.; Selman, Robert L.

    2017-01-01

    This empirical study investigates adolescents' responses to peers' personal accounts of romantic relationship difficulties posted to an online forum. We analyze 440 anonymous responses to personal accounts of four romantic relationship issues: controlling partners, break-ups, trust issues, and partner cruelty. Responses were categorized, in order…

  11. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  12. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  13. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  14. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  15. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  16. Counselling Problem Drinkers: The Realm of Specialists, Alcoholics Anonymous or Generic Counsellors?

    Science.gov (United States)

    Wheeler, Sue; Turner, Linda

    1997-01-01

    Investigated counselors' (N=94) attitudes in working with people with drinking problems and their opinions of Alcoholics Anonymous (AA). Results indicate that generic counselors did not feel competent working with these clients; feelings of competence increased with greater experience of the client group. Counselors knew of AA but understood…

  17. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  18. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  19. Making Meaning of Alcoholics Anonymous for Social Workers: Myths, Metaphors, and Realities.

    Science.gov (United States)

    Davis, Diane Rae; Jansen, Golie G.

    1998-01-01

    Addresses common critiques of Alcoholics Anonymous by offering a way of understanding it as a "normative narrative community" where identity transformation takes place through the use of metaphor and storytelling. Suggests alternative meanings of key metaphors, describes areas of program strength and potential barriers for social…

  20. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  1. A Psychological Rationale in Support of the Alcoholics Anonymous' Concept of Fellowship.

    Science.gov (United States)

    Machell, David F.

    1992-01-01

    Develops a theoretical rationale in support of the concept of "fellowship," the healing cornerstone of Alcoholics Anonymous (AA). Reviews supporting literature from the areas of personality theory, group psychotherapy, alcoholism psychopathology, and alcoholism psychological treatment. Suggests a common premise and common ground of…

  2. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  3. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  4. Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s 'A Free and Anonymous Monument'

    Directory of Open Access Journals (Sweden)

    Giuliana Bruno

    2015-02-01

    Full Text Available Translation of the text originally published in Bruno, Giuliana. 2007. “Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s A Free and Anonymous Monument.” In Public Intimacy: Architecture and the Visual Arts, 43-86. Cambridge: MIT Press.

  5. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  6. Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous Anonymous Networks

    CERN Document Server

    Boulinier, Christian

    2007-01-01

    How to pass from local to global scales in anonymous networks? How to organize a selfstabilizing propagation of information with feedback. From the Angluin impossibility results, we cannot elect a leader in a general anonymous network. Thus, it is impossible to build a rooted spanning tree. Many problems can only be solved by probabilistic methods. In this paper we show how to use Unison to design a self-stabilizing barrier synchronization in an anonymous network. We show that the commuication structure of this barrier synchronization designs a self-stabilizing wave-stream, or pipelining wave, in anonymous networks. We introduce two variants of Wave: the strong waves and the wavelets. A strong wave can be used to solve the idempotent r-operator parametrized computation problem. A wavelet deals with k-distance computation. We show how to use Unison to design a self-stabilizing wave stream, a self-stabilizing strong wave stream and a self-stabilizing wavelet stream.

  7. Maintaining the anonymity of cadavers in medical education: Historic relic or educational and ethical necessity?

    Science.gov (United States)

    Jones, D Gareth; King, Mike R

    2017-01-01

    Throughout the modern history of anatomical dissection by medical and other health science students, cadavers have been anonymized. This has meant that students have been provided with limited, if any, information on the identities or medical histories of those they are dissecting. While there was little way around this when the bodies were unclaimed, this need not be the case when the bodies have been donated. However, with a few exceptions, no efforts have been made to change this model. Recent attempts to move anatomy teaching in a more humanistic direction, by emphasizing the cadaver as the students' first patient and with the growth of commemoration services following the dissecting process, raise the question of whether cadavers should continue to be anonymized. In laying a basis for discussion of this matter, we outline what appear to be the virtues of anonymity, and the form that alternatives to anonymity might take. The options identified are nonidentification, low information; nonidentification, moderate information; and identification, full information. The virtues and drawbacks of each of these possibilities are assessed by analyzing their value for students, and also for donors and their families. Policy issues raised by alternatives are also considered. This article provides a basis for continued discussion and suggestions for further research in this area. Anat Sci Educ 10: 87-97. © 2016 American Association of Anatomists.

  8. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  9. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    Directory of Open Access Journals (Sweden)

    Thorben Burghardt

    2011-04-01

    Full Text Available Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper studies this tradeoff systematically. To this end, we implement an algorithm for the anonymization of search histories which is flexible regarding the target function. It can retain frequent terms or terms where corresponding ads are clicked with a high probability, keep up the number of users it can derive interests for, etc. We quantify the usefulness of the anonymized log for ad placement in a broad way, e.g., by estimating the number of ad clicks or of ad impressions, based on marketing data from Yahoo! As a result, anonymized search logs are still useful for ad placement, but this very much depends on the target function.

  10. 5 CFR 831.405 - Interest on voluntary contributions.

    Science.gov (United States)

    2010-01-01

    ....405 Section 831.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE... contributions stop earning interest on the earliest of— (1) The date when OPM authorizes payment to the... voluntary contributions to purchase additional annuity, voluntary contributions stop earning interest on...

  11. Efficiency of voluntary closing hand and hook prostheses

    NARCIS (Netherlands)

    Smit, G.; Plettenburg, D.H.

    2010-01-01

    The Delft Institute of Prosthetics and Orthotics has started a research program to develop an improved voluntary closing, body-powered hand prosthesis. Five commercially available voluntary closing terminal devices were mechanically tested: three hands [Hosmer APRL VC hand, Hosmer Soft VC Male hand,

  12. Voluntary and involuntary adaptation of gait in Parkinson's disease

    NARCIS (Netherlands)

    Zijlstra, W; Rutgers, AWF; Van Weerden, TW

    1998-01-01

    Voluntary and involuntary adaptation of gait in Parkinson's disease (PD) were studied in two separate experiments. In the first experiment, effects of changes in voluntary control were studied by asking PD patients and age-matched healthy subjects to adapt their walking pattern to visual cues result

  13. Re-Examining the Relationship between Age and Voluntary Turnover

    Science.gov (United States)

    Ng, Thomas W. H.; Feldman, Daniel C.

    2009-01-01

    In their quantitative review of the literature, Healy, Lehman, and McDaniel [Healy, M. C., Lehman, M., & McDaniel, M. A. (1995). Age and voluntary turnover: A quantitative review. "Personnel Psychology, 48", 335-345] concluded that age is only weakly related to voluntary turnover (average r = -0.08). However, with the significant changes in…

  14. Conditioning Bottlenose Dolphins (Tursiops Truncatus Gilli) for Voluntary Diving Studies

    Science.gov (United States)

    1992-12-31

    heartrate (EKG) to validate "voluntary" nature of dive EXAMINE ACTIVE DIVING CONDITIONS (open Ocean Mewwmenr) dive profiles using TDR respiration... heartrate electrodes Open Ocean Experiments ’wear instrument package (TDR) perform voluntary dive up to 200 meters readily present tail flukes for

  15. Students' vocational choices and voluntary action: A 12-nation study

    NARCIS (Netherlands)

    D. Haski-Leventhal (Debbie); R.A. Cnaan (Ram); F. Handy (Femida); J.L. Brudney (Jeffrey); K. Holmes (Kirsten); L. Hustinx (Lesley); C. Kang (Chulhee); M. Kassam (Meenaz); L.C.P.M. Meijs (Lucas); B. Ranade (Bhagyashree); N. Yamauchi (Naoto); A.B. Yeung (Anne Birgitta); S. Zrinscak (Sinisa)

    2008-01-01

    textabstractPrevious research on student involvement suggested that business and engineering students manifest lowest rates of voluntary action. Similarly, it was thought that social science students are the most involved in voluntary action, with students of natural sciences and humanities in the m

  16. Integrating Voluntary Simplicity of Lifestyle into Home Economics.

    Science.gov (United States)

    Pestle, Ruth E.

    This curriculum guide presents guidelines for teaching concepts of Voluntary Simplicity in home economics in Florida. (Voluntary Simplicity is a lifestyle in which individuals choose to live more simply, considering the limited nature of the world's resources.) It is designed for use as a separate unit within different subject matter areas or as…

  17. 5 CFR 831.406 - Withdrawal of voluntary contributions.

    Science.gov (United States)

    2010-01-01

    ... precedence set forth in section 8342(c) of title 5, United States Code, is entitled to payment of the balance... contributions. (a) Before receiving additional annuity payments based on the voluntary contributions, a person who has made voluntary contributions may withdraw the balance while still an employee or Member,...

  18. 78 FR 54444 - Advisory Committee on Voluntary Foreign Aid Meeting

    Science.gov (United States)

    2013-09-04

    ...; ] AGENCY FOR INTERNATIONAL DEVELOPMENT Advisory Committee on Voluntary Foreign Aid Meeting AGENCY: United... Aid (ACVFA). Date: Wednesday, September 18, 2013. Time: 2:30 p.m. to 4:00 p.m. Location: Horizon Room..., Executive Director, Advisory Committee on Voluntary Foreign Aid (ACVFA), U.S. Agency for...

  19. 27 CFR 25.221 - Voluntary destruction of beer.

    Science.gov (United States)

    2010-04-01

    ... beer. 25.221 Section 25.221 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Voluntary Destruction § 25.221 Voluntary destruction of beer. (a) On brewery premises. (1) A brewer may destroy, at the brewery, beer on which the tax has...

  20. Voluntary chemical castration of a mental patient.

    Science.gov (United States)

    Brahams, D

    1988-06-01

    Britain's High Court recently overruled two decisions of the Mental Health Act Commission that denied certification of a voluntary experimental drug treatment to a mental patient, holding that the standard for informed consent is determined not by the subjective judgment of the commissioners but by whether the patient knows the nature and likely effects of treatment and that its use in his case is a novel one. The background facts of the case involving a 27-year-old pedophile receiving goserelin implantations to reduce testosterone levels are presented and the issues of jurisdiction under the Mental Health Act 1983 and the commissioners' duty to act fairly and to consider the likely benefits of treatment are discussed.

  1. Lateral asymmetry of voluntary attention orienting

    Directory of Open Access Journals (Sweden)

    B.A. Castro-Barros

    2010-08-01

    Full Text Available We recently demonstrated that automatic attention favors the right side of space and, in the present study, we investigated whether voluntary attention also favors this side. Six reaction time experiments were conducted. In each experiment, 12 new 18-25-year-old male right-handed individuals were tested. In Experiments 1, 2, 3 (a, b and 4 (a, b, tasks with increasing attentional demands were used. In Experiments 1, 2, 3a, and 4a, attention was oriented to one or both sides by means of a central spatially informative visual cue. A left or right side visual target appeared 100, 300, or 500 ms later. Attentional effects were observed in the four experiments. In Experiments 2, 3a and 4a, these effects were greater when the cue indicated the right side than when it indicated the left side (respectively: 16 ± 10 and 44 ± 6 ms, P = 0.015, for stimulus onset asynchrony of 500 ms in Experiment 2; 38 ± 10 and 70 ± 7 ms, P = 0.011, for Experiment 3a, and 23 ± 11 and 61 ± 10 ms, P = 0.009, for Experiment 4a. In Experiments 3b and 4b, the central cue pointed to both sides and was said to be non-relevant for task performance. In these experiments right and left reaction times did not differ. The most conservative interpretation of the present findings is that voluntary attention orienting favors the right side of space, particularly when a difficult task has to be performed.

  2. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  3. Prevalence of HIV among women entering labor who accepted or declined voluntary counseling and testing

    Science.gov (United States)

    Theron, Gerhard B.; Cababasay, Mae P.; Van Dyke, Russell B.; Shapiro, David E.; Louw, Jeanne; Watts, D. Heather; Bulterys, Marc; Styer, Linda M.; Maupin, Robert

    2012-01-01

    Objective To assess whether there was a difference in HIV seroprevalence between eligible women who declined and those who agreed to participate in a study of voluntary counseling and testing among women entering labor with unknown HIV status in South Africa. Methods Anonymous cord blood specimens were collected—as dried blood spots—from all women approached for participation in a cluster-randomized trial. No patient identifiers were included on the cord blood specimens. The dried blood spots were analyzed for HIV antibody via enzyme immunoassay and western blotting. Results Of 7238 women screened for study participation, 1041 (14.4%) had undocumented HIV status; of these women, 542 were eligible for inclusion and 343 enrolled. Based on 513 evaluable samples, the overall seroprevalence was 13.3% (95% confidence interval [CI], 10.4–16.5), which was similar to the 13.1% (95% CI, 9.7–17.2) seroprevalence among the 343 enrolled women. Conclusion Seroprevalence among eligible women was similar to that among enrolled women, which indicates that study participation did not select for a group with an HIV seroprevalence substantially different from that among women who declined to enroll. PMID:23141415

  4. Priming voluntary autobiographical memories: Implications for the organisation of autobiographical memory and voluntary recall processes.

    Science.gov (United States)

    Mace, John H; Clevinger, Amanda M

    2013-01-01

    The goal of this study was to show that voluntary autobiographical memories could be primed by the prior activation of autobiographical memories. Three experiments demonstrated voluntary memory priming with three different approaches. In Experiment 1 primed participants were asked to recall memories from their elementary school years. In a subsequent memory task primed participants were asked to recall memories from any time period, and they produced significantly more memories from their elementary school years than unprimed participants. In Experiment 2 primed participants were asked to recall what they were doing when they had heard various news events occurring between 1998 and 2005. Subsequently these participants produced significantly more memories from this time period than unprimed participants. In Experiment 3 primed participants were asked to recall memories from their teenage years. Subsequently these participants were able to recall more memories from ages 13-15 than unprimed participants, where both had only 1 second to produce a memory. We argue that the results support the notion that episodic memories can activate one another and that some of them are organised according to lifetime periods. We further argue that the results have implications for the reminiscence bump and voluntary recall of the past.

  5. Land Use and Land Cover - MO 2008 Brownfields Voluntary Cleanup Program Sites (SHP)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The Brownfields/Voluntary Cleanup Program (BVCP) provides property buyers, sellers, developers, bankers, development agencies, local government and other voluntary...

  6. Cardiovascular responses to voluntary and nonvoluntary static exercise in humans.

    Science.gov (United States)

    Friedman, D B; Peel, C; Mitchell, J H

    1992-11-01

    We have measured the cardiovascular responses during voluntary and nonvoluntary (electrically induced) one-leg static exercise in humans. Eight normal subjects were studied at rest and during 5 min of static leg extension at 20% of maximal voluntary contraction performed voluntarily and nonvoluntarily in random order. Heart rate (HR), mean arterial pressure (MAP), and cardiac output (CO) were determined, and peripheral vascular resistance (PVR) and stroke volume (SV) were calculated. HR increased from approximately 65 +/- 3 beats/min at rest to 80 +/- 4 and 78 +/- 6 beats/min (P voluntary and nonvoluntary contractions, respectively. CO increased from 5.1 +/- 0.7 to 6.0 +/- 0.8 and 6.2 +/- 0.8 l/min (P voluntary and nonvoluntary contractions, respectively. PVR and SV did not change significantly during voluntary or nonvoluntary contractions. Thus the cardiovascular responses were not different between voluntary and electrically induced contractions. These results suggest that the increases in CO, HR, SV, MAP, and PVR during 5 min of static contractions can be elicited without any contribution from a central neural mechanism (central command). However, central command could still have an important role during voluntary static exercise.

  7. Alcoholics Anonymous

    Science.gov (United States)

    ... Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Faroe Islands Finland France French Polynesia ... Home Site Help Site Map Contact Us Website Feedback AAGRAPEVINE.ORG Terms of use Copyright © 2017 by ...

  8. Voluntary Noise Mapping for Smart City

    Science.gov (United States)

    Poslončec-Petrić, V.; Vuković, V.; Frangeš, S.; Bačić, Ž.

    2016-09-01

    One of the main concept objectives of smart cities is to create a quality living environment that is long-term sustainable and economically justified. In that context, modern cities are aware of the exposure to various forms of physical and non-physical pollution that needs to be remediated, eliminated or reduced. To achieve that it is necessary to quality determine the sources and reasons of each pollution. The most prominent examples of physical pollution that affects the quality of life of citizens in cities are light and noise pollution. Noise pollution or noise, is mostly the consequence of road and rail traffic in cities and it directly affects the health of citizens. Traffic control, reduction of peak congestion, dispersion and traffic redirection or building protective barriers, are ways that cities use to reduce the amount of noise or its effects. To make these measures efficient it is necessary to obtain the information related to the level of noise in certain areas, streets, cities. To achieve this, smart cities use noise mapping. The city of Zagreb since 2012, participates in the i-SCOPE project (interoperable Smart City services trough Open Platform for urban Ecosystems). i-SCOPE delivers an open platform on top of which it develops, three "smart city" services: optimization of energy consumption through a service for accurate assessment of solar energy potential and energy loss at building level, environmental monitoring through a real-time environmental noise mapping service leveraging citizen's involvement will who act as distributed sensors city-wide measuring noise levels through an application on their mobile phones and improved inclusion and personal mobility of aging and diversely able citizens through an accurate personal routing service. The students of Faculty of Geodesy University of Zagreb, who enrolled in the course Thematic Cartography, were actively involved in the voluntary data acquisition in order to monitor the noise in real time

  9. VOLUNTARY NOISE MAPPING FOR SMART CITY

    Directory of Open Access Journals (Sweden)

    V. Poslončec-Petrić

    2016-09-01

    Full Text Available One of the main concept objectives of smart cities is to create a quality living environment that is long-term sustainable and economically justified. In that context, modern cities are aware of the exposure to various forms of physical and non-physical pollution that needs to be remediated, eliminated or reduced. To achieve that it is necessary to quality determine the sources and reasons of each pollution. The most prominent examples of physical pollution that affects the quality of life of citizens in cities are light and noise pollution. Noise pollution or noise, is mostly the consequence of road and rail traffic in cities and it directly affects the health of citizens. Traffic control, reduction of peak congestion, dispersion and traffic redirection or building protective barriers, are ways that cities use to reduce the amount of noise or its effects. To make these measures efficient it is necessary to obtain the information related to the level of noise in certain areas, streets, cities. To achieve this, smart cities use noise mapping. The city of Zagreb since 2012, participates in the i-SCOPE project (interoperable Smart City services trough Open Platform for urban Ecosystems. i-SCOPE delivers an open platform on top of which it develops, three "smart city" services: optimization of energy consumption through a service for accurate assessment of solar energy potential and energy loss at building level, environmental monitoring through a real-time environmental noise mapping service leveraging citizen's involvement will who act as distributed sensors city-wide measuring noise levels through an application on their mobile phones and improved inclusion and personal mobility of aging and diversely able citizens through an accurate personal routing service. The students of Faculty of Geodesy University of Zagreb, who enrolled in the course Thematic Cartography, were actively involved in the voluntary data acquisition in order to monitor the

  10. The spinal reflex cannot be perceptually separated from voluntary movements.

    Science.gov (United States)

    Ghosh, Arko; Haggard, Patrick

    2014-01-01

    Both voluntary and involuntary movements activate sensors in the muscles, skin, tendon and joints. As limb movement can result from a mixture of spinal reflexes and voluntary motor commands, the cortical centres underlying conscious proprioception might either aggregate or separate the sensory inputs generated by voluntary movements from those generated by involuntary movements such as spinal reflexes. We addressed whether healthy volunteers could perceive the contribution of a spinal reflex during movements that combined both reflexive and voluntary contributions. Volunteers reported the reflexive contribution in leg movements that were partly driven by the knee-jerk reflex induced by a patellar tendon tap and partly by voluntary motor control. In one condition, participants were instructed to kick back in response to a tendon tap. The results were compared to reflexes in a resting baseline condition without voluntary movement. In a further condition, participants were instructed to kick forwards after a tap. Volunteers reported the perceived reflex contribution by repositioning the leg to the perceived maximum displacement to which the reflex moved the leg after each tendon tap. In the resting baseline condition, the reflex was accurately perceived. We found a near-unity slope of linear regressions of perceived on actual reflexive displacement. Both the slope value and the quality of regression fit in individual volunteers were significantly reduced when volunteers were instructed to generate voluntary backward kicks as soon as they detected the tap. In the kick forward condition, kinematic analysis showed continuity of reflex and voluntary movements, but the reflex contribution could be estimated from electromyography (EMG) recording on each trial. Again, participants' judgements of reflexes showed a poor relation to reflex EMG, in contrast to the baseline condition. In sum, we show that reflexes can be accurately perceived from afferent information. However

  11. Interaction of Compliance and Voluntary Renewable Energy Markets

    Energy Technology Data Exchange (ETDEWEB)

    Bird, L.; Lokey, E.

    2007-10-01

    In recent years, both compliance and voluntary markets have emerged to help support the development of renewable energy resources. Both of these markets are growing rapidly and today about half of U.S. states have RPS policies in place, with a number of these policies adopted in the last several years. In addition, many states have recently increased the stringency of their RPS policies. This paper examines key market interaction issues between compliance and voluntary renewable energy markets. It provides an overview of both the compliance and voluntary markets, addressing each market's history, purpose, size, scope, and benefits while addressing issues, including double counting.

  12. Interaction of Compliance and Voluntary Renewable Energy Markets

    Energy Technology Data Exchange (ETDEWEB)

    Bird, Lori [National Renewable Energy Lab. (NREL), Golden, CO (United States); Lokey, Elizabeth [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2007-10-01

    In recent years, both compliance and voluntary markets have emerged to help support the development of renewable energy resources. Both of these markets are growing rapidly and today about half of U.S. states have RPS policies in place, with a number of these policies adopted in the last several years. In addition, many states have recently increased the stringency of their RPS policies. This paper examines key market interaction issues between compliance and voluntary renewable energy markets. It provides an overview of both the compliance and voluntary markets, addressing each market's history, purpose, size, scope, and benefits while addressing issues, including double counting.

  13. Ecological Research of the Voluntary Disclosure about Listed Companies

    Science.gov (United States)

    Hu, Jing-Jing; Yan, Guang-Le

    In the paper, the research subject is the ecological relationship between the Small and Medium-sized Enterprises(SMEs) and the Large-scale Enterprises(Les). From the perspective of ecology, setting up the competitive model basic on the Logistic model, and carrying out further analysis about the voluntary information disclosure of listed company, then getting the strategic choice about the voluntary information disclosure and the ecological explanation of false information, and the dynamic mechanism and strategy of the voluntary information disclosure of listed company.

  14. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Directory of Open Access Journals (Sweden)

    Qi Xie

    Full Text Available Telecare Medical Information Systems (TMIS provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  15. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Dong, Na; Wong, Duncan S

    2014-01-01

    Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  16. Distributed anonymous data perturbation method for privacy-preserving data mining

    Institute of Scientific and Technical Information of China (English)

    Feng LI; Jin MA; Jian-hua LI

    2009-01-01

    Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.

  17. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  18. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  19. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  20. A historical review of perceptions of key aspects of spirituality and religion within alcoholics anonymous.

    Science.gov (United States)

    Feigenbaum, Janice Cooke

    2013-01-01

    This historical research aimed to develop an accurate perception of the role of spirituality and religion within the history of Alcoholics Anonymous. Primary and secondary sources were reviewed. The study identified that Bill W. and Dr. Bob established the format for the support group based on the ideas of William James, which formed the base for the Oxford Groups. Alcoholics Anonymous was clearly viewed as a spiritual group and not a religion. The review also showed that the two founders had each experienced one of the two types of spiritual awakenings that James had addressed. These findings will help nurses clarify their own perceptions of this organization so they may accurately educate individuals who they are encouraging to participate in this program while recovering from an addiction.

  1. Young People in Alcoholics Anonymous: the role of spiritual orientation and AA member affiliation.

    Science.gov (United States)

    Galanter, Marc; Dermatis, Helen; Santucci, Courtney

    2012-01-01

    Empirical findings characterizing long-term, committed Alcoholics Anonymous (AA) members are limited, particularly among younger members. The authors studied a sample of 266 highly committed attendees (mean age, 27 years) at an annual conference of Young People in Alcoholics Anonymous (YPAA), whose first encounter with AA was 6 years previously. Most (72%) had abused drugs and alcohol, and 36% had never received substance abuse treatment. They now reported a mean duration of abstinence of 44 months and had attended an average of 233 AA meetings in the previous year; 66% had served as AA sponsors, and 92% reported experiencing an AA "spiritual awakening," itself associated with a decreased likelihood of alcohol craving. Scores on AA beliefs, affiliation to other members, and the experience of spiritual awakening were associated with lower depression scores. These findings are discussed to clarify the nature of long-term AA membership.

  2. The predictive validity of the survey of readiness for alcoholics anonymous participation.

    Science.gov (United States)

    Kingree, Jeffrey B; Simpson, Alpha; Thompson, Martie; McCrady, Barbara; Tonigan, J Scott

    2007-01-01

    This study evaluated the predictive validity of the Survey of Readiness for Alcoholics Anonymous Participation (SYRAAP), which is a 15-item, self-administered instrument. Bivariate and multivariate analyses examined whether responses to the SYRAAP within 1 week of entering substance-use treatment (T1) were associated with posttreatment Alcoholics Anonymous (AA) participation at 3-month (T2) and 6-month (T3) follow-up assessments. The T1 assessment was completed by 268 respondents; the T2 and T3 assessments were completed by 232 (86%) and 217 (81%) respondents, respectively. Results revealed that responses to the SYRAAP at T1 predicted AA participation at T2 and T3. The findings indicate the SYRAAP is a valid measure for assessing readiness for participating in AA. Future research in relation to the SYRAAP and limitations of the current study are discussed.

  3. Teaching internal medicine resident physicians about Alcoholics Anonymous: a pilot study of an educational intervention.

    Science.gov (United States)

    Rose, Adam J; Stein, Melissa R; Arnsten, Julia H; Saitz, Richard

    2006-09-01

    Greater physician confidence in treating alcoholism is associated with a higher frequency of referring alcoholic patients for treatment, but many physicians have limited experience with Alcoholics Anonymous. We implemented a brief, didactic and experiential educational intervention about AA and evaluated its effect on knowledge and attitudes, using a before-after repeated measures study design. Thirty-six first-year internal medicine resident physicians received an educational intervention, which consisted of a 45-minute lecture about AA, a visit to an AA meeting, and a 30-minute debriefing session the next day. Residents' knowledge and attitudes were assessed by a brief written anonymous survey before and after the educational intervention. Residents reported increases in self-perceived knowledge about AA and had more favorable attitudes towards AA after the intervention. Our pilot study shows that a brief, didactic and experiential course can improve physician knowledge and attitudes about AA, and holds promise for improving physician interface with this commonly used intervention.

  4. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    DEFF Research Database (Denmark)

    Abdalla, Michel; Bellare, Mihir; Catalano, Dario

    2005-01-01

    We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7] is comp......We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7......] is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous IBE scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally we suggest three extensions of the basic notions considered here, namely anonymous...... HIBE, public-key encryption with temporary keyword search, and identity-based encryption with keyword search....

  5. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  6. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    Science.gov (United States)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  7. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  8. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    Science.gov (United States)

    2015-05-01

    non- state cyber actors. The Air Force values a professional workplace that strictly prohibits racism , sexism, lewd material, and most forms of...AU/ACSC/LIDOWSKI, R/AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY ANONYMOUS AS A CYBER TRIBE: A NEW MODEL FOR COMPLEX, NON- STATE ...government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United

  9. Lessons in Fluidity: Anonymous and the Communicative Formation of Organizational Identity

    OpenAIRE

    Schoeneborn, Dennis; Dobusch, Leonhard

    2013-01-01

    Most research on organizational identity tends to take an essentialist perspective, differentiating between an identity construed internally by members of the organization and an image construed by external actors. However, the duality of identity and image struggles with capturing more fluid, open, or partial organizational arrangements, where it is difficult to uphold this distinction. Looking at the case of the hacker collective Anonymous as an extreme example of organization, this paper p...

  10. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  11. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  12. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  13. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  14. Corporate volunteering - motivation for voluntary work

    Directory of Open Access Journals (Sweden)

    Debora Azevedo

    2008-07-01

    Full Text Available Nowadays, when the welfare state is a responsibility of the entire society, organizations in the private sector assume co-responsibility for social issues. They are also pressured by the challenges presented by technological advances and the globalization , involving new parameters and requirements for quality. In this context, the concept of Corporate Social Responsibility (RSC emerges as an option for solutions to the issues related to the company and the whole community. Among the actions of the RSC is the Corporate Volunteering-program, which aims to promote / encourage employes to do voluntary work. A central issue when talking about volunteering is the withdrawal of these (SILVA and FEITOSA, 2002; TEODÓSIO, 1999 and, in accordance with the Community Solidarity (1997, one of the possible causes for the withdrawal is the lack of clarity as to the motives and expectations that lead the person to volunteer themselves. This study uses qualitative research and triangulation of feedback from volunteers, coordinators of volunteers and social organizations, to present a framework from which it is possible to analyze the various motivations for the volunteer work. Key words: Corporate Volunteering program. Volunteering. Corporate social responsibility.

  15. Expectations and voluntary attrition in nursing students.

    Science.gov (United States)

    O'Donnell, Hugh

    2011-01-01

    This paper presents a series of findings generated during a larger study which aimed to develop a theoretical understanding of the reasons why nursing students voluntarily leave pre-registration nursing programmes. In this study, significant incongruence was found to exist between student expectations of pre-registration nursing programmes and the reality of these programmes following entry. The resulting dissonance was identified as an important factor in student decisions to voluntarily withdraw. A single case study design was selected to explore the causes of voluntary attrition in nursing students within a School of Nursing and Midwifery. The study population was obtained through purposeful sampling and consisted of 15 students who had previously voluntarily withdrawn from pre-registration nursing programmes. A semi-structured interview method was used to collect data from study participants. The interview schedule developed for use in the study reflected the key components of the conceptual model of higher education (HE) student attrition (Tinto, 1975, 1987, 1993). All interviews were tape recorded to facilitate later transcription. The Cyclical or Interactive Model of Qualitative Research (Miles and Huberman, 1994) was used to analyse data collected from study participants. This paper describes the unrealistic range of expectations which nursing students have of nursing, the information sources and experiences which inform student expectations and how ambiguous expectations contributed to voluntarily attrition.

  16. Perceived coercion in voluntary hospital admission.

    LENUS (Irish Health Repository)

    O'Donoghue, Brian

    2014-01-30

    The legal status of service users admitted to psychiatric wards is not synonymous with the level of coercion that they can perceive during the admission. This study aimed to identify and describe the proportion of individuals who were admitted voluntarily but experienced levels of perceived coercion comparable to those admitted involuntarily. Individuals admitted voluntarily and involuntarily to three psychiatric hospitals were interviewed using the MacArthur Admission Experience Interview and the Structured Clinical Interview for DSM-IV diagnoses. One hundered sixty-one individuals were interviewed and 22% of the voluntarily admitted service users had levels of perceived coercion similar to that of the majority of involuntarily admitted service users. Voluntarily admitted service users who experienced high levels of perceived coercion were more likely to have more severe psychotic symptoms, have experienced more negative pressures and less procedural justices on admission. Individuals brought to hospital under mental health legislation but who subsequently agreed to be admitted voluntarily and those treated on a secure ward also reported higher levels of perceived coercion. It needs to be ensured that if any service user, whether voluntary or involuntary, experiences treatment pressures or coercion that there is sufficient oversight of the practice, to ensure that individual\\'s rights are respected.

  17. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2017-06-01

    Full Text Available Fog-based MANET (Mobile Ad hoc networks is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  18. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  19. Fortified anonymous communication protocol for location privacy in WSN: a modular approach.

    Science.gov (United States)

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-03-10

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

  20. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  1. Apriori-based algorithms for k m-anonymizing trajectory data

    Directory of Open Access Journals (Sweden)

    Giorgos Poulis

    2014-08-01

    Full Text Available The proliferation of GPS-enabled devices (e.g., smartphones and tablets and locationbased social networks has resulted in the abundance of trajectory data. The publication of such data opens up new directions in analyzing, studying and understanding human behavior. However, it should be performed in a privacy-preserving way, because the identities of individuals, whose movement is recorded in trajectories, can be disclosed even after removing identifying information. Existing trajectory data anonymization approaches offer privacy but at a high data utility cost, since they either do not produce truthful data (an important requirement of several applications, or are limited in their privacy specification component. In this work, we propose a novel approach that overcomes these shortcomings by adapting km-anonymity to trajectory data. To realize our approach, we develop three efficient and effective anonymization algorithms that are based on the apriori principle. These algorithms aim at preserving different data characteristics, including location distance and semantic similarity, as well as user-specified utility requirements, which must be satisfied to ensure that the released data can be meaningfully analyzed. Our extensive experiments using synthetic and real datasets verify that the proposed algorithms are efficient and effective at preserving data utility.

  2. On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies

    Directory of Open Access Journals (Sweden)

    Mohammad Rasool Sarrafi Aghdam

    2015-05-01

    Full Text Available K-anonymity is the model that is widely used to protect the privacy of individuals in publishing micro-data. It could be defined as clustering with constrain of minimum k tuples in each group. K-anonymity cuts down the linking confidence between sensitive information and specific individual by the ration of 1/k. However, the accuracy of the data in k-anonymous dataset decreases due to information loss. Moreover, most of the current approaches are for numerical attributes or in case of categorical attributes they require extra information such as attribute hierarchical taxonomies which often do not exist. In this paper we propose a new model, based on clustering, defining the distance between tuples including numerical and categorical attributes which does not require extra information and present the SpatialDistance (SD heuristic algorithm. Comparisons of experimental results on real datasets between SD algorithm and existing well-known algorithms show that SD performs the best and offers much higher data utility and reduces the information loss significantly.

  3. There is no ``I'' in referee: Why referees should be anonymous

    Science.gov (United States)

    Ucko, Daniel

    2015-03-01

    From the early days of modern science, it has been recognized that scientific claims must be verified by someone who is not the maker of those claims, and who furthermore has no stake in the matter. In other words, claims need to be evaluated objectively, by the community. The way in which this tends to be done is by peer review conducted by journals. Peer review as currently practiced touches on the themes of trust, where the trust is in institutions and procedures that emerge from expert communities. The practice of peer review is viewed as a citizenly duty of scientists in the scientific community, because all scientists take turns serving either as authors, referees, and editors in the peer review process We lack the resources to have a work evaluated by the entire community, so we substitute with a representative. Yet, in most examples of scientific review, the referee or referees are anonymous. This question is particularly important when the peer review process is brought to bear in order to evaluate matters beyond scientific validity, more ``subjective'' criteria such as relative importance, broadness of interest - criteria that do not appear to have an objective standard of comparison and validation. I will show that the anonymity of referees, far from endangering this trust, actually strengthens it. I will show that this anonymity is crucial in order to maintain any objectivity in scientific peer review, and why authors should not try to unmask the referee. Also at American Physical Society (APS).

  4. Voluntary work organization in higher educational establishment: theory and practice

    Directory of Open Access Journals (Sweden)

    Sergey V. Polatayko

    2011-01-01

    Full Text Available The article analyses basic questions of voluntary work formation in higher educational establishment, its conceptual and legislative basis, defines basic directions of students agencies activities and forms of their participation in higher educational establishment activities.

  5. Respiratory inductance plethysmography is suitable for voluntary hyperventilation test.

    Science.gov (United States)

    Calabrese, Pascale; Besleaga, Tudor; Eberhard, André; Vovc, Victor; Baconnier, Pierre

    2007-01-01

    The aim of this work was to evaluate the goodness of fit of a signal issued of the respiratory inductance plethysmography (RIP) derivative to the airflow signal during rest, voluntary hyperventilation, and recovery. RIP derivative signal was filtered with an adjusted filter based on each subject airflow signal (pneumotachography). For each subject and for each condition (rest, voluntary hyperventilation, and recovery) comparisons were performed between the airflow signal and the RIP derivative signal filtered with an adjusted filter obtained either on rest signal or on the studied part of the signals (voluntary hyperventilation or recovery). Results show that the goodness of fit was : (1) higher than 90% at almost all comparisons (122 on 132), (2) not improved by applying an adjusted filter obtained on the studied part of the signals. These results suggest that RIP could be used for studying breathing during voluntary hyperventilation and recovery using adjusted filters obtained from comparison to airflow signal at rest.

  6. 78 FR 71476 - Authority for Voluntary Withholding on Other Payments

    Science.gov (United States)

    2013-11-29

    ...)(3) authorizes the Secretary to provide regulations for withholding from (A) remuneration for... AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Temporary regulations. SUMMARY: This document contains temporary regulations under the Internal Revenue Code (Code) relating to voluntary withholding...

  7. Improving Voluntary Environmental Management Programs: Facilitating Learning and Adaptation

    Science.gov (United States)

    Genskow, Kenneth D.; Wood, Danielle M.

    2011-05-01

    Environmental planners and managers face unique challenges understanding and documenting the effectiveness of programs that rely on voluntary actions by private landowners. Programs, such as those aimed at reducing nonpoint source pollution or improving habitat, intend to reach those goals by persuading landowners to adopt behaviors and management practices consistent with environmental restoration and protection. Our purpose with this paper is to identify barriers for improving voluntary environmental management programs and ways to overcome them. We first draw upon insights regarding data, learning, and adaptation from the adaptive management and performance management literatures, describing three key issues: overcoming information constraints, structural limitations, and organizational culture. Although these lessons are applicable to a variety of voluntary environmental management programs, we then present the issues in the context of on-going research for nonpoint source water quality pollution. We end the discussion by highlighting important elements for advancing voluntary program efforts.

  8. Assessing voluntary muscle activation with the twitch interpolation technique.

    Science.gov (United States)

    Shield, Anthony; Zhou, Shi

    2004-01-01

    The twitch interpolation technique is commonly employed to assess the completeness of skeletal muscle activation during voluntary contractions. Early applications of twitch interpolation suggested that healthy human subjects could fully activate most of the skeletal muscles to which the technique had been applied. More recently, however, highly sensitive twitch interpolation has revealed that even healthy adults routinely fail to fully activate a number of skeletal muscles despite apparently maximal effort. Unfortunately, some disagreement exists as to how the results of twitch interpolation should be employed to quantify voluntary activation. The negative linear relationship between evoked twitch force and voluntary force that has been observed by some researchers implies that voluntary activation can be quantified by scaling a single interpolated twitch to a control twitch evoked in relaxed muscle. Observations of non-linear evoked-voluntary force relationships have lead to the suggestion that the single interpolated twitch ratio can not accurately estimate voluntary activation. Instead, it has been proposed that muscle activation is better determined by extrapolating the relationship between evoked and voluntary force to provide an estimate of true maximum force. However, criticism of the single interpolated twitch ratio typically fails to take into account the reasons for the non-linearity of the evoked-voluntary force relationship. When these reasons are examined, it appears that most are even more challenging to the validity of extrapolation than they are to the linear equation. Furthermore, several factors that contribute to the observed non-linearity can be minimised or even eliminated with appropriate experimental technique. The detection of small activation deficits requires high resolution measurement of force and careful consideration of numerous experimental details such as the site of stimulation, stimulation intensity and the number of interpolated

  9. Attendance at Narcotics Anonymous and Alcoholics Anonymous meetings, frequency of attendance and substance use outcomes after residential treatment for drug dependence: a 5-year follow-up study.

    Science.gov (United States)

    Gossop, Michael; Stewart, Duncan; Marsden, John

    2008-01-01

    This study investigates the relationship between frequency of attendance at Narcotics Anonymous and Alcoholics Anonymous (NA/AA) meetings and substance use outcomes after residential treatment of drug dependence. It was predicted that post-treatment NA/AA attendance would be related to improved substance use outcomes. Using a longitudinal, prospective cohort design, interviews were conducted with drug-dependent clients (n = 142) at intake to residential treatment, and at 1 year, 2 years and 4-5 years follow-up. Data were collected by structured interviews. All follow-up interviews were carried out by independent professional interviewers. Abstinence from opiates was increased throughout the 5-year follow-up period compared to pre-treatment levels. Clients who attended NA/AA after treatment were more likely to be abstinent from opiates at follow-up. Abstinence from stimulants increased at follow-up but (except at 1-year follow-up) no additional benefit was found for NA/AA attendance. There was no overall change in alcohol abstinence after treatment but clients who attended NA/AA were more likely to be abstinent from alcohol at all follow-up points. More frequent NA/AA attenders were more likely to be abstinent from opiates and alcohol when compared both to non-attenders and to infrequent (less than weekly) attenders. NA/AA can support and supplement residential addiction treatment as an aftercare resource. In view of the generally poor alcohol use outcomes achieved by drug-dependent patients after treatment, the improved alcohol outcomes of NA/AA attenders suggests that the effectiveness of existing treatment services may be improved by initiatives that lead to increased involvement and engagement with such groups.

  10. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    Science.gov (United States)

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  11. Voluntary reaction time and long-latency reflex modulation.

    Science.gov (United States)

    Forgaard, Christopher J; Franks, Ian M; Maslovat, Dana; Chin, Laurence; Chua, Romeo

    2015-12-01

    Stretching a muscle of the upper limb elicits short (M1) and long-latency (M2) reflexes. When the participant is instructed to actively compensate for a perturbation, M1 is usually unaffected and M2 increases in size and is followed by the voluntary response. It remains unclear if the observed increase in M2 is due to instruction-dependent gain modulation of the contributing reflex mechanism(s) or results from voluntary response superposition. The difficulty in delineating between these alternatives is due to the overlap between the voluntary response and the end of M2. The present study manipulated response accuracy and complexity to delay onset of the voluntary response and observed the corresponding influence on electromyographic activity during the M2 period. In all active conditions, M2 was larger compared with a passive condition where participants did not respond to the perturbation; moreover, these changes in M2 began early in the appearance of the response (∼ 50 ms), too early to be accounted for by voluntary overlap. Voluntary response latency influenced the latter portion of M2, with the largest activity seen when accuracy of limb position was not specified. However, when participants aimed for targets of different sizes or performed movements of various complexities, reaction time differences did not influence M2 period activity, suggesting voluntary activity was sufficiently delayed. Collectively, our results show that while a perturbation applied to the upper limbs can trigger a voluntary response at short latency (reflex gain modulation remains an important contributor to EMG changes during the M2 period. Copyright © 2015 the American Physiological Society.

  12. Voluntary "involuntary" commitment--the briar-patch syndrome.

    Science.gov (United States)

    Miller, R D

    1980-01-01

    Szasz and others have pointed out that many so-called voluntary admissions to mental hospitals have various elements of coercion involved, and are thus not truly voluntary. The author contends that the converse situation is also true, that many patients admitted under involuntary commitment papers arrange for their own commitments. Reasons for such choices are discussed in the context of a review of the literature and several case histories.

  13. Voluntary euthanasia under control? Further empirical evidence from The Netherlands.

    Science.gov (United States)

    Jochemsen, H; Keown, J

    1999-01-01

    Nineteen ninety-six saw the publication of a major Dutch survey into euthanasia in the Netherlands. This paper outlines the main statistical findings of this survey and considers whether it shows that voluntary euthanasia is under effective control in the Netherlands. The paper concludes that although there has been some improvement in compliance with procedural requirements, the practice of voluntary euthanasia remains beyond effective control. PMID:10070633

  14. Students' vocational choices and voluntary action: A 12-nation study

    OpenAIRE

    Haski-Leventhal, Debbie; Cnaan, Ram; Handy, Femida; Brudney, Jeffrey; Holmes, Kirsten; Hustinx, Lesley; Kang, ChulHee; Kassam, Meenaz; Meijs, Lucas; Ranade, Bhagyashree; Yamauchi, Naoto; Yeung, Anne Birgitta; Zrinscak, Sinisa

    2008-01-01

    textabstractPrevious research on student involvement suggested that business and engineering students manifest lowest rates of voluntary action. Similarly, it was thought that social science students are the most involved in voluntary action, with students of natural sciences and humanities in the middle. However, there were very few studies that empirically compared these assertions. Furthermore, these assertions were not investigated from cross-cultural perspectives. Based on a study of stu...

  15. The We and the I: The Logic of Voluntary Associations

    OpenAIRE

    Melnik, Ekaterina; Zimmermann, Jean-Benoît

    2015-01-01

    This paper sheds new light on the economic logic of voluntary associations and the relationship between individual contribution and collective action. The aims are twofold. Firstly, we seek to explain how "team reasoning" (Bacharach et al. 2006) can deeply change the functioning of voluntary associations (which are considered to produce a public good) when some or all of the individual members group together to make collective decisions about their involvement or contribution, rather than dec...

  16. Interaction of poststroke voluntary effort and functional neuromuscular electrical stimulation.

    Science.gov (United States)

    Makowski, Nathaniel; Knutson, Jayme; Chae, John; Crago, Patrick

    2013-01-01

    Functional electrical stimulation (FES) may be able to augment functional arm and hand movement after stroke. Poststroke neuroprostheses that incorporate voluntary effort and FES to produce the desired movement must consider how forces generated by voluntary effort and FES combine, even in the same muscle, in order to provide an appropriate level of stimulation to elicit the desired assistive force. The goal of this study was to determine whether the force produced by voluntary effort and FES add together independently of effort or whether the increment in force depends on the level of voluntary effort. Isometric force matching tasks were performed under different combinations of voluntary effort and FES. Participants reached a steady level of force, and while attempting to maintain a constant effort level, FES was applied to augment the force. Results indicate that the increment in force produced by FES decreases as the level of initial voluntary effort increases. Potential mechanisms causing the change in force output are proposed, but the relative contribution of each mechanism is unknown.

  17. Comparison of body-powered voluntary opening and voluntary closing prehensor for activities of daily life

    Directory of Open Access Journals (Sweden)

    Kelsey Berning

    2014-05-01

    Full Text Available Persons with an upper-limb amputation who use a body-powered prosthesis typically control the prehensor through contralateral shoulder movement, which is transmitted through a Bowden cable. Increased cable tension either opens or closes the prehensor; when tension is released, some passive element, such as a spring, returns the prehensor to the default state (closed or open. In this study, we used the Southampton Hand Assessment Procedure to examine functional differences between these two types of prehensors in 29 nondisabled subjects (who used a body-powered bypass prosthesis and 2 persons with unilateral transradial amputations (who used a conventional body-powered device. We also administered a survey to determine whether subjects preferred one prehensor or the other for specific tasks, with a long-term goal of assessing whether a prehensor that could switch between both modes would be advantageous. We found that using the voluntary closing prehensor was 1.3 s faster (p = 0.02 than using the voluntary opening prehensor, across tasks, and that there was consensus among subjects on which types of tasks they preferred to do with each prehensor type. Twenty-five subjects wanted a device that could switch between the two modes in order to perform particular tasks.

  18. Hedonic value of intentional action provides reinforcement for voluntary generation but not voluntary inhibition of action.

    Science.gov (United States)

    Parkinson, Jim; Haggard, Patrick

    2013-12-01

    Intentional inhibition refers to stopping oneself from performing an action at the last moment, a vital component of self-control. It has been suggested that intentional inhibition is associated with negative hedonic value, perhaps due to the frustration of cancelling an intended action. Here we investigate hedonic implications of the free choice to act or inhibit. Participants gave aesthetic ratings of arbitrary visual stimuli that immediately followed voluntary decisions to act or to inhibit action. We found that participants for whom decisions to act produced a strong positive hedonic value for the immediately following visual stimulus made more choices to act than those with weaker hedonic value for action. This finding is consistent with reinforcement learning of action decisions. However, participants who experienced inhibition as generating more positive hedonic value did not choose to inhibit more than other participants. Thus, voluntary inhibition of action did not act as reinforcement for future inhibitory behaviour. Our finding that inhibition of action lacks motivational capacity may explain why self-control is both difficult and limited.

  19. Comparison of body-powered voluntary opening and voluntary closing prehensor for activities of daily life.

    Science.gov (United States)

    Berning, Kelsey; Cohick, Sarah; Johnson, Reva; Miller, Laura Ann; Sensinger, Jonathon W

    2014-01-01

    Persons with an upper-limb amputation who use a body-powered prosthesis typically control the prehensor through contralateral shoulder movement, which is transmitted through a Bowden cable. Increased cable tension either opens or closes the prehensor; when tension is released, some passive element, such as a spring, returns the prehensor to the default state (closed or open). In this study, we used the Southampton Hand Assessment Procedure to examine functional differences between these two types of prehensors in 29 nondisabled subjects (who used a body-powered bypass prosthesis) and 2 persons with unilateral transradial amputations (who used a conventional body-powered device). We also administered a survey to determine whether subjects preferred one prehensor or the other for specific tasks, with a long-term goal of assessing whether a prehensor that could switch between both modes would be advantageous. We found that using the voluntary closing prehensor was 1.3 s faster (p = 0.02) than using the voluntary opening prehensor, across tasks, and that there was consensus among subjects on which types of tasks they preferred to do with each prehensor type. Twenty-five subjects wanted a device that could switch between the two modes in order to perform particular tasks.

  20. Voluntary control of human jaw stiffness.

    Science.gov (United States)

    Shiller, Douglas M; Houle, Guillaume; Ostry, David J

    2005-09-01

    Recent studies of human arm movement have suggested that the control of stiffness may be important both for maintaining stability and for achieving differences in movement accuracy. In the present study, we have examined the voluntary control of postural stiffness in 3D in the human jaw. The goal is to address the possible role of stiffness control in both stabilizing the jaw and in achieving the differential precision requirements of speech sounds. We previously showed that patterns of kinematic variability in speech are systematically related to the stiffness of the jaw. If the nervous system uses stiffness control as a means to regulate kinematic variation in speech, it should also be possible to show that subjects can voluntarily modify jaw stiffness. Using a robotic device, a series of force pulses was applied to the jaw to elicit changes in stiffness to resist displacement. Three orthogonal directions and three magnitudes of forces were tested. In all conditions, subjects increased the magnitude of jaw stiffness to resist the effects of the applied forces. Apart from the horizontal direction, greater increases in stiffness were observed when larger forces were applied. Moreover, subjects differentially increased jaw stiffness along a vertical axis to counteract disturbances in this direction. The observed changes in the magnitude of stiffness in different directions suggest an ability to control the pattern of stiffness of the jaw. The results are interpreted as evidence that jaw stiffness can be adjusted voluntarily, and thus may play a role in stabilizing the jaw and in controlling movement variation in the orofacial system.

  1. Neuronal correlates of voluntary facial movements.

    Science.gov (United States)

    Krippl, Martin; Karim, Ahmed A; Brechmann, André

    2015-01-01

    Whereas the somatotopy of finger movements has been extensively studied with neuroimaging, the neural foundations of facial movements remain elusive. Therefore, we systematically studied the neuronal correlates of voluntary facial movements using the Facial Action Coding System (FACS, Ekman et al., 2002). The facial movements performed in the MRI scanner were defined as Action Units (AUs) and were controlled by a certified FACS coder. The main goal of the study was to investigate the detailed somatotopy of the facial primary motor area (facial M1). Eighteen participants were asked to produce the following four facial movements in the fMRI scanner: AU1+2 (brow raiser), AU4 (brow lowerer), AU12 (lip corner puller) and AU24 (lip presser), each in alternation with a resting phase. Our facial movement task induced generally high activation in brain motor areas (e.g., M1, premotor cortex, supplementary motor area, putamen), as well as in the thalamus, insula, and visual cortex. BOLD activations revealed overlapping representations for the four facial movements. However, within the activated facial M1 areas, we could find distinct peak activities in the left and right hemisphere supporting a rough somatotopic upper to lower face organization within the right facial M1 area, and a somatotopic organization within the right M1 upper face part. In both hemispheres, the order was an inverse somatotopy within the lower face representations. In contrast to the right hemisphere, in the left hemisphere the representation of AU4 was more lateral and anterior compared to the rest of the facial movements. Our findings support the notion of a partial somatotopic order within the M1 face area confirming the "like attracts like" principle (Donoghue et al., 1992). AUs which are often used together or are similar are located close to each other in the motor cortex.

  2. Neuronal correlates of voluntary facial movements

    Directory of Open Access Journals (Sweden)

    Martin eKrippl

    2015-10-01

    Full Text Available Whereas the somatotopy of finger movements has been extensively studied with neuroimaging, the neural foundations of facial movements remain elusive. Therefore, we systematically studied the neuronal correlates of voluntary facial movements using the Facial Action Coding System (FACS,Ekman et al., 2002. The facial movements performed in the MRI scanner were defined as Action Units (AUs and were controlled by a certified FACS coder. The main goal of the study was to investigate the detailed somatotopy of the facial primary motor area (facial M1. Eighteen participants were asked to produce the following four facial movements in the fMRI scanner: AU1+2 (brow raiser, AU4 (brow lowerer, AU12 (lip corner puller and AU24 (lip presser, each in alternation with a resting phase.Our facial movement task induced generally high activation in brain motor areas (e.g. M1, premotor cortex, SMA, putamen, as well as in the thalamus, insula and visual cortex. BOLD activations revealed overlapping representations for the four facial movements. However, within the activated facial M1 areas, we could find distinct peak activities in the left and right hemisphere supporting a rough somatotopic upper to lower face organization within the right facial M1 area, and a somatotopic organization within the right M1 upper face part. In both hemispheres, the order was an inverse somatotopy within the lower face representations. In contrast to the right hemisphere, in the left hemisphere the representation of AU 4 was more lateral and anterior compared to the rest of the facial movements. Our findings support the notion of a partial somatotopic order within the M1 face area confirming the like attracts like principle (Donoghue et al., 1992 . AUs which are often used together or are similar are located close to each other in the motor cortex.

  3. Cortical potentials associated with voluntary mandibular movements.

    Science.gov (United States)

    Yoshida, K; Kaji, R; Hamano, T; Kohara, N; Kimura, J; Shibasaki, H; Iizuka, T

    2000-07-01

    Movement-related cortical potentials (MRCPs) are negative potentials over the scalp, which gradually increase prior to voluntary movements, and might be applied to elucidate the cortical efferent function of the mandibular movements. We compared the MRCPs accompanying various mandibular movements to study the motor control mechanism underlying these movements. Electroencephalograms (EEGs) were recorded from 11 electrodes placed over the scalp (F3, Fz, F4, T3, C3, Cz, C4, T4, P3, Pz, and P4), according to the International 10-20 System, and electromyograms (EMGs) were obtained from surface electrodes over the masseter muscle and the anterior belly of the digastric muscle. Ten healthy subjects were requested to make brisk and self-paced mandibular movements in 4 different directions (mouth-opening and -closing, and left and right lateral movements). We obtained MRCPs by averaging the EEG, using the visually determined EMG onset as a trigger signal. In all the movements, a slowly increasing, bilaterally widespread negativity starting 1.5 to 2.0 sec before the EMG onset (Bereitschaftspotential, or BP proper) was observed, with the maximum over the vertex region. The negative slope (NS') occurred about 300 to 700 msec before the EMG onset. The cortical maps of BP/NS' (BP and NS' combined), immediately prior to the mouth-opening and closing, showed a symmetrical distribution, whereas that for the lateral movements showed a tendency of predominance over the hemisphere ipsilateral to the direction of the movement. BP/NS' amplitudes at the onset of movement differed significantly or tended to do so between open, close, and lateral movements, suggesting that MRCP recordings may thus provide a means to explore the role of the cerebral cortex in the control of mandibular movements.

  4. Voluntary organizations in development in South Asia.

    Science.gov (United States)

    Maloney, C

    1987-01-01

    The governments of South Asian countries have become aware of the substantial role that nongovernment organizations (NGOs) or voluntary agencies can play in rural development and other nation building activities. Although private agencies cannot substitute for government programs, there is general consensus that NGOs use development funds more efficiently and innovatively than government programs. NGOs in Bangladesh, India, and Pakistan exemplify the influence these organizations have on development in South Asia. The Lutheran World Service in Bangladesh, a foreign origin NGO, has branched out from its original aim of providing relief and war rehabilitation to give skills training and technical assistance to the poor. The Bangladesh Rural Advancement Committee, an indigenous NGO, works for the well-being and self-reliance of the landless poor, those with very small farms, and women. NGOs in Bangladesh have been especially innovative in developing methods to encourage self-help, such as local organization and credit, which are often combined with training in practical skills, literacy, nutrition, and family planning. Present NGO activity in India is dominated by the Gandhian tradition. There is a potential conflict between the philosophy of the NGO's in terms of building on the people's felt needs from the bottom up and the tendency of government agencies to want to plan for the people. In Pakistan, the concept of development-oriented NGOs is recent and not yet strong, although the government has adopted a policy of routing funds from government and from bilateral donor agencies through NGOs in 2 areas--family planning and women's welfare. The chief limitation of NGOs is their scope, meaning that the major burden of the development process rests on government agencies.

  5. 基于匿名化流表的网络数据分组实时匿名方法%Online trace anonymization based on anonymous flow table

    Institute of Scientific and Technical Information of China (English)

    韩春静; 葛敬国; 谢高岗; 李亮雄; 李佟; 刘韵洁

    2016-01-01

    A real-time network packet anonymous method named Fad-Pan (online trace anonymization based on the anonymous flow table) was proposed. The Fad-Pan algorithm was studied and an online trace anonymization prototype system based on DPDK library was developed. The experimental results prove that the Fad-Pan algorithm is faster more than 20 times than the existing method, and a single server can handle the real-time IPv4 and IPv6 traffic of the 10 Gbit/s link used by the Fad-Pan.%提出了基于匿名化流表的网络数据分组实时匿名方法(Fad-Pan,online trace anonymization based on the anonymous flow table),主要研究Fad-Pan算法以及研发基于DPDK的Fad-Pan原型系统。实验结果表明,Fad-Pan算法比已有的方法在匿名化速度上提高了20倍以上,单个普通服务器可以实时处理万兆链路的IPv4和IPv6流量数据。

  6. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994

    Energy Technology Data Exchange (ETDEWEB)

    Fields, C.A.

    1994-09-01

    This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.

  7. Opt-out HIV testing in prison: informed and voluntary?

    Science.gov (United States)

    Rosen, David L; Golin, Carol E; Grodensky, Catherine A; May, Jeanine; Bowling, J Michael; DeVellis, Robert F; White, Becky L; Wohl, David A

    2015-01-01

    HIV testing in prison settings has been identified as an important mechanism to detect cases among high-risk, underserved populations. Several public health organizations recommend that testing across health-care settings, including prisons, be delivered in an opt-out manner. However, implementation of opt-out testing within prisons may pose challenges in delivering testing that is informed and understood to be voluntary. In a large state prison system with a policy of voluntary opt-out HIV testing, we randomly sampled adult prisoners in each of seven intake prisons within two weeks after their opportunity to be HIV tested. We surveyed prisoners' perception of HIV testing as voluntary or mandatory and used multivariable statistical models to identify factors associated with their perception. We also linked survey responses to lab records to determine if prisoners' test status (tested or not) matched their desired and perceived test status. Thirty-eight percent (359/936) perceived testing as voluntary. The perception that testing was mandatory was positively associated with age less than 25 years (adjusted relative risk [aRR]: 1.45, 95% confidence interval [CI]: 1.24, 1.71) and preference that testing be mandatory (aRR: 1.81, 95% CI: 1.41, 2.31) but negatively associated with entry into one of the intake prisons (aRR: 0.41 95% CI: 0.27, 0.63). Eighty-nine percent of prisoners wanted to be tested, 85% were tested according to their wishes, and 82% correctly understood whether or not they were tested. Most prisoners wanted to be HIV tested and were aware that they had been tested, but less than 40% understood testing to be voluntary. Prisoners' understanding of the voluntary nature of testing varied by intake prison and by a few individual-level factors. Testing procedures should ensure that opt-out testing is informed and understood to be voluntary by prisoners and other vulnerable populations.

  8. Blinded Anonymization: a method for evaluating cancer prevention programs under restrictive data protection regulations.

    Science.gov (United States)

    Bartholomäus, Sebastian; Hense, Hans Werner; Heidinger, Oliver

    2015-01-01

    Evaluating cancer prevention programs requires collecting and linking data on a case specific level from multiple sources of the healthcare system. Therefore, one has to comply with data protection regulations which are restrictive in Germany and will likely become stricter in Europe in general. To facilitate the mortality evaluation of the German mammography screening program, with more than 10 Million eligible women, we developed a method that does not require written individual consent and is compliant to existing privacy regulations. Our setup is composed of different data owners, a data collection center (DCC) and an evaluation center (EC). Each data owner uses a dedicated software that preprocesses plain-text personal identifiers (IDAT) and plaintext evaluation data (EDAT) in such a way that only irreversibly encrypted record assignment numbers (RAN) and pre-aggregated, reversibly encrypted EDAT are transmitted to the DCC. The DCC uses the RANs to perform a probabilistic record linkage which is based on an established and evaluated algorithm. For potentially identifying attributes within the EDAT ('quasi-identifiers'), we developed a novel process, named 'blinded anonymization'. It allows selecting a specific generalization from the pre-processed and encrypted attribute aggregations, to create a new data set with assured k-anonymity, without using any plain-text information. The anonymized data is transferred to the EC where the EDAT is decrypted and used for evaluation. Our concept was approved by German data protection authorities. We implemented a prototype and tested it with more than 1.5 Million simulated records, containing realistically distributed IDAT. The core processes worked well with regard to performance parameters. We created different generalizations and calculated the respective suppression rates. We discuss modalities, implications and limitations for large data sets in the cancer registry domain, as well as approaches for further

  9. The general alcoholics anonymous tools of recovery: the adoption of 12-step practices and beliefs.

    Science.gov (United States)

    Greenfield, Brenna L; Tonigan, J Scott

    2013-09-01

    Working the 12 steps is widely prescribed for Alcoholics Anonymous (AA) members although the relative merits of different methods for measuring step work have received minimal attention and even less is known about how step work predicts later substance use. The current study (1) compared endorsements of step work on an face-valid or direct measure, the Alcoholics Anonymous Inventory (AAI), with an indirect measure of step work, the General Alcoholics Anonymous Tools of Recovery (GAATOR); (2) evaluated the underlying factor structure of the GAATOR and changes in step work over time; (3) examined changes in the endorsement of step work over time; and (4) investigated how, if at all, 12-step work predicted later substance use. New AA affiliates (N = 130) completed assessments at intake, 3, 6, and 9 months. Significantly more participants endorsed step work on the GAATOR than on the AAI for nine of the 12 steps. An exploratory factor analysis revealed a two-factor structure for the GAATOR comprising behavioral step work and spiritual step work. Behavioral step work did not change over time, but was predicted by having a sponsor, while Spiritual step work decreased over time and increases were predicted by attending 12-step meetings or treatment. Behavioral step work did not prospectively predict substance use. In contrast, spiritual step work predicted percent days abstinent. Behavioral step work and spiritual step work appear to be conceptually distinct components of step work that have distinct predictors and unique impacts on outcomes. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  10. Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting

    Science.gov (United States)

    van de Graaf, Jeroen

    All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[1], which uses blind signatures so that the voter can obtain a valid ballot. However, instead of using a MIX net, we use a new broadcast protocol for anonymously publishing the vote, a Non-Interactive variation of the Dining Cryptographer Net.

  11. Community-Acquired Pneumonia Case Validation in an Anonymized Electronic Medical Record-Linked Expert System.

    Science.gov (United States)

    Mukhopadhyay, Amartya; Maliapen, Mahendran; Ong, Venetia; Jakes, Rupert W; Mundy, Linda M; Jialiang, Li; Tambyah, Paul A

    2017-05-15

    An electronic anonymized patient portal analysis using radiographic reports and admission and discharge diagnoses had sensitivity, specificity, positive predictive value, and negative predictive value of 84.7%, 78.2%, 75%, and 87%, respectively, for community-acquired pneumonia validated against a blinded expert medical review. This approach can help to track antimicrobial use and resistance. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America. All rights reserved. For permissions, e-mail: journals.permissions@oup.com.

  12. An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity

    Science.gov (United States)

    Li, Wei; Fan, Ming-Yu; Wang, Guang-Wei

    2012-12-01

    In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed. In this scheme a message to be signed is coded with unitary operators. Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message. Combining the entangled states generated by the TTP's Bell measurement with the signature information, the verifier can verify the authentication of a signature through a single quantum state measurement. Compared with previous schemes, our scheme is more efficient and less complex, furthermore, our scheme can ensure the anonymity of the signer.

  13. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  14. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  15. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  16. The Impact of Alcoholics Anonymous on other substance abuse related Twelve Step programs

    Science.gov (United States)

    Laudet, Alexandre B.

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the 12-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery 12-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug dependent populations, many of whom are cross-addicted to alcohol. Future directions in 12-step research are noted in closing. PMID:19115764

  17. The impact of alcoholics anonymous on other substance abuse-related twelve-step programs.

    Science.gov (United States)

    Laudet, Alexandre B

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the twelve-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery twelve-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug-dependent populations, many of whom are cross-addicted to alcohol. Future directions in twelve-step research are noted in closing.

  18. The Anexo in Northern California: An Alcoholics Anonymous-Based Recovery Residence in Latino Communities.

    Science.gov (United States)

    Garcia, Victor; Pagano, Anna; Recarte, Carlos; Lee, Juliet P

    2017-01-01

    Our ethnographic study on help-seeking pathways of Latino immigrants in northern California reveals that they turn to anexos in their treatment and recovery quest. Anexos are linguistically- and culturally-specific recovery houses with origins in Mexico and Alcoholics Anonymous and a long history in Latino communities across the United States. Drawing on the findings of our study, we characterize the anexos and compare them to other recovery residences using National Alliance for Recovery Residences (NARR) criteria. The description and comparison reveal that anexos cannot be placed into a single NARR residence category. We discuss why this is the case.

  19. [Sexual behavior characteristics of clients attending the Israel AIDS Task Force anonymous clinic in Tel Aviv].

    Science.gov (United States)

    Bar-On, Yaeli; Perry, Zvi H; Nof, Einav; Shiber, Asher; Risenberg, Klaris; Ben Zion, Itzhak

    2014-09-01

    Until now, research on sexual behavior and HIV in Israel has been carried out mainly on the general population, and focused primarily on defining populations at risk, without adequate consideration given to the reasons bringing these populations to be tested, and their specific sexual behaviors. In Israel, one can choose whether to take an HIV test in confidential centers (giving one's name under medical confidentiality) or in anonymous centers (Israel AIDS Task Force in Tel Aviv and Beer Sheva, Levinsky Clinic in Tel Aviv and Haparsim Clinic in Haifa]. At least 21% of the clients of the anonymous testing centers in Israel belong to a high risk population in contrast to 2.6% in confidential clinics, and so, in this study, we hypothesize that characterization of sexual behavior patterns in anonymous testing centers might enable us to better characterize sexual behavior patterns in high risk populations. In this cross-sectional study, we used questionnaires distributed in the clinics by the Israel AIDS Task Force in order to characterize their clinic's clients. The questionnaires were completed by the Israel AIDS Task Force consultants during the consultation period at which the anonymous test was performed. Data collected included: gender, age, testing history, specific sexual behaviors and reasons for applying for the current test. A total of 926 questionnaires were collected; 29.9% of them were of female patients. The average age was 29.47 years (1±8.66]; 21.3% of the clients were men who have sex with men [MSM]; only 2.3% of the clients belonged to other high risk populations. In all groups, the majority of the patients reported high risk sexual behavior (any sexual contact without a condom) and the average age for the first test was much higher than the average age of first sexual intercourse common in Israel. Women reported more participation in unprotected vaginal intercourse than heterosexual men, and a substantial part of MSM reported performing unprotected

  20. Probability-based location anonymity algorithm%利用概率的位置匿名算法

    Institute of Scientific and Technical Information of China (English)

    闫玉双; 谭示崇; 赵大为

    2015-01-01

    k匿名模型是一种有效的位置隐私保护技术,通过构造包含需要保护的用户在内的 k 个正在发送请求的用户的匿名区域,达到保护用户位置的目的。但是现有的 k匿名模型仅能利用当前正在发送请求的用户,当同时发送请求用户较少时,就会导致匿名区域过大。为此,提出一种利用概率的位置匿名算法来保护路网中的移动用户的位置,利用当前时刻的不活跃用户的历史位置轨迹,计算出进入匿名路段的概率,可明显减小匿名路段长度。实验结果证明,基于概率的位置匿名算法与一般的 k 匿名模型相比较,提高了匿名效率。%As one of the most effective location privacy preservation technologies , the k‐anonymity model provides safeguards for location privacy of the mobile client against vulnerabilities for abuse by constructing an anonymous area of k users including the protected one . However , most existing k‐anonymity models only utilize the users who are sending requests at recent time . If there are not enough requesting users , the generated anonymous area of the k‐anonymity model will be larger than expected . In this paper , a Probability‐based Location Anonymity ( PLA ) algorithm is proposed for protecting location privacy of the mobile users in a road network . The PLA model takes advantage of the historical path track of the users who are not sending the request currently , and then computes the probability into the anonymous section so that it can greatly reduce the size of the anonymous area . Experimental results show that the PLA algorithm is superior to the k‐anonymity and it increases its anonymous efficiency enormously .

  1. Redefining RECs: Additionality in the voluntary Renewable Energy Certificate market

    Science.gov (United States)

    Gillenwater, Michael Wayne

    In the United States, electricity consumers are told that they can "buy" electricity from renewable energy projects, versus fossil fuel-fired facilities, through participation in a voluntary green power program. The marketing messages communicate to consumers that their participation and premium payments for a green label will cause additional renewable energy generation and thereby allow them to claim they consume electricity that is absent pollution as well as reduce pollutant emissions. Renewable Energy Certificates (RECs) and wind energy are the basis for the majority of the voluntary green power market in the United States. This dissertation addresses the question: Do project developers respond to the voluntary REC market in the United States by altering their decisions to invest in wind turbines? This question is investigated by modeling and probabilistically quantifying the effect of the voluntary REC market on a representative wind power investor in the United States using data from formal expert elicitations of active participants in the industry. It is further explored by comparing the distribution of a sample of wind power projects supplying the voluntary green power market in the United States against an economic viability model that incorporates geographic factors. This dissertation contributes the first quantitative analysis of the effect of the voluntary REC market on project investment. It is found that 1) RECs should be not treated as equivalent to emission offset credits, 2) there is no clearly credible role for voluntary market RECs in emissions trading markets without dramatic restructuring of one or both markets and the environmental commodities they trade, and 3) the use of RECs in entity-level GHG emissions accounting (i.e., "carbon footprinting") leads to double counting of emissions and therefore is not justified. The impotence of the voluntary REC market was, at least in part, due to the small magnitude of the REC price signal and lack of

  2. Market Motivations for Voluntary Carbon Disclosure in Real Estate Industry

    Science.gov (United States)

    Ufere, Kalu Joseph; Alias, Buang; Godwin Uche, Aliagha

    2016-07-01

    Climate change mitigation in developing economies is a balancing act, between economic development and environmental sustainability. The need for market friendly determinants for low carbon economy, without compromising economic development is of essence. The aim of the study is to determine market friendly factors, which motivates voluntary carbon information disclosure, in the real estate industry. The study modeled economic factor with three variables and financial market factor with three variables against voluntary carbon information disclosure in the real estate industry. Structural equation modeling was used for the modeling and content analysis was used to collect data on the level of voluntary carbon information disclosure, from 2013 annual reports of 126 real estate sector companies listed in the Kuala Lumpur Stock Exchange (KLSE). The model achieved a good fit, and was acceptable prediction. The results show that financial market factor has a significant predictive influence on voluntary carbon disclosure. The application of the result is that financial market factor is has a significantly positive influence on companies’ willingness to make voluntary carbon disclosure in the real estate industry. The result may be limited to the real estate industry that is highly leveraged on syndicated fund.

  3. Opt-out of voluntary HIV testing: a Singapore hospital's experience.

    Directory of Open Access Journals (Sweden)

    Arlene C Chua

    Full Text Available INTRODUCTION: Since 2008, the Singapore Ministry of Health (MOH has expanded HIV testing by increasing anonymous HIV test sites, as well as issuing a directive to hospitals to offer routine voluntary opt out inpatient HIV testing. We reviewed this program implemented at the end of 2008 at Tan Tock Seng Hospital (TTSH, the second largest acute care general hospital in Singapore. METHODS AND FINDINGS: From January 2009 to December 2010, all inpatients aged greater or equal than 21 years were screened for HIV unless they declined or were not eligible for screening. We reviewed the implementation of the Opt Out testing policy. There were a total of 93,211 admissions; 41,543 patients were included based on HIV screening program eligibility criteria. Among those included, 79% (n = 32,675 opted out of HIV screening. The overall acceptance rate was 21%. Majority of eligible patients who were tested (63% were men. The mean age of tested patients was 52 years. The opt out rate was significantly higher among females (OR: 1.5, 95%CI: 1.4-1.6, aged >60 years (OR: 2.3, 95%CI: 2.2-2.4 and Chinese ethnicity (OR: 1.7, 95%CI:1.6-1.8. The false positive rate of the HIV screening test is 0.56%. The proportion of patients with HIV infection among those who underwent HIV screening is 0.18%. All 16 confirmed HIV patients were linked to care. CONCLUSION: The default opt-in rate of inpatient HIV testing was low at Tan Tock Seng Hospital, Singapore. Efforts to address individual HIV risk perception and campaigns against HIV stigma are needed to encourage more individuals to be tested for HIV.

  4. Voluntary euthanasia in Northern Ireland: general practitioners' beliefs, experiences, and actions.

    Science.gov (United States)

    McGlade, K J; Slaney, L; Bunting, B P; Gallagher, A G

    2000-01-01

    BACKGROUND: There has been much recent interest in the press and among the profession on the subject of euthanasia and physician-assisted suicide. The BMA recently conducted a 'consensus conference' over the internet to collect views on physician-assisted suicide. Any surveys to date have addressed a variety of specialties; however, no recent surveys have looked at general practitioner (GP) attitudes and experiences. AIM: To explore the attitudes of GPs in Northern Ireland towards the issue of patient requests for euthanasia, their nature, and doctors' experiences of such requests. METHOD: An anonymous, confidential postal survey of all (1053) GP principals in Northern Ireland. RESULTS: Seventy per cent of responders believe that passive euthanasia is both morally and ethically acceptable. Fewer (49%) would be prepared to take part in passive euthanasia. However, over 70% of physicians responding consider physician-assisted suicide and voluntary active euthanasia to be wrong. Thirty per cent of responders have received requests from patients for euthanasia in the past five years. One hundred and seven doctors gave information about these requests. Thirty-nine out of 54 patient requests for passive euthanasia had been complied with, as had one of 19 requests for physician-assisted suicide and four out of 38 patient requests for active euthanasia. Doctors perceived the main reasons why patients sought euthanasia was because of fear of loss of dignity and fear of being a burden to others. CONCLUSIONS: While the majority of GPs support passive euthanasia, they, in common with those who approve of assisted suicide and active euthanasia, often express a reluctance to take part in such actions. This may reflect the moral, legal, and emotional dilemmas doctors encounter when facing end-of-life decisions. PMID:11127168

  5. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  6. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  7. Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk

    Directory of Open Access Journals (Sweden)

    Guy Lebanon

    2009-12-01

    Full Text Available An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding which data to disclose, in terms of deciding which disclosure rule to apply to a database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed information. Furthermore, we prove that, under some conditions, the estimated privacy risk is an upper bound on the true privacy risk. Finally, we relate our framework with the k-anonymity disclosure method. The proposed framework makes the assumptions behind k-anonymity explicit, quantifies them, and extends them in several natural directions.

  8. The Anonymous Plotter in the Routines of Renaissance Theatre and Drama

    Directory of Open Access Journals (Sweden)

    Paola Pugliatti

    2012-03-01

    Full Text Available Renaissance theatre, both in England and Italy, was a commercial enterprise and, therefore, it utilized procedures of division of labour to meet the challenge of the market. One of these procedures was the compilation of preparatory texts of various kinds. But, while about one thousand scenari of the commedia dell’arte (some anonymous, some with the author’s name survive, of the ‘plots’ compiled by the English ‘plotters’ in preparation of plays to be written only one incomplete specimen and a few fragments have been preserved; their nature, therefore, remains dubious. Furthermore, anonymous documents of a different nature, also confusingly called ‘plots’, but compiled as reminders for the actors’ entrances during performance, have survived in six, mostly fragmentary, manuscripts. This article discusses these three kinds of preparatory texts in order to characterize their different nature and argues that, although suggestive, the idea of a derivation of the two kinds of English ‘plots’ from the scenari appears unconvincing; indeed, the compilation, in both contexts, of preparatory texts was simply an obvious and necessary measure in order to speed up procedures.

  9. Implementation of Fair-exchange and Anonymous Online E-cash Protocol for E-commerce

    Directory of Open Access Journals (Sweden)

    Harshita

    2016-08-01

    Full Text Available In the world of internet, e-commerce is one of the most prominent sectors where user wants to shop and pay online for online products. E-cash is one of these payment methods. In e-cash, every time a unique string is generated for user so that user uses that string to pay for any online product. At the time of online purchasing a trust should be maintain between customers and merchant such that the product price which is going to pay by customer is fair or not, the merchant is indeed genuine to deliver the product after getting online payment or not. Trust issues are resolved by using fair exchange concept at the time of online purchasing. Anonymity is also a major concern; it means that true identity of users must be hidden from merchant. By keeping these issues in mind we proposed a protocol which ensures users anonymity by using e-cash payment method and fair exchange by using off-line TTP which invokes by customer when any dispute occur from merchant side. In this paper, we implement our proposed protocol and also analyze its performance and compare it with other protocol.

  10. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

    CERN Document Server

    Mittal, Prateek; Juen, Joshua; Caesar, Matthew; Borisov, Nikita

    2011-01-01

    Anonymity systems such as Tor aim to enable users to communicate in a manner that is untraceable by adversaries that control a small number of machines. To provide efficient service to users, these anonymity systems make full use of forwarding capacity when sending traffic between intermediate relays. In this paper, we show that doing this leaks information about the set of Tor relays in a circuit (path). We present attacks that, with high confidence and based solely on throughput information, can (a) reduce the attacker's uncertainty about the bottleneck relay of any Tor circuit whose throughput can be observed, (b) exactly identify the guard relay(s) of a Tor user when circuit throughput can be observed over multiple connections, and (c) identify whether two concurrent TCP connections belong to the same Tor user, breaking unlinkability. Our attacks are stealthy, and cannot be readily detected by a user or by Tor relays. We validate our attacks using experiments over the live Tor network. We find that the at...

  11. A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    A.Damodaram

    2012-10-01

    Full Text Available With the economy developing and popular Internet, the general concept of contract signing has changed.In the past, people usually sign a contract at the same time and same place face to face, but actually eachparty involved in contract may live in different part of earth, they want to sign something for business orsome other things in economic, efficient, secure and fairway. A fair contract signing protocol allows twopotentially mis-trusted parities to exchange their commitments (i.e., digital signatures to an agreedcontract over the Internet in a fair way, so that either each of them obtains the other’s signature, orneither party does. Based on the LUCAS signature scheme, a new digital anonymous contract signingprotocol is proposed in this paper. Like the existing LUCAS-based solutions for the same problem, ourprotocol is fair, anonymous and optimistic. Furthermore, the proposed protocol satisfied a newproperty, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, either of the two partiescan not show the validity of intermediate results to others.

  12. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Science.gov (United States)

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  13. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Directory of Open Access Journals (Sweden)

    Christine Clavien

    Full Text Available Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  14. The development and initial evaluation of the survey of readiness for alcoholics anonymous participation.

    Science.gov (United States)

    Kingree, J B; Simpson, Alpha; Thompson, Martie; McCrady, Barbara; Tonigan, J Scott; Lautenschlager, Gary

    2006-12-01

    This article presents 5 studies related to the development and initial evaluation of the Survey of Readiness for Alcoholics Anonymous Participation (SYRAAP). The SYRAAP is a brief, multidimensional, self-administered instrument that assesses beliefs associated with Alcoholics Anonymous (AA) participation. Study 1 generated 239 candidate items for potential inclusion in the instrument. Study 2 assessed the content validity of these items according to 3 criteria and identified a subset of 60 with the highest values on the criteria for further consideration. Study 3 produced a shorter version of the SYRAAP and evaluated its structure, internal reliability, and validity. Study 4 reevaluated the structure and internal reliability of the SYRAAP and yielded findings that were generally consistent with those from Study 3. Study 5 established stability reliability for the instrument. The collective findings indicated the SYRAAP can reliably and validly assess individual-level beliefs associated with AA participation. The potential use of the SYRAAP for researchers and clinicians, along with limitations of the work presented here, are discussed. (c) 2006 APA, all rights reserved

  15. Applying the nursing theory of human relatedness to alcoholism and recovery in alcoholics anonymous.

    Science.gov (United States)

    Strobbe, Stephen; Hagerty, Bonnie; Boyd, Carol

    2012-12-01

    Alcohol misuse is a global health risk, and Alcoholics Anonymous (AA) is the largest and most popular mutual-help program for individuals with alcohol-related problems. In recent years, researchers and clinicians have become increasingly interested in specific mechanisms of action that may contribute to positive outcomes through involvement with this 12-step program for recovery, yet few have applied a theoretical framework to these efforts. We examined the phenomena of alcoholism and recovery in AA, using the nursing Theory of Human Relatedness (THR). THR addresses a pervasive human concern: "establishing and maintaining relatedness to others, objects, environments, society and self." The theory describes four states of relatedness (connectedness, disconnectedness, parallelism, and enmeshment) and four relatedness competencies (sense of belonging, reciprocity, mutuality, and synchrony). Both alcoholism and recovery in AA can be viewed primarily in terms of relatedness. In active alcoholism, an individual's involvement with alcohol (enmeshment) can limit, impair, or preclude healthy or adaptive relatedness toward virtually all other referents, including self. As a program of recovery, each of the 12 Steps of Alcoholics Anonymous addresses an individual's relatedness to one or more identified referents while simultaneously enhancing and expanding each of the four relatedness competencies. THR provides a theoretical framework to help direct patient care, research, and education and has the potential to serve as a unifying theory in the study of alcoholism and recovery in AA.

  16. Does sponsorship improve outcomes above Alcoholics Anonymous attendance? A latent class growth curve analysis.

    Science.gov (United States)

    Witbrodt, Jane; Kaskutas, Lee; Bond, Jason; Delucchi, Kevin

    2012-02-01

    To construct Alcoholics Anonymous (AA) attendance, sponsorship and abstinence latent class trajectories to test the added benefit of having a sponsor above the benefits of attendance in predicting abstinence over time. Prospective with 1-, 3-, 5- and 7-year follow-ups. Alcoholic-dependent individuals from two probability samples, one from representative public and private treatment programs and another from the general population (n = 495). Individuals in the low attendance class (four classes identified) were less likely than those in the high, descending and medium attendance classes to be in high (versus low) abstinence class (three classes identified). No differences were found between the other attendance classes as related to abstinence class membership. Overall, being in the high sponsor class (three classes identified) predicted better abstinence outcomes than being in either of two other classes (descending and low), independent of attendance class effects. Although declining sponsor involvement was associated with greater likelihood of high abstinence than low sponsor involvement, being in the descending sponsor class also increased the odds of being in the descending abstinence class. Any pattern of Alcoholics Anonymous attendance, even if it declines or is never high for a particular 12-month period, is better than little or no attendance in terms of abstinence. Greater initial attendance carries added value. There is a benefit for maintaining a sponsor over time above that found for attendance. © 2012 The Authors, Addiction © 2012 Society for the Study of Addiction.

  17. What do adolescents exposed to Alcoholics Anonymous think about 12-step groups?

    Science.gov (United States)

    Kelly, John F; Myers, Mark G; Rodolico, John

    2008-01-01

    Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations. Two clinical samples of youth (N = 74 and N= 377) were asked about their perceptions of, and experiences with, AA/NA with responses categorized by content into domains assessed for face validity and reliability. The aspects of AA/NA youth liked best were general group dynamic processes related to universality, support, and instillation of hope. The most common reason for discontinuing was boredom/lack of fit. General group-therapeutic, and not 12-step-specific, factors are most valued by youth during early stages of recovery and/or degree of AA/NA exposure. Many youth discontinue due to a perceived lack of fit, suggesting a mismatch between some youth and aspects of AA/NA.

  18. Neurons controlling voluntary vocalization in the macaque ventral premotor cortex.

    Directory of Open Access Journals (Sweden)

    Gino Coudé

    Full Text Available The voluntary control of phonation is a crucial achievement in the evolution of speech. In humans, ventral premotor cortex (PMv and Broca's area are known to be involved in voluntary phonation. In contrast, no neurophysiological data are available about the role of the oro-facial sector of nonhuman primates PMv in this function. In order to address this issue, we recorded PMv neurons from two monkeys trained to emit coo-calls. Results showed that a population of motor neurons specifically fire during vocalization. About two thirds of them discharged before sound onset, while the remaining were time-locked with it. The response of vocalization-selective neurons was present only during conditioned (voluntary but not spontaneous (emotional sound emission. These data suggest that the control of vocal production exerted by PMv neurons constitutes a newly emerging property in the monkey lineage, shedding light on the evolution of phonation-based communication from a nonhuman primate species.

  19. Suicide and voluntary active euthanasia: why the difference in attitude?

    Science.gov (United States)

    Beech, I

    1995-06-01

    It appears that the attitudes of health professionals differ towards suicide and voluntary active euthanasia. An acceptance of, if not an agreement with, voluntary active euthanasia exists, while there is a general consensus that suicide should be prevented. This paper searches for a working definition of suicide, to discover ethical reasons for the negative value that suicide assumes, and also to provide a term of reference when comparing suicide with euthanasia. On arriving at a working definition of suicide, it is compared with voluntary active euthanasia. An analysis of utilitarian and deontological considerations is provided and proves to be inconclusive with respect to the ethical principles informing the attitudes of professionals. Therefore, a search for other influences is attempted; this indicates that psychological influences inform attitudes to a greater degree than ethical principles.

  20. Propensity for Voluntary Travel Behavior Changes: An Experimental Analysis

    DEFF Research Database (Denmark)

    Meloni, Italo; Sanjust, Benedetta; Sottile, Eleonora;

    2013-01-01

    implementation, which consisted of providing car users with a personalized travel plan after the first week of observation (before) and using the second week to monitoring the post-behavior (after). These data have then been used to estimate a Mixed Logit for the choice to use a personal vehicle or a light metro......In this paper we analyze individual propensity to voluntary travel behavior change combining concepts from theory of change with the methodologies deriving from behavioral models. In particular, following the theory of voluntary changes, we set up a two-week panel survey including soft measure......; and a Multinomial Logit for the decision to change behavior. Results from both models show the relevance of providing information about available alternatives to individuals while promoting voluntary travel behavioral change....

  1. Final voluntary release assessment/corrective action report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-12

    The US Department of Energy, Carlsbad Area Office (DOE-CAO) has completed a voluntary release assessment sampling program at selected Solid Waste Management Units (SWMUs) at the Waste Isolation Pilot Plant (WIPP). This Voluntary Release Assessment/Corrective Action (RA/CA) report has been prepared for final submittal to the Environmental protection Agency (EPA) Region 6, Hazardous Waste Management Division and the New Mexico Environment Department (NMED) Hazardous and Radioactive Materials Bureau to describe the results of voluntary release assessment sampling and proposed corrective actions at the SWMU sites. The Voluntary RA/CA Program is intended to be the first phase in implementing the Resource Conservation and Recovery Act (RCRA) Facility Investigation (RFI) and corrective action process at the WIPP. Data generated as part of this sampling program are intended to update the RCRA Facility Assessment (RFA) for the WIPP (Assessment of Solid Waste Management Units at the Waste Isolation Pilot Plant), NMED/DOE/AIP 94/1. This Final Voluntary RA/CA Report documents the results of release assessment sampling at 11 SWMUs identified in the RFA. With this submittal, DOE formally requests a No Further Action determination for these SWMUs. Additionally, this report provides information to support DOE`s request for No Further Action at the Brinderson and Construction landfill SWMUs, and to support DOE`s request for approval of proposed corrective actions at three other SWMUs (the Badger Unit Drill Pad, the Cotton Baby Drill Pad, and the DOE-1 Drill Pad). This information is provided to document the results of the Voluntary RA/CA activities submitted to the EPA and NMED in August 1995.

  2. Voluntary vs directed siting -- or somewhere in-between?

    Energy Technology Data Exchange (ETDEWEB)

    Peelle, E.B.

    1994-04-01

    Waste siting gridlock in the United States and Canada has led to experimentation with voluntary and hybrid or ``mixed mode`` siting. We review nuclear and hazardous waste voluntary siting (VS) results for selected cases in the U.S, and Canada. Findings indicate that VS is not a panacea, but that current siting efforts are inadequate tests of its potential. We suggest trials of improved VS protocols and more effort on hybrid approaches in which the developer chooses the site but is required to reach agreement on conditions with local stakeholders. Mixed mode siting may be better suited to the US context and its three-tiered governmental system.

  3. The voluntary control of facial action units in adults.

    Science.gov (United States)

    Gosselin, Pierre; Perron, Mélanie; Beaupré, Martin

    2010-04-01

    We investigated adults' voluntary control of 20 facial action units theoretically associated with 6 basic emotions (happiness, fear, anger, surprise, sadness, and disgust). Twenty young adults were shown video excerpts of facial action units and asked to reproduce them as accurately as possible. Facial Action Coding System (FACS; Ekman & Friesen, 1978a) coding of the facial productions showed that young adults succeeded in activating 18 of the 20 target actions units, although they often coactivated other action units. Voluntary control was clearly better for some action units than for others, with a pattern of differences between action units consistent with previous work in children and adolescents. Copyright 2010 APA, all rights reserved.

  4. Market Brief: Status of the Voluntary Renewable Energy Certificate Market (2011 Data)

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, J.; Armstrong, P.; Bird, L.

    2012-09-01

    This report documents the status and trends of U.S. 'voluntary' markets -- those in which consumers and institutions purchase renewable energy to match their electricity needs on a voluntary basis. Voluntary REC markets continue to exhibit growth and spur renewable energy development. Voluntary green power markets provide an additional revenue stream for renewable energy projects and raise consumer awareness of the benefits of renewable energy. Although a full estimate of the size of the voluntary market is not available for 2011, this review uses indicative metrics to capture 2011 voluntary market trends.

  5. Market Brief. Status of the Voluntary Renewable Energy Certificate Market (2011 Data)

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, Jenny [National Renewable Energy Lab. (NREL), Golden, CO (United States); Armstrong, Philip [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bird, Lori [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2012-09-01

    This report documents the status and trends of U.S. 'voluntary' markets -- those in which consumers and institutions purchase renewable energy to match their electricity needs on a voluntary basis. Voluntary REC markets continue to exhibit growth and spur renewable energy development. Voluntary green power markets provide an additional revenue stream for renewable energy projects and raise consumer awareness of the benefits of renewable energy. Although a full estimate of the size of the voluntary market is not available for 2011, this review uses indicative metrics to capture 2011 voluntary market trends.

  6. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  7. Anonymous HIV workplace surveys as an advocacy tool for affordable private health insurance in Namibia

    Directory of Open Access Journals (Sweden)

    de Beer Ingrid

    2009-11-01

    Full Text Available Abstract Background With an estimated adult HIV prevalence of 15%, Namibia is in need of innovative health financing strategies that can alleviate the burden on the public sector. Affordable and private health insurances were recently developed in Namibia, and they include coverage for HIV/AIDS. This article reports on the efficacy of HIV workplace surveys as a tool to increase uptake of these insurances by employees in the Namibian formal business sector. In addition, the burden of HIV among this population was examined by sector. Methods Cross-sectional anonymous HIV prevalence surveys were conducted in 24 private companies in Namibia between November 2006 and December 2007. Non-invasive oral fluid-based HIV antibody rapid tests were used. Anonymous test results were provided to the companies in a confidential report and through presentations to their management, during which the advantages of affordable private health insurance and the available insurance products were discussed. Impact assessment was conducted in October 2008, when new health insurance uptake by these companies was evaluated. Results Of 8500 targeted employees, 6521 were screened for HIV; mean participation rate was 78.6%. Overall 15.0% (95% CI 14.2-15.9% of employees tested HIV positive (range 3.0-23.9% across companies. The mining sector had the highest percentage of HIV-positive employees (21.0%; the information technology (IT sector had the lowest percentage (4.0%. Out of 6205 previously uninsured employees, 61% had enrolled in private health insurance by October 2008. The majority of these new insurances (78% covered HIV/AIDS only. Conclusion The proportion of HIV-positive formal sector employees in Namibia is in line with national prevalence estimates and varies widely by employment sector. Following the surveys, there was a considerable increase in private health insurance uptake. This suggests that anonymous HIV workplace surveys can serve as a tool to motivate

  8. Voluntary ingestion of buprenorphine as a refined analgesic strategy

    DEFF Research Database (Denmark)

    Jacobsen, Kirsten Rosenmaj; Kalliokoski, Otto Henrik; Hau, Jann

    2011-01-01

    Buprenorphine is a widely used analgesic for laboratory rodents. Administration of the drug in an attractive food item for voluntary ingestion is a desirable way to administer the drug noninvasively. The method refi nes the standard analgesic procedure and has the potential to improve the welfare...

  9. Value orientations, expectations and voluntary contributions in public goods

    NARCIS (Netherlands)

    Offerman, T.J.S.; Schram, A.J.H.C.; Sonnemans, J.H.

    1996-01-01

    An experimental analysis of voluntary, binary contributions for step-level public goods is presented. Independent information is obtained on individual value orientation and expectations about the behavior of other subjects using incentive compatible mechanisms. The effects of increasing payoffs for

  10. Value Orientations, Expectations and Voluntary Contributions in Public Goods

    NARCIS (Netherlands)

    Sonnemans, J.; Schram, A.; Offermans, T.

    1996-01-01

    An experimental analysis of voluntary, binary contributions for step-level public goods is presented. Independent information is obtained on individual value orientation and expectations about the behavior of other subjects using incentive compatible mechanisms. The effects of increasing payoffs for

  11. 77 FR 55487 - Agency Information Collection Activities; Voluntary Customer Survey

    Science.gov (United States)

    2012-09-10

    ... U.S. Customs and Border Protection, Department of Homeland Security, and sent via electronic mail to... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities; Voluntary Customer Survey AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: 30-Day...

  12. ANALYSIS OF INTENTION TO CONTINUE SERVICES AMONG RECRUITED VOLUNTARY SOLDIERS

    Directory of Open Access Journals (Sweden)

    Kuo-Wei Lin

    2012-01-01

    Full Text Available In order to attract more promising young people to join the military and enhance combat capability, Taiwan’s Department of Defense is transforming the nation’s military service system from a draft system, which has been in effect for more than sixty years, to an all-volunteer military force system. The government hopes that the new system not only can recruit promising voluntary soldiers, but that they also continue their military service after the contract expires in order to ensure stability in recruitment sources. This study explores the intention of voluntary soldiers to continue their military service. This study’s questionnaire encompasses five dimensions: Participation motivation, organization commitment, career planning, personality traits and departure tendency. The questionnaires were issued to 350 voluntary soldiers to explore if they intend to continue their service after their contract expires, with a total of 314 effective questionnaires that were recovered and analyzed. The results find that about half of the voluntary soldiers indicate that they do not plan on staying and continuing their service after contract expiration, which will result in understaffing in the military. In order to stabilize the prescribed number of soldiers, the existing recruiting policy and military management system should be re-adjusted.

  13. Privatizing or socializing corporate responsibility: business participation in voluntary programs

    NARCIS (Netherlands)

    Fransen, L.W.; Burgoon, B.

    2014-01-01

    This article explores why companies choose some Corporate Responsibility initiatives over others. The focus is on competing voluntary programs to oversee and protect labor standards. These programs may differ with regard to two aspects: the governance of the program and the financial and managerial

  14. 77 FR 50584 - Voluntary Licensing of Amateur Rocket Operations

    Science.gov (United States)

    2012-08-22

    ... are summarized below. Total Benefits and Costs The FAA does not require licensing of amateur rocket... of this rule. To the extent the licensing requirements provide a societal benefit, those benefits... Federal Aviation Administration 14 CFR Part 400 RIN 2120-AJ84 Voluntary Licensing of Amateur...

  15. Board and auditor interlocks and voluntary disclosure in annual reports

    NARCIS (Netherlands)

    Braam, G.J.M.; Borghans, L.

    2014-01-01

    Purpose – The purpose of this study is to explore whether interlock ties between the board of directors and the external auditors facilitate the cross-firm diffusion of voluntary disclosures in annual reports. Design/methodology/approach – Using a sample of 149 non-financial companies publicly lis

  16. Refreshing the "Voluntary National Content Standards in Economics"

    Science.gov (United States)

    MacDonald, Richard A.; Siegfried, John J.

    2012-01-01

    The second edition of the "Voluntary National Content Standards in Economics" was published by the Council for Economic Education in 2010. The authors examine the process for revising these precollege content standards and highlight several changes that appear in the new document. They also review the impact the standards have had on precollege…

  17. Human Economy and Entrepreneurial Learning in a Voluntary Organization

    DEFF Research Database (Denmark)

    Revsbech, Christine

    2014-01-01

    "Based on five months anthropological field study in a British affiliate of an American charity in London, Revsbech asks what does learning look like in a social voluntary organization for youth. Her chapter argues that volunteers develop entrepreneurial abilities by shifting flexibly between...

  18. Voluntary imitation in Alzheimer’s disease patients

    Directory of Open Access Journals (Sweden)

    Ambra eBisio

    2016-03-01

    Full Text Available Although Alzheimer's disease (AD primarily manifests as cognitive deficits, the implicit sensorimotor processes that underlie social interactions, such as automatic imitation, seem to be preserved in mild and moderate stages of the disease, as is the ability to communicate with other persons. Nevertheless, when AD patients face more challenging tasks, which do not rely on automatic processes but on explicit voluntary mechanisms and require the patient to pay attention to external events, the cognitive deficits resulting from the disease might negatively affect patients’ behaviour. The aim of the present study was to investigate whether voluntary motor imitation, i.e. a volitional mechanism that involves observing another person’s action and translating this perception into one’s own action, was affected in patients with Alzheimer’s disease. Further, we tested whether this ability was modulated by the nature of the observed stimulus by comparing the ability to reproduce the kinematic features of a human demonstrator with that of a computerized-stimulus. AD patients showed an intact ability to reproduce the velocity of the observed movements, particularly when the stimulus was a human agent. This result suggests that high-level cognitive processes involved in voluntary imitation might be preserved in mild and moderate stages of AD and that voluntary imitation abilities might benefit from the implicit interpersonal communication established between the patient and the human demonstrator.

  19. 77 FR 53963 - Voluntary Intermodal Sealift Agreement (VISA)

    Science.gov (United States)

    2012-09-04

    ... amended to note that each voluntary agreement expires five (5) years after the date it becomes effective... Concept The mission of VISA is to provide commercial sealift and intermodal shipping services and systems... commitments or volunteered capacity are insufficient to meet contingency requirements, and adequate shipping...

  20. Voluntary Genital Ablations: Contrasting the Cutters and Their Clients

    Directory of Open Access Journals (Sweden)

    Robyn A. Jackowich, BA

    2014-08-01

    Conclusions: This study may help identify individuals who are at risk of performing illegal castrations. That information may help healthcare providers protect individuals with extreme castration ideations from injuring themselves or others. Jackowich RA, Vale R, Vale K, Wassersug RJ, and Johnson TW. Voluntary genital ablations: Contrasting the cutters and their clients. Sex Med 2014;2:121–132.

  1. Force-directed design of a voluntary closing hand prosthesis

    NARCIS (Netherlands)

    De Visser, H.; Herder, J.L.

    2000-01-01

    This paper presents the design of a body-powered voluntary closing prosthetic hand. It is argued that the movement of the fingers before establishing a grip is much less relevant for good control of the object held than the distribution of forces once the object has been contacted. Based on this not

  2. Mobilising voluntary contributions in public urban regeneration – a review

    DEFF Research Database (Denmark)

    Larsen, Jacob Norvig; Jensen, Jesper Ole; Agger, Annika

    Research on volunteerism indicates that one third of all adults in Denmark regularly contribute with voluntary labour in social relief work, community-based organizations, non-governmental organizations, or otherwise. In this paper we ask if and how urban regeneration might benefit from the appar...... of voluntary labour and voluntary associations in publicly subsidised urban regeneration. Empirical data will be collected through in-depth case studies in selected communities in both metropolitan neighbourhoods and smaller market towns....... to community development, urban policy, etc. In addition to this, the paper presents results from a survey exploring the extent and character of volunteerism in a number of integrated urban regeneration projects. The paper proposes a systematic overview of experiences with voluntary inputs and engagement...... in relation to public policy arenas and activities, particularly within urban policy and the community development fields. A categorization is proposed as regards different ways and models of civic engagement and major challenges are outlined. The paper is first step of a research project exploring potential...

  3. From participation to consumption? : Consumerism in voluntary sport clubs

    NARCIS (Netherlands)

    van der Roest, J.

    2015-01-01

    In recent years dark clouds seem to have gathered over the institution of the voluntary sport club. General societal developments such as individualisation and commercialisation have given rise to concerns regarding the transfer of such attitudes to sport clubs. Many people who are involved in and a

  4. 78 FR 71542 - Authority for Voluntary Withholding on Other Payments

    Science.gov (United States)

    2013-11-29

    ...)(3) authorizes the Secretary to provide regulations for withholding from (A) remuneration for... proposed rulemaking by cross reference to temporary regulations. SUMMARY: This document contains proposed regulations under the Internal Revenue Code (Code) relating to voluntary withholding agreements. In the Rules...

  5. The Limitations of Voluntary Repatriation and Resettlement of Refugees

    NARCIS (Netherlands)

    Zieck, M.; Chetail, V.; Bauloz, C.

    2014-01-01

    UNHCR is charged with the pursuit of durable solutions for the problem of refugees. Those solutions are voluntary repatriation and assimilation within new national communities which means either local integration in the country of refuge - tangentially touched upon in this paper - or resettlement in

  6. Study of the Voluntary Public School Choice Program. Final Report

    Science.gov (United States)

    Yin, Robert K.; Ahonen, Pirkko S.

    2008-01-01

    The Voluntary Public School Choice (VPSC) Program supports the emergence and growth of choice initiatives across the country, by assisting states and local school districts in developing innovative strategies to expand public school choice options for students. This report contains the final assessment of the first five years of the VPSC Program…

  7. Study of the Voluntary Public School Choice Program. Interim Report

    Science.gov (United States)

    Yin, Robert K.; Ahonen, Pirkko; Kim, Dawn

    2007-01-01

    The purpose of the Voluntary Public School Choice (VPSC) Program is to assist states and local school districts in the development of innovative strategies to expand options for students, and to encourage transfers of students from low-performing to higher-performing schools. This report presents interim findings from the National Evaluation of…

  8. Privatizing or socializing corporate responsibility: business participation in voluntary programs

    NARCIS (Netherlands)

    L.W. Fransen; B. Burgoon

    2013-01-01

    This article explores why companies choose some Corporate Responsibility initiatives over others. The focus is on competing voluntary programs to oversee and protect labor standards. These programs may differ with regard to two aspects: the governance of the program and the financial and managerial

  9. What roles are there for government in voluntary environmental programs?

    NARCIS (Netherlands)

    van der Heijden, J.

    2015-01-01

    This article seeks to understand to a greater extent why and how governments are involved in voluntary environmental programmes (VEPs). A better understanding of the role(s) of government in VEPs is of relevance because the current VEP literature considers such involvement one of the key conditions

  10. A cardiorespiratory classifier of voluntary and involuntary electrodermal activity

    Directory of Open Access Journals (Sweden)

    Sejdic Ervin

    2010-02-01

    Full Text Available Abstract Background Electrodermal reactions (EDRs can be attributed to many origins, including spontaneous fluctuations of electrodermal activity (EDA and stimuli such as deep inspirations, voluntary mental activity and startling events. In fields that use EDA as a measure of psychophysiological state, the fact that EDRs may be elicited from many different stimuli is often ignored. This study attempts to classify observed EDRs as voluntary (i.e., generated from intentional respiratory or mental activity or involuntary (i.e., generated from startling events or spontaneous electrodermal fluctuations. Methods Eight able-bodied participants were subjected to conditions that would cause a change in EDA: music imagery, startling noises, and deep inspirations. A user-centered cardiorespiratory classifier consisting of 1 an EDR detector, 2 a respiratory filter and 3 a cardiorespiratory filter was developed to automatically detect a participant's EDRs and to classify the origin of their stimulation as voluntary or involuntary. Results Detected EDRs were classified with a positive predictive value of 78%, a negative predictive value of 81% and an overall accuracy of 78%. Without the classifier, EDRs could only be correctly attributed as voluntary or involuntary with an accuracy of 50%. Conclusions The proposed classifier may enable investigators to form more accurate interpretations of electrodermal activity as a measure of an individual's psychophysiological state.

  11. The decision making control instrument to assess voluntary consent.

    Science.gov (United States)

    Miller, Victoria A; Ittenbach, Richard F; Harris, Diana; Reynolds, William W; Beauchamp, Tom L; Luce, Mary Frances; Nelson, Robert M

    2011-01-01

    The decision to participate in a research intervention or to undergo medical treatment should be both informed and voluntary. The aim of the present study was to develop an instrument to measure the perceived voluntariness of parents making decisions for their seriously ill children. A total of 219 parents completed questionnaires within 10 days of making such a decision at a large, urban tertiary care hospital for children. Parents were presented with an experimental form of the Decision Making Control Instrument (DMCI), a measure of the perception of voluntariness. Data obtained from the 28-item form were analyzed using a combination of both exploratory and confirmatory factor analytic techniques. The 28 items were reduced to 9 items representing 3 oblique dimensions: Self-Control, Absence of Control, and Others' Control. The hypothesis that the 3-factor covariance structure of our model was consistent with that of the data was supported. Internal consistency for the scale as a whole was high (0.83); internal consistency for the subscales ranged from 0.68 to 0.87. DMCI scores were associated with measures of affect, trust, and decision self-efficacy, supporting the construct validity of the new instrument. The DMCI is an important new tool that can be used to inform our understanding of the voluntariness of treatment and research decisions in medical settings.

  12. 77 FR 67269 - Voluntary Licensing of Amateur Rocket Operations; Withdrawal

    Science.gov (United States)

    2012-11-09

    ... it received. DATES: The direct final rule published on August 22, 2012, at 77 FR 50584 is withdrawn... withdraws Amendment No. 400-4 published at 77 FR 50584 on August 22, 2012. Issued in Washington, DC, on... Federal Aviation Administration 14 CFR Part 400 RIN 2120-AK16 Voluntary Licensing of Amateur...

  13. Environmental Concern and Involvement of Individuals in Selected Voluntary Associations

    Science.gov (United States)

    Schuett, Michael A.; Ostergren, David.

    2003-01-01

    The authors examined environmental concern and involvement of individuals in two voluntary associations, the International Mountain Bicycling Association (IMBA) and National Off-Highway Vehicle Conservation Council, Inc. (NOHVCC). Environmental concerns were assessed using the New Environmental Paradigm (NEP). When compared, results from 10 of 12…

  14. 28 CFR 549.41 - Voluntary admission and psychotropic medication.

    Science.gov (United States)

    2010-07-01

    ... medication. 549.41 Section 549.41 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL MANAGEMENT MEDICAL SERVICES Administrative Safeguards for Psychiatric Treatment and Medication § 549.41 Voluntary admission and psychotropic medication. (a) A sentenced inmate may be...

  15. Mobilising voluntary contributions in public urban regeneration – a review

    DEFF Research Database (Denmark)

    Agger, Annika; Jensen, Jesper Ole; Larsen, Jacob Norvig

    Research on volunteerism indicates that one third of all adults in Denmark regularly contribute with voluntary labour in social relief work, community-based organizations, non-governmental organizations, or otherwise. In this paper we ask if and how urban regeneration might benefit from the appar...

  16. Selection and inhibition mechanisms for human voluntary action decisions.

    Science.gov (United States)

    Zhang, Jiaxiang; Hughes, Laura E; Rowe, James B

    2012-10-15

    One can choose between action alternatives that have no apparent difference in their outcomes. Such voluntary action decisions are associated with widespread frontal-parietal activation, and a tendency to inhibit the repetition of a previous action. However, the mechanism of initiating voluntary actions and the functions of different brain regions during this process remains largely unknown. Here, we combine computational modeling and functional magnetic resonance imaging to test the selection and inhibition mechanisms that mediate trial-to-trial voluntary action decisions. We fitted an optimized accumulator model to behavioral responses in a finger-tapping task in which participants were instructed to make chosen actions or specified actions. Model parameters derived from each individual were then applied to estimate the expected accumulated metabolic activity (EAA) engaged in every single trial. The EAA was associated with blood oxygenation level-dependent responses in a decision work that was maximal in the supplementary motor area and the caudal anterior cingulate cortex, consistent with a competitive accumulation-to-threshold mechanism for action decision by these regions. Furthermore, specific inhibition of the previous action's accumulator was related to the suppression of response repetition. This action-specific inhibition correlated with the activity of the right inferior frontal gyrus, when the option to repeat existed. Our findings suggest that human voluntary action decisions are mediated by complementary processes of intentional selection and inhibition.

  17. 31 CFR 800.402 - Contents of voluntary notice.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Contents of voluntary notice. 800.402 Section 800.402 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE...; and (D) Employer identification number or other domestic tax or corporate identification number. (d...

  18. Validating the Psychological Climate Scale in Voluntary Child Welfare

    Science.gov (United States)

    Zeitlin, Wendy; Claiborne, Nancy; Lawrence, Catherine K.; Auerbach, Charles

    2016-01-01

    Objective: Organizational climate has emerged as an important factor in understanding and addressing the complexities of providing services in child welfare. This research examines the psychometric properties of each of the dimensions of Parker and colleagues' Psychological Climate Survey in a sample of voluntary child welfare workers. Methods:…

  19. Voluntary activation of trapezius measured with twitch interpolation

    DEFF Research Database (Denmark)

    Taylor, Janet L; Olsen, Henrik Baare; Sjøgaard, Gisela

    2009-01-01

    This study investigated the feasibility of measuring voluntary activation of the trapezius muscle with twitch interpolation. Subjects (n=8) lifted the right shoulder or both shoulders against fixed force transducers. Stimulation of the accessory nerve in the neck was used to evoke maximal twitche...

  20. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Hayden Wimmer

    2014-11-01

    Full Text Available While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM, a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Bayesian classifiers. This applied research reveals practical implications for applying PPDM to data mining and machine learning and serves as a critical first step learning how to apply PPDM to machine learning algorithms and the effects of PPDM on machine learning. Results indicate that certain machine learning algorithms are more suited for use with PPDM techniques.