Science.gov

Sample records for anonymous hiv workplace

  1. Anonymous HIV testing in the Canadian aboriginal population.

    PubMed Central

    Tseng, A. L.

    1996-01-01

    Reported numbers of acquired immunodeficiency syndrome cases among Canadian aboriginal peoples are currently relatively low. However, any increase in these numbers could have devastating human, social, and economic costs. Education and prevention of human immunodeficiency virus transmission are the most efficient and cost-effective measures available today. This paper discusses the role of anonymous HIV testing in effective HIV prevention in the Canadian aboriginal population. PMID:8828876

  2. Workplace discrimination. Helping the spread of HIV.

    PubMed

    Achmat, Z; Cameron, E

    1995-11-01

    South Africa's new Labor Relations Act represents a major advance in protecting persons with human immunodeficiency virus (HIV) and acquired immunodeficiency syndrome (AIDS) from workplace discrimination. In this document, HIV and AIDS are included as conditions protected from unfair labor practices. There remains, however, a gap between a theoretical rejection of HIV-based discrimination and actual labor practices. South African experts are in general agreement that pre-employment screening for HIV is unacceptable; moreover, there is no evidence of any potential for workplace transmission. Nonetheless, such testing remains widespread, as does dismissal or demotion of employees found to be HIV-infected. Also prevalent is discrimination in terms of employment benefits such as disability, group life insurance, medical insurance, and pension and provident funds. After 13 years of the AIDS epidemic, over 90% of South African employers have failed to develop HIV/AIDS policies or workplace educational programs. There is also a need for labor unions to launch a campaign to inform job applicants and employees of their rights to non-discrimination and confidentiality. Provision of condoms at every workplace is essential to AIDS prevention. Several major South African employers have taken the lead in this area and offer mandatory AIDS training courses, free condoms, educational materials, and peer education. PMID:12320240

  3. HIV risk practices by female sex workers according to workplace.

    PubMed

    Damacena, Giseli Nogueira; Szwarcwald, Célia Landmann; Souza Júnior, Paulo Roberto Borges de

    2014-06-01

    OBJECTIVE To investigate differences in HIV infection- related risk practices by Female Sex Workers according to workplace and the effects of homophily on estimating HIV prevalence. METHODS Data from 2,523 women, recruited using Respondent-Driven Sampling, were used for the study carried out in 10 Brazilian cities in 2008-2009. The study included female sex workers aged 18 and over. The questionnaire was completed by the subjects and included questions on characteristics of professional activity, sexual practices, use of drugs, HIV testing, and access to health services. HIV quick tests were conducted. The participants were classified in two groups according to place of work: on the street or indoor venues, like nightclubs and saunas. To compare variable distributions by place of work, we used Chi-square homogeneity tests, taking into consideration unequal selection probabilities as well as the structure of dependence between observations. We tested the effect of homophily by workplace on estimated HIV prevalence. RESULTS The highest HIV risk practices were associated with: working on the streets, lower socioeconomic status, low regular smear test coverage, higher levels of crack use and higher levels of syphilis serological scars as well as higher prevalence of HIV infection. The effect of homophily was higher among sex workers in indoor venues. However, it did not affect the estimated prevalence of HIV, even after using a post-stratification by workplace procedure. CONCLUSIONS The findings suggest that strategies should focus on extending access to, and utilization of, health services. Prevention policies should be specifically aimed at street workers. Regarding the application of Respondent-Driven Sampling, the sample should be sufficient to estimate transition probabilities, as the network develops more quickly among sex workers in indoor venues. PMID:25119937

  4. HIV risk practices by female sex workers according to workplace

    PubMed Central

    Damacena, Giseli Nogueira; Szwarcwald, Célia Landmann; de Souza, Paulo Roberto Borges

    2014-01-01

    OBJECTIVE To investigate differences in HIV infection- related risk practices by Female Sex Workers according to workplace and the effects of homophily on estimating HIV prevalence. METHODS Data from 2,523 women, recruited using Respondent-Driven Sampling, were used for the study carried out in 10 Brazilian cities in 2008-2009. The study included female sex workers aged 18 and over. The questionnaire was completed by the subjects and included questions on characteristics of professional activity, sexual practices, use of drugs, HIV testing, and access to health services. HIV quick tests were conducted. The participants were classified in two groups according to place of work: on the street or indoor venues, like nightclubs and saunas. To compare variable distributions by place of work, we used Chi-square homogeneity tests, taking into consideration unequal selection probabilities as well as the structure of dependence between observations. We tested the effect of homophily by workplace on estimated HIV prevalence. RESULTS The highest HIV risk practices were associated with: working on the streets, lower socioeconomic status, low regular smear test coverage, higher levels of crack use and higher levels of syphilis serological scars as well as higher prevalence of HIV infection. The effect of homophily was higher among sex workers in indoor venues. However, it did not affect the estimated prevalence of HIV, even after using a post-stratification by workplace procedure. CONCLUSIONS The findings suggest that strategies should focus on extending access to, and utilization of, health services. Prevention policies should be specifically aimed at street workers. Regarding the application of Respondent-Driven Sampling, the sample should be sufficient to estimate transition probabilities, as the network develops more quickly among sex workers in indoor venues. PMID:25119937

  5. Barriers to workplace HIV testing in South Africa: a systematic review of the literature.

    PubMed

    Weihs, Martin; Meyer-Weitz, Anna

    2016-01-01

    Low workplace HIV testing uptake makes effective management of HIV and AIDS difficult for South African organisations. Identifying barriers to workplace HIV testing is therefore crucial to inform urgently needed interventions aimed at increasing workplace HIV testing. This study reviewed literature on workplace HIV testing barriers in South Africa. Pubmed, ScienceDirect, PsycInfo and SA Publications were systematically researched. Studies needed to include measures to assess perceived or real barriers to participate in HIV Counselling and Testing (HCT) at the workplace or discuss perceived or real barriers of HIV testing at the workplace based on collected data, provide qualitative or quantitative evidence related to the research topic and needed to refer to workplaces in South Africa. Barriers were defined as any factor on economic, social, personal, environmental or organisational level preventing employees from participating in workplace HIV testing. Four peer-reviewed studies were included, two with quantitative and two with qualitative study designs. The overarching barriers across the studies were fear of compromised confidentiality, being stigmatised or discriminated in the event of testing HIV positive or being observed participating in HIV testing, and a low personal risk perception. Furthermore, it appeared that an awareness of an HIV-positive status hindered HIV testing at the workplace. Further research evidence of South African workplace barriers to HIV testing will enhance related interventions. This systematic review only found very little and contextualised evidence about workplace HCT barriers in South Africa, making it difficult to generalise, and not really sufficient to inform new interventions aimed at increasing workplace HCT uptake. PMID:26560013

  6. [Utilization of anonymous HIV testing by the federal health office--developments and motives].

    PubMed

    Scheibner, J; Waldvogel, B

    1993-01-01

    In the state-run health office in Ulm a survey of the frequency of anonymous HIV-antibody tests was taken between 1985 to 1991, of the age and gender representation from 1988 to 1991, of the test motives from 1.1.1990 to 1.3.1991. The result was a regressive trend following the test boom of 1987 and 1988, which is becoming more and more stable. The relation of men and women has been amounting to 6:4 in the last four years; the proportion of women receding slightly but constantly. The main motive of being tested was finding out about a high-risk or potentially high-risk sexual contact, mostly at the beginning of a new partnership. The motive ranking second in frequency was the investigation of the consequences of blood exposure, mostly relating to medical work. The third place was taken by irrational anxieties as a test motive. The article discusses the fact that test at the beginning of a new partnership frequently have the meaning of a sacrifice and a symbol of bondage in combination with a vow to be faithful. In case of irrational anxieties about AIDS the test-counsellor gets a chance to diagnose a possibly neurotic development at a very early stage, so that painful and expensive chronification and generalisation could be stopped or eased. PMID:8435542

  7. Anonymous HIV surveillance with risk-factor elicitation: at Perth (for men) and Cornton Vale (for women) prisons in Scotland.

    PubMed

    Gore, S M; Bird, A G; Burns, S; Ross, A J; Goldberg, D

    1997-03-01

    434 male and 145 female prisoners were available to participate in cross-sectional, voluntary anonymous HIV surveillance (using saliva samples) with linked self-completion questionnaire at HMP (Her Majesty's Prison) Perth on 17 May and at HMP Cornton Vale on 18 May 1995. Three hundred and four men (70%) and 136 women (94%) completed a risk-factor questionnaire and 304 and 135 samples were received for HIV antibody testing. Two hundred and eighty-two and 132 questionnaires passed logical checks. Six saliva samples from Perth (all injectors) out of 304 and none from Cornton Vale out of 134 tested were HIV antibody positive. Four were presumptively from known HIV-infected male inmates; the other 2 were local men, under 26 years, who began injecting in 1989-91, and both reported having had a recent HIV test. Overall HIV prevalence was estimated at 2% compared to a known prevalence of 1.4% (6/434), giving a 1.5 ratio of overall: disclosed HIV prevalence at HMP Perth. HIV prevalence was estimated at 7% (6/82) for injector-participants and 14% (5/35) for local injector participants. At Cornton Vale, where both known HIV-infected inmates abstained, overall and disclosed HIV prevalence, were equal at 1.4%. At Perth Prison, 29% of prisoners had injected drugs (82/278); 85% of injector-inmates reported having injected inside (some prison and 31% (25/80) had started to inject while inside, 7 during their present sentence. Of all 21 injector-inmates who first injected after 1991, 10 had started to inject inside, including one of 69 male inmates who had never been inside before. The corresponding figures for Cornton Vale, where 46% of inmates were injectors (58/132), were that 57% of injector-inmates had injected inside (32/56) but only one woman, for whom this was not her first sentence, had started to inject inside. Twenty-eight per cent of male prisoners (78/277) and 57% of male injector-inmates (47/82) had had a personal HIV test since January 1993, as had 35% of female

  8. South African HIV/AIDS programming overlooks migration, urban livelihoods, and informal workplaces.

    PubMed

    Vearey, Jo; Richter, Marlise; Núñez, Lorena; Moyo, Khangelani

    2011-01-01

    South Africa has the largest population of people living with HIV globally and is associated with high population mobility. The majority of migrants move in search of improved livelihood opportunities, and many who migrate (both internally and across borders) move into urban areas, often through peripheral informal settlements where HIV prevalence is shown to be double that of urban formal areas. While the relationship between migration and the spread of HIV is acknowledged as complex, the context of migration may place individuals at increased risk for acquiring HIV. Studies have demonstrated the long-wave impact of HIV and AIDS on livelihood activities and, more recently, on patterns of migration. Many migrants engage in livelihood strategies situated within the urban 'informal economy'; these informal workplaces are often overlooked in global and national legislation governing workplace responses to health and HIV and AIDS. This study draws on existing research and limited primary data to explore the implications of HIV/AIDS programming for diverse migrant groups labouring in informal workplaces in Johannesburg, South Africa. We describe three case studies: waste-pickers at a dumpsite in a peripheral urban informal settlement; barmen and cleaners working in inner-city hotels where sex is also sold; and, migrants engaged in informal livelihood activities who are also members of burial societies. Given the importance of varied informal livelihood activities for diverse migrant groups, particularly in urban areas of South Africa, we propose that the national HIV/AIDS response can and should engage with internal and cross-border migrants in informal workplaces - which is in line with the principle of universal access and will strengthen the national response. Especially, we point out the potential for burial societies to provide an entry point for HIV/AIDS programming that targets migrant groups involved in the informal economy of South African cities. PMID:25865514

  9. Adoption of formal HIV and AIDS workplace policies: an analysis of industry/sector variations.

    PubMed

    Bakuwa, Rhoda

    2010-12-01

    Addressing HIV and AIDS is the responsibility of many stakeholders including private sector companies. However, increasing evidence reveals that the majority of companies around the world are yet to acknowledge and respond to HIV and AIDS as a workplace issue. One factor that has been identified in the literature as playing a role in determining whether a company responds to HIV and AIDS, or not, is the industry/sector in which a company operates. This study therefore sought to empirically examine whether in the context of Malawi there were significant variations in the adoption of formal HIV and AIDS workplace policies based on the industry/sector in which a company was operating, as well as analyse the dynamics underlying such variations. Using survey data collected from 152 randomly selected private sector companies in Malawi, the results of this study revealed significant variations in the adoption of HIV and AIDS workplace policies among companies operating in various sectors. Companies in the service sector were leading the adoption compared to companies in other sectors such as the trading sector. Furthermore, the evidence from this study showed that differences in staff participation in the activities of HIV and AIDS institutions may explain the industry/sector variations. These results provide an important avenue to scale up company responses to HIV and AIDS by intensifying staff participation in the activities of HIV and AIDS institutions. Such institutions appear to play a vital role of providing up to date HIV-and AIDS-related information upon which companies are able to develop a business case for responding to the epidemic. PMID:21409305

  10. Mathematical Analysis of the Effects of HIV-Malaria Co-infection on Workplace Productivity.

    PubMed

    Seidu, Baba; Makinde, Oluwole D; Seini, Ibrahim Y

    2015-06-01

    In this paper, a nonlinear dynamical system is proposed and qualitatively analyzed to study the dynamics and effects of HIV-malaria co-infection in the workplace. Basic reproduction numbers of sub-models are derived and are shown to have LAS disease-free equilibria when their respective basic reproduction numbers are less than unity. Conditions for existence of endemic equilibria of sub-models are also derived. Unlike the HIV-only model, the malaria-only model is shown to exhibit a backward bifurcation under certain conditions. Conditions for optimal control of the co-infection are derived using the Pontryagin's maximum principle. Numerical experimentation on the resulting optimality system is performed. Using the incremental cost-effectiveness ratio, it is observed that combining preventative measures for both diseases is the best strategy for optimal control of HIV-malaria co-infection at the workplace. PMID:25980477

  11. HIV and AIDS in Workplace: The role of behaviour antecedents on behavioural intentions

    PubMed Central

    Dipeolu, I. O.

    2015-01-01

    their organisations had a workplace HIV and AIDS policy (p<0.05). Conclusions Although the respondents would tolerate staff with HIV/AIDS, their attitudinal disposition are indicative of limited knowledge about the mode of transmission and prevention of HIV including workplace policy on HIV and AIDS. Health education strategies such as training and workplace HIV/AIDS education are needed to address these shortcomings. PMID:26688605

  12. The role of HIV/AIDS committees in effective workplace governance of HIV/AIDS in South African small and medium-sized enterprises (SMEs).

    PubMed

    Vaas, Jocelyn R

    2008-04-01

    The primary purpose of this study was to assess the role, status and scope of workplace HIV/AIDS committees as a means of effective workplace governance of the HIV/AIDS impact, and their role in extending social protective HIV/AIDS-related rights to employees. In-depth qualitative case studies were conducted in five South African small and medium-sized enterprises (SMEs) that were actively implementing HIV/AIDS policies and programmes. Companies commonly implemented HIV/AIDS policies and programmes through a workplace committee dedicated to HIV/AIDS or a generic committee dealing with issues other than HIV/ AIDS. Management, through the human resources department and the occupational health practitioner often drove initial policy formulation, and had virtually sole control of the HIV/AIDS budget. Employee members of committees were mostly volunteers, and were often production or blue collar employees, while there was a notable lack of participation by white-collar employees, line management and trade unions. While the powers of workplace committees were largely consultative, employee committee members often managed in an indirect manner to secure and extend social protective rights on HIV/AIDS to employees, and monitor their effective implementation in practice. In the interim, workplace committees represented one of the best means to facilitate more effective workplace HIV/AIDS governance. However, the increased demands on collective bargaining as a result of an anticipated rises in AIDS-related morbidity and mortality might prove to be beyond the scope of such voluntary committees in the longer term. PMID:18496614

  13. Best practice workplace HIV/AIDS programmes in South Africa: A review of case studies and lessons learned

    PubMed Central

    2009-01-01

    ABSTRACT Background A group of experts attending a tripartite interregional meeting on best practices in HIV/AIDS workplace policies and programmes organised by the International Labour Organisation (ILO) in Geneva, Switzerland, identified 34 best practice workplace HIV programmes from across the world. Method The ten criteria that were used for reviewing best practice workplace HIV/AIDS programmes in South Africa include acceptability, accessibility, ethical soundness, perceived impact, relevance, appropriateness, innovativeness, efficiency, sustainability and replicability. Results More than one-third (35.3%) of the 34 best practice workplace interventions identified were found in businesses and industries in South Africa. This constitutes a significant and encouraging effort to deal with HIV/AIDS in the workplace. Approximately 16.7% of the best practice workplace HIV/AIDS interventions focused on policy and legal frameworks, 50% of these interventions focused on prevention, 16.7% provided links beyond the workplace and a further 16.7% were interventions that focused on knowledge and evidence. A third (33.3%) of practices were found in the mining industry, 16.7% in the motor industry, 16.7% from workers’ unions, and the rest (33.3%) were found in a sugar company, an electricity supply company, a pharmaceutical company and the ministry of Public Service and Administration. Conclusion It is encouraging that over one-third of all best practice workplace HIV interventions identified by the ILO experts were found in South Africa. The majority of these policies and programmes were focused on HIV prevention.

  14. HIV / AIDS in the workplace: principles, planning, policy, programmes and project participation.

    PubMed

    Smart, R

    1999-01-01

    15 years ago, most business, labor, government, and nongovernment representatives would have had only a small idea of what AIDS was, and let alone why it should concern them. However, companies have since lost top managers, workers have lost colleagues, and considerable time, energy, and emotion have been spent upon issues of illness and loss. Entire families have collapsed, as companies struggle against a background of chronic poverty. The HIV/AIDS pandemic has forced a reconsideration of whether disease prevention and health promotion are business concerns. AIDS causes illness, disability, and death to workers, as well as severe economic and emotional disruptions to their families. It also increases the cost of doing business. As South Africa faces a large epidemic, business must take prompt and incisive action against AIDS. A list of 10 workplace principles is presented and a 3-stage process recommended to ensure optimal workplace HIV/AIDS/STD and tuberculosis policies and programs. PMID:12295124

  15. A lottery incentive system to facilitate dialogue and social support for workplace HIV counselling and testing: A qualitative inquiry

    PubMed Central

    Weihs, Martin; Meyer-Weitz, Anna

    2014-01-01

    Abstract Despite South African mid-sized companies' efforts to offer HIV counselling and testing (HCT) in the workplace, companies report relatively poor uptake rates. An urgent need for a range of different interventions aimed at increasing participation in workplace HCT has been identified. The aim of this study was to explore qualitatively the influence of a lottery incentive system (LIS) as an intervention to influence shop-floor workers' workplace HIV testing behaviour. A qualitative study was conducted among 17 shop-floor workers via convenience sampling in two mid-sized South African automotive manufacturing companies in which an LIS for HCT was implemented. The in-depth interviews employed a semi-structured interview schedule and thematic analysis was used to analyse the data. The interviews revealed that the LIS created excitement in the companies and renewed employees' personal interest in HCT. The excitement facilitated social interactions that resulted in a strong group cohesion pertaining to HCT that mitigated the burden of HIV stigma in the workplace. Open discussions allowed for the development of supportive social group pressure to seek HCT as a collective in anticipation of a reward. Lotteries were perceived as a supportive and innovative company approach to workplace HCT. The study identified important aspects for consideration by companies when using an LIS to enhance workplace HIV testing. The significance of inter- and intra-player dialogue in activating supportive social norms for HIV testing in collectivist African contexts was highlighted. PMID:25023208

  16. A lottery incentive system to facilitate dialogue and social support for workplace HIV counselling and testing: a qualitative inquiry.

    PubMed

    Weihs, Martin; Meyer-Weitz, Anna

    2014-01-01

    Despite South African mid-sized companies' efforts to offer HIV counselling and testing (HCT) in the workplace, companies report relatively poor uptake rates. An urgent need for a range of different interventions aimed at increasing participation in workplace HCT has been identified. The aim of this study was to explore qualitatively the influence of a lottery incentive system (LIS) as an intervention to influence shop-floor workers' workplace HIV testing behaviour. A qualitative study was conducted among 17 shop-floor workers via convenience sampling in two mid-sized South African automotive manufacturing companies in which an LIS for HCT was implemented. The in-depth interviews employed a semi-structured interview schedule and thematic analysis was used to analyse the data. The interviews revealed that the LIS created excitement in the companies and renewed employees' personal interest in HCT. The excitement facilitated social interactions that resulted in a strong group cohesion pertaining to HCT that mitigated the burden of HIV stigma in the workplace. Open discussions allowed for the development of supportive social group pressure to seek HCT as a collective in anticipation of a reward. Lotteries were perceived as a supportive and innovative company approach to workplace HCT. The study identified important aspects for consideration by companies when using an LIS to enhance workplace HIV testing. The significance of inter- and intra-player dialogue in activating supportive social norms for HIV testing in collectivist African contexts was highlighted. PMID:25023208

  17. Workplace and HIV-related sexual behaviours and perceptions among female migrant workers.

    PubMed

    Yang, H; Li, X; Stanton, B; Fang, X; Lin, D; Mao, R; Liu, H; Chen, X; Severson, R

    2005-10-01

    Data from 1,543 female migrants working in eight occupational clusters in Beijing and Nanjing, China were analysed to examine the association of workplace with HIV-related behaviours and perceptions. For sexually experienced women (n = 666, 43.2%), those working in entertainment establishments or personal service (e.g., nightclubs, dancing halls, barbershops, beauty salons, massage parlours, etc.) engaged in risky sexual practices twice as frequently as those working in non-entertainment establishments (e.g. restaurants, stalls, domestic service, factories, etc.). About 10% of women in the entertainment establishments reported having sold sex, 30% having multiple sexual partners and 40% having sex with men with multiple sexual partners. The rate of consistent condom use was less than 15%. They also tended to have a higher level of perceptions of both peer risk involvement and positive expectancy of risk behaviours, and lower perceptions of severity of STDs and HIV. For women who were not sexually experienced, those working in 'stalls' or 'domestic service' tended to perceive higher peer risk involvement, less severity of HIV infection, and less effectiveness of protective behaviour. The occupational pattern of sexual risk behaviours and perceptions observed in the current study indicates employment conditions are associated with HIV risk. Intervention strategies should be tailored to address occupational-related factors. PMID:16120499

  18. HIV/AIDS stigma at the workplace: exploratory findings from Pakistan.

    PubMed

    Bashir, Sajid

    2011-01-01

    People living with HIV/AIDS (PLHA) are stigmatised socially. They are devalued and considered like outcasts by having lesser opportunities for education, treatment and housing, and in an organisational context they get reduced opportunities of selection, promotion and income. The phenomena have been extensively researched in developed countries but limited literature addresses the situation in underdeveloped countries like Pakistan, which is also facing spread of the HIV/AIDS epidemic. There are a number of groups who are carrying the disease but the problems being faced by PLHA employed in different organisations have rarely been analysed. Stigma at the workplace can generate a number of negative outcomes. The present study considers two such outcomes among stigmatised PLHA. These outcomes are organisational cynicism and breach of psychological contract. A questionnaire was used to collect data from a sample of 174 PLHA, having a work experience after identification of the epidemic, working in different organisations across Pakistan. These PLHA were identified and recruited through a scattered record available with some government/non-government organisations operating in Pakistan to control HIV/AIDS. Findings of the study extend the knowledge about HIV/AIDS stigma indicating that PLHA are subjected to stigma, which is significantly associated with a breach of psychological contract and organisational cynicism. There is a need at governmental and organisational level as well to increase awareness about the disease and formulate policies to reduce stigma against PLHA working in different organisations. PMID:23237730

  19. Against anonymity.

    PubMed

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540

  20. Workplace prevention programs promote behavior change in Tanzania.

    PubMed

    Henry, K

    1995-02-01

    An estimated 800,000 Tanzanians had been infected with HIV by the end of 1992. Since working-age people spend 75% of their time at work, the African Medical and Research Foundation (AMREF), the Tanzanian Council for Social Development, and the Organization of Tanzanian Trade Unions organize and implement workplace-based HIV/AIDS prevention programs. For example, anonymous HIV screening conducted by AMREF at Tanzania Breweries Limited in September 1993 found 11.4% of the brewery's truck drivers to be HIV-seropositive. The men subsequently participated in an informal AIDS education session conducted by peer educators with help from the brewery's STD/AIDS coordinator. These sessions are a regular part of workplace AIDS prevention programs supported by the US Agency of International Development's Tanzania AIDS Program implemented by the AIDS Control and Prevention Project (AIDSCAP). The author considers motivating managers, peer education, condoms, behavior change, and expansion and sustainability. PMID:12347575

  1. Patterns of disclosure and antiretroviral treatment adherence in a South African mining workplace programme and implications for HIV prevention.

    PubMed

    Bhagwanjee, Anil; Govender, Kaymarlin; Akintola, Olagoke; Petersen, Inge; George, Gavin; Johnstone, Leigh; Naidoo, Kerisha

    2011-01-01

    Social and psychological barriers to the disclosure of one's seropositive HIV status to significant others and poor adherence to taking medications pose significant challenges to the scaling-up of access to antiretroviral treatment (ART) in the workplace. Such barriers are predictive of sub-optimal treatment outcomes and bedevil HIV-prevention interventions at a societal level. Against this background, this article explores the lived experiences of 19 HIV-positive male participants, between the ages of 33 and 57 years, who were enrolled in an ART programme managed at an occupational health clinic at a mining company in South Africa. The majority of these mineworkers had been aware of their HIV status for between 5 and 7 years. The study explored psychological and relational factors, as aspects of these participants lived experiences, which had a bearing on their adherence to their ART regimen and the disclosure choices that they made regarding their HIV status. In our sample, those participants who were adherent demonstrated higher levels of control and acceptance of their HIV infection and were more confident in their ability to manage their treatment, while the group who were non-adherent presented with lower levels of adherence motivation and self-efficacy, difficulties in maintaining a healthy lifestyle and significant challenges in maintaining control over their lives. While most of the men favoured disclosing their HIV status to their partners for the sake of treatment support, they were less sure about disclosing to family members and non-family members, respectively, because of their need to protect these persons and due to their fear of being stigmatised. It was evident that treatment adherence choices and behaviours were impacted by psychological and relational factors, including disclosure decisions. We conclude with a bivariate model for understanding the adherence behaviours that influenced different patterns of ART adherence among the sample, and

  2. Cross-sectional study assessing HIV-related knowledge, attitudes and behavior in the Namibian truck transport sector: Readjusting HIV prevention programs in the workplace.

    PubMed

    Kiderlen, Til R; Conteh, Michael; Roll, Stephanie; Seeling, Stefanie; Weinmann, Stefan

    2015-01-01

    The objectives of this study were to assess the current status of HIV-related knowledge, attitudes, and behavior (KAB) of employees in the private transport sector in Namibia and to compare companies with established HIV workplace program (WPPs) with those that have recently initiated the implementation of such programs. The study was designed as a cross-sectional questionnaire-based survey. Between January and March 2011, the survey was conducted in the Namibian truck transport sector in six companies of different sizes. The participants were selected randomly from the workforce. Data collection was based on a KAB questionnaire. The range of correct answers to the survey concerning the knowledge of HIV transmission was 67-95%. Twenty percent of the employees had never been tested for HIV. Additionally, risky sexual behaviors were quite prevalent and included having multiple concurrent partners and the use of sex for incentives. This study revealed that drivers and laborers were especially at risk for such behaviors. The employees of companies with established WPPs were tested for HIV more often than those of companies with new WPPs; however, aside from this difference, only minor differences were observed between the two groups. The findings of this study highlight the need for on-going HIV information and prevention campaigns that focus on the special needs of mobile and low-income workers. WPPs should be tailored accordingly and shift their focus to more practical approaches, such as voluntary counseling and testing (VCT), to increase their effectiveness. PMID:25805432

  3. Anonymity in Voting Revisited

    NASA Astrophysics Data System (ADS)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  4. A decade of an HIV workplace programme in armed conflict zones; a social responsibility response of the International Committee of the Red Cross.

    PubMed

    Du Mortier, Stéphane; Mukangu, Silas; Sagna, Charles; Nyffenegger, Laurent; Aebischer Perone, Sigiriya

    2016-01-01

    The International Committee of the Red Cross (ICRC) works in fragile States and in armed conflict zones. Some of them are affected by the HIV pandemic. Within the framework of its social responsibility programme concerning HIV affecting its staff members, the organization has implemented an HIV workplace programme since 2004. We carried out a retrospective analysis over 10 years. Data collected were initially essentially qualitative and process-oriented, but were complemented over the years by data on annual voluntary counselling and testing (VCT) uptake and on direct annual costs covering awareness, testing and antiretroviral therapy. The number of people covered by the programme grew from none in 2003 to 4,438 in 2015, with an increase in annual VCT uptake over the years increasing from 376 persons (14 %) in 2007 to 2,663 in 2015 (60 %). Over the years, the services were expanded from awareness raising to bringing VCT to the workplace, as well as offering testing and health coverage of other conditions and innovative approaches to facing challenges linked to situations of violence. Within its social responsibility framework, the ICRC has shown the importance and feasibility of a workplace HIV programme in conflict zones. A sustainable workplace programme in these conflict settings requires constant adaptation, with regular follow-up given the relatively high turnover of staff, and ensuring sustainable stocks of condoms and antiretroviral drugs. PMID:27247611

  5. An Anonymity Revocation Technology for Anonymous Communication

    NASA Astrophysics Data System (ADS)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  6. Quantum anonymous voting with anonymity check

    NASA Astrophysics Data System (ADS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-02-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  7. Profiles of men-who-have-sex-with-men seeking anonymous voluntary HIV counseling and testing at a community-based centre in Malaysia.

    PubMed

    Koh, K C; Kamarulzaman, A

    2011-12-01

    Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur. PMID:22390108

  8. Anonymity, Deindividuation and Aggression.

    ERIC Educational Resources Information Center

    Baron, Robert S.

    Several writers suggest that reducing one's sense of individuality reduces social restraints. The author suggests that the effect of uniformity of appearance on aggression is unclear when anonymity is held constant. This poses a problem of interpretation given that a distinction must be made between lack of individuality and anonymity. One must…

  9. True Anonymity Without Mixes

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail message have been used in the Internet for several years by senders of e-mail messages who do not wish to disclose their identity. Unfortunately, the degree of anonymity provided by this paradigm is limited and fragile. First, the messages sent are not truly anonymous but pseudo-anonymous since one of the mixes, at least, always knows the sender's identity. Secondly, the strength of the system to protect the sender's identity depends on the ability and the willingness of the mixes to keep the secret. If the mixes fail, the sender/'s anonymity is reduced to pieces. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet where the anonymous message is sent from a PDA which uses dynamically assigned temporary, non-personal, random IP and MAC addresses. Anonymous E-cash is used to pay for the service.

  10. Working It Out: Workplace Experiences of Individuals with HIV and Individuals with Cancer.

    ERIC Educational Resources Information Center

    Fesko, Sheila Lynch

    1999-01-01

    Thirty-two individuals with cancer or HIV (human immunodeficiency virus) were interviewed concerning their employment related experiences and concerns. Findings indicated that the decision to tell their supervisor and/or co-workers about their health status varied substantially between individuals with HIV and those with cancer. All study…

  11. Quantum anonymous ranking

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Wen, Qiao-Yan; Liu, Bin; Su, Qi; Qin, Su-Juan; Gao, Fei

    2014-03-01

    Anonymous ranking is a kind of privacy-preserving ranking whereby each of the involved participants can correctly and anonymously get the rankings of his data. It can be utilized to solve many practical problems, such as anonymously ranking the students' exam scores. We investigate the issue of how quantum mechanics can be of use in maintaining the anonymity of the participants in multiparty ranking and present a series of quantum anonymous multiparty, multidata ranking protocols. In each of these protocols, a participant can get the correct rankings of his data and nobody else can match the identity to his data. Furthermore, the security of these protocols with respect to different kinds of attacks is proved.

  12. Anonymous Signatures Revisited

    NASA Astrophysics Data System (ADS)

    Saraswat, Vishal; Yun, Aaram

    We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [10], and then further developed by Fischlin [4] and Zhang and Imai [11]. We present a new formalism of anonymous signature, where instead of the message, a part of the signature is withheld to maintain anonymity. We introduce the notion unpretendability to guarantee infeasibility for someone other than the correct signer to pretend authorship of the message and signature. Our definition retains applicability for all previous applications of the anonymous signature, provides stronger security, and is conceptually simpler. We give a generic construction from any ordinary signature scheme, and also show that the short signature scheme by Boneh and Boyen [2] can be naturally regarded as such a secure anonymous signature scheme according to our formalism.

  13. HIV/AIDS Basics

    MedlinePlus

    ... Enter ZIP code or city Follow Act Against AIDS Act Against AIDS @talkHIV Act Against AIDS Get Email Updates on AAA Anonymous Feedback HIV/AIDS Media Infographics Syndicated Content Podcasts Slide Sets HIV/ ...

  14. Anonymity in science.

    PubMed

    Neuroskeptic

    2013-05-01

    The history of science is replete with important works that were originally published without the author's legal name being revealed. Most modern scientists will have worked anonymously in their capacity as peer reviewers. But why is anonymity so popular? And is it a valid approach? I argue that pseudonymity and anonymity, although not appropriate for all forms of scientific communication, have a vital role to play in academic discourse. They can facilitate the free expression of interpretations and ideas, and can help to ensure that suggestions and criticisms are evaluated dispassionately, regardless of their source. PMID:23570959

  15. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  16. Workplace discrimination and HIV/AIDS: the national EEOC ADA research project.

    PubMed

    Conyers, Liza; Boomer, K B; McMahon, Brian T

    2005-01-01

    This article utilizes data from the Equal Employment Opportunity Commission's Integrated Mission System database to document the levels of employment discrimination involving individuals with HIV/AIDS. The researchers explore the theory that the nature of HIV/AIDS related employment discrimination is rooted in deeper stigmatization than discrimination against other disability groups. Researchers compare and contrast key demographic characteristics of Charging Parties and Respondents involved in HIV/AIDS related allegations of discrimination and their proportion of EEOC merit resolutions to those of persons with other physical, sensory, and neurological impairments. Findings indicate that, in contrast to the general disability group, HIV/AIDS was more likely to be male, ethnic minorities, between the ages of 25-44, in white collar jobs, in the South and West and to work for businesses with 15 to 100 employees. Additionally, the allegations in HIV/AIDS were more likely to receive merit resolution from the EEOC by a large difference of ten percent. PMID:16006674

  17. Spectral Anonymization of Data

    PubMed Central

    Lasko, Thomas A.; Vinterbo, Staal A.

    2011-01-01

    The goal of data anonymization is to allow the release of scientifically useful data in a form that protects the privacy of its subjects. This requires more than simply removing personal identifiers from the data, because an attacker can still use auxiliary information to infer sensitive individual information. Additional perturbation is necessary to prevent these inferences, and the challenge is to perturb the data in a way that preserves its analytic utility. No existing anonymization algorithm provides both perfect privacy protection and perfect analytic utility. We make the new observation that anonymization algorithms are not required to operate in the original vector-space basis of the data, and many algorithms can be improved by operating in a judiciously chosen alternate basis. A spectral basis derived from the data’s eigenvectors is one that can provide substantial improvement. We introduce the term spectral anonymization to refer to an algorithm that uses a spectral basis for anonymization, and we give two illustrative examples. We also propose new measures of privacy protection that are more general and more informative than existing measures, and a principled reference standard with which to define adequate privacy protection. PMID:21373375

  18. Women and HIV/AIDS

    MedlinePlus

    ... action on HIV/AIDS National Women and Girls HIV/AIDS Awareness Day – March 10 Programs Share your story Anonymous from Illinois says... Although I am HIV negative, I would like to share my story. ...

  19. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  20. Transmitted HIV drug resistance at the Thai Red Cross Anonymous Clinic in Bangkok: results from three consecutive years of annual surveillance

    PubMed Central

    Sirivichayakul, Sunee; Kantor, Rami; DeLong, Allison K.; Wongkunya, Rapeeporn; Mekprasan, Suwanna; Ruxrungtham, Kiat; Sohn, Annette H.; Phanuphak, Praphan

    2015-01-01

    Objectives The aim of this study was to prospectively survey transmitted drug resistance (TDR) among recently infected individuals (mostly MSM). Methods TDR was determined in prospective annual cohorts of recently HIV-1-infected individuals consecutively recruited from 2008 to 2010. Resistance interpretation was carried out using Stanford Database tools and the WHO surveillance drug resistance mutation list. Kruskal–Wallis and Fisher's exact tests were used to compare demographic and laboratory outcomes. Results A total of 299 subjects were enrolled, with 89% MSM. Median viral load was significantly higher in 2010 than in 2008 (P = 0.004). Of the 284 analysable reverse transcriptase/protease sequences, TDR to any drug was found in 14/284 (4.9%); 4.0% in 2008, 5.9% in 2009 and 5.3% in 2010, with an increasing trend of TDR to NRTIs and NNRTIs from 2008 to 2010 (P = 0.07). Good correlation was found between our data and the WHO threshold surveillance method. Only rilpivirine had significantly higher (P < 0.05) predicted resistance in 2010 than in 2008 and 2009. Conclusions A trend towards an increase in TDR in Thailand where the major epidemic is among MSM was observed, but did not reach the WHO-defined high-level threshold (>15%). Attention to prevent the development and spread of drug resistance is needed. PMID:25525199

  1. HIV testing and attitudes among the working-age population of Japan: annual health checkups may offer an effective way forwards

    PubMed Central

    ISHIMARU, Tomohiro; WADA, Koji; SMITH, Derek R

    2015-01-01

    In Japan, Voluntary Counselling and Testing (VCT) for HIV has been recommended for people concerned about their infection risk, especially those in high-risk groups. Although HIV awareness has declined in this country somewhat during recent years, the number of newly-infected cases has been increasing. The purpose of the current study therefore, was to determine the prevalence of HIV testing, individuals’ reasons for being tested, and the overall acceptance of HIV testing among working-age Japanese. We utilized an anonymous, nationwide survey which was administered to a total of 3,055 participants aged 20–69 yr. The lifetime prevalence of HIV testing was 14% (2% within the past year). A gap was observed between a prior history of HIV testing and willingness to be tested in future (32%) or willingness to be tested during health checkups in the workplace (41%). HIV testing appears to have only been conducted among a limited number of working-age Japanese adults, even though some reported a willingness to be tested. Opportunities for VCT during workplace health checkups might offer an immediate and positive way forwards in the fight against HIV; however, privacy protection for test results and the acceptance of HIV-positive employees should be carefully considered in the workplace. PMID:26423333

  2. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    NASA Astrophysics Data System (ADS)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  3. On Backward-Style Anonymity Verification

    NASA Astrophysics Data System (ADS)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  4. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  5. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  6. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  7. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  8. Revocable Anonymous Access to the Internet?

    ERIC Educational Resources Information Center

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  9. Workplace interventions to reduce HIV and TB stigma among health care workers - Where do we go from here?

    PubMed

    Siegel, Jacob; Yassi, Annalee; Rau, Asta; Buxton, Jane A; Wouters, Edwin; Engelbrecht, Michelle C; Uebel, Kerry E; Nophale, Letshego E

    2015-01-01

    Fear of stigma and discrimination among health care workers (HCWs) in South African hospitals is thought to be a major factor in the high rates of HIV and tuberculosis infection experienced in the health care workforce. The aim of the current study is to inform the development of a stigma reduction intervention in the context of a large multicomponent trial. We analysed relevant results of four feasibility studies conducted in the lead up to the trial. Our findings suggest that a stigma reduction campaign must address community and structural level drivers of stigma, in addition to individual level concerns, through a participatory and iterative approach. Importantly, stigma reduction must not only be embedded in the institutional management of HCWs but also be attentive to the localised needs of HCWs themselves. PMID:25769042

  10. Dentistry and HIV/AIDS related stigma

    PubMed Central

    Elizondo, Jesus Eduardo; Treviño, Ana Cecilia; Violant, Deborah

    2015-01-01

    OBJECTIVE To analyze HIV/AIDS positive individual’s perception and attitudes regarding dental services. METHODS One hundred and thirty-four subjects (30.0% of women and 70.0% of men) from Nuevo León, Mexico, took part in the study (2014). They filled out structured, analytical, self-administered, anonymous questionnaires. Besides the sociodemographic variables, the perception regarding public and private dental services and related professionals was evaluated, as well as the perceived stigma associated with HIV/AIDS, through a Likert-type scale. The statistical evaluation included a factorial and a non-hierarchical cluster analysis. RESULTS Social inequalities were found regarding the search for public and private dental professionals and services. Most subjects reported omitting their HIV serodiagnosis and agreed that dentists must be trained and qualified to treat patients with HIV/AIDS. The factorial analysis revealed two elements: experiences of stigma and discrimination in dental appointments and feelings of concern regarding the attitudes of professionals or their teams concerning patients’ HIV serodiagnosis. The cluster analysis identified three groups: users who have not experienced stigma or discrimination (85.0%); the ones who have not had those experiences, but feel somewhat concerned (12.7%); and the ones who underwent stigma and discrimination and feel concerned (2.3%). CONCLUSIONS We observed a low percentage of stigma and discrimination in dental appointments; however, most HIV/AIDS patients do not reveal their serodiagnosis to dentists out of fear of being rejected. Such fact implies a workplace hazard to dental professionals, but especially to the very own health of HIV/AIDS patients, as dentists will not be able to provide them a proper clinical and pharmaceutical treatment. PMID:26538100

  11. A review of Alcoholics Anonymous/ Narcotics Anonymous programs for teens.

    PubMed

    Sussman, Steve

    2010-03-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/ NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed. PMID:20164105

  12. The application of online surveys for workplace health research.

    PubMed

    Scriven, A; Smith-Ferrier, S

    2003-06-01

    Work has a synergistic relationship to health, and workplaces are increasingly the focus for both health promotion initiatives and health research. Electronic technologies are a common feature of many workplaces and as such are convenient low cost survey vehicles for the health researcher. The methods and the implications of employing Internet methods for health research are covered and a wide range of issues connected with online sampling and data collection are discussed. Because the workplace does not provide a neutral research environment, the security, anonymity and associated issues of using the two main forms of Internet surveys for workplace health research are examined and their advantages and disadvantages are debated. PMID:12852193

  13. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  14. HIV

    PubMed Central

    Chawla, Sumit; Sahoo, Soumya Swaroop; Jain, Rambilas; Khanna, Pardeep; Mehta, Bharti; Singh, Inderjeet

    2014-01-01

    Getting to zero: zero new HIV infections, zero deaths from AIDS-related illness, zero discrimination is the theme of World AIDS Day 2012. Given the spread of the epidemic today, getting to zero may sound difficult, but significant progress is underway. The total annual loss for the entire country due to HIV is 7% of GDP, which exceeds India’s annual health expenditure in 2004. The additional loss due to loss of labor income and increased medical expenditure as measured by the external transfers, account for 5% of the country’s health expenditure and 0.23% of GDP. Given that the HIV incidence rate is only 0.27% in India, these losses are quite staggering. Despite the remarkable achievements in development of anti-retroviral therapies against HIV and the recent advances in new prevention technologies, the rate of new HIV infections continue to outpace efforts on HIV prevention and control. Thus, the development of a safe and effective vaccine for prevention and control of AIDS remains a global public health priority and the greatest opportunity to eventually end the AIDS pandemic. PMID:24056755

  15. Workplace violence: a study of Turkish workers.

    PubMed

    Aytac, Serpil; Bozkurt, Veysel; Bayram, Nuran; Yildiz, Selver; Aytac, Mustafa; Akinci, Fusun Sokullu; Bilgel, Nazan

    2011-01-01

    This research was conducted to address the experience of workplace violence of Turkish workers from different sectors and to investigate the impact of the exposed violence on their psychological well-being. Data were collected anonymously with printed questionnaires from the volunteer participants and depended on self-reporting. The response rate was 79.0% (1708/2161). The prevalence of workplace violence was found to be 44.8%. The most common type was verbal violence together with mobbing (bullying). Victims of physical violence were mostly males, whereas females were found to be victims of verbal, psychological and sexual violence. Most cases did not result in legal action and the victims remained silent. Psychological well-being of exposed workers in terms of depression, anxiety and stress seemed to deteriorate. Workplace violence remains a silent epidemic in Turkey. Preventive measures against workplace violence and social support for violated workers do not exist. PMID:22152504

  16. Legal Issues in Anonymity and Pseudonymity.

    ERIC Educational Resources Information Center

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  17. Anonymity in Classroom Voting and Debating

    ERIC Educational Resources Information Center

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  18. Workplace Literacy.

    ERIC Educational Resources Information Center

    Slagle, Sinda

    1991-01-01

    Washoe High School in Reno, Nevada, is reaching out into the community by establishing literacy classes in the workplace. The high school furnishes tutors and textbooks; employers contribute classroom space, inexpensive work materials, and students. (MLF)

  19. A flexible approach to distributed data anonymization.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. PMID:24333850

  20. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  1. Comments on ``Anonymous Reviews'' From D. Fisher

    NASA Astrophysics Data System (ADS)

    Fisher, David

    I'd like to suggest that the recent letters complaining about reviewers' anonymity are on the wrong track. What we need is more anonymity, not less: we need double-blind mandatory anonymity. The main argument proposed so far is the unfairness of not being able to confront the reviewers' criticisms. But you don't need to know who someone is to be able to argue against their ideas. Reviewers' reports are spelled out clearly and can be rebutted without getting into personalities.

  2. Anon-Pass: Practical Anonymous Subscriptions.

    PubMed

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  3. Changing Workplace.

    ERIC Educational Resources Information Center

    1999

    These four papers are from a symposium on changing workplaces. "Women Entrepreneurs: Maintaining Business Success through Human Resource Development" (Dominic G. Kamau , Gary N. McLean, Alexander Ardishvili) investigates contributions of human resource development (HRD) to business success and reports the following: (1) women can be successful in…

  4. On-Line Anonymity: A New Privacy Battle in Cyberspace.

    ERIC Educational Resources Information Center

    Lee, Laurie Thomas

    1996-01-01

    States that lawsuits are being filed that challenge anonymity and freedom of speech in cyberspace--is there a right to online anonymity? Examines the debate and issues associated with anonymous communications in cyberspace. Explores the "right of informational privacy" as it pertains to anonymity. Suggests some regulatory approaches for addressing…

  5. HIV/AIDS Case Managers and Client HIV Status Disclosure: Perceived Client Needs, Practices, and Services

    ERIC Educational Resources Information Center

    Kalichman, Seth C.; Klein, Susan J.; Kalichman, Moira O.; O'Connell, Daniel A.; Freedman, Jay A.; Eaton, Lisa; Cain, Demetria

    2007-01-01

    People living with HIV/AIDS often need assistance in deciding whether or how to disclose their HIV status to others, and case managers are in a unique position to offer this assistance. The current study surveyed 223 case managers providing services to people living with HIV/AIDS in New York State. The survey was conducted anonymously, and case…

  6. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives

    PubMed Central

    Krentzman, Amy R.; Robinson, Elizabeth A. R.; Moore, Barbara C.; Kelly, John F.; Laudet, Alexandre B.; White, William L.; Zemore, Sarah E.; Kurtz, Ernest; Strobbe, Stephen

    2011-01-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524

  7. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    PubMed

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524

  8. Anon-Pass: Practical Anonymous Subscriptions

    PubMed Central

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  9. Performance evaluation of various K- anonymity techniques

    NASA Astrophysics Data System (ADS)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  10. Workplace Design

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The Anthropometric Source Book was developed based on Johnson Space Center project of anthropometry, the study of the size, shape and motion characteristics of the human body. Designed primarily for use by NASA, the military services and aerospace contractors, the book was also intended to help non-aerospace engineers, architects, and others engaged in design of clothing, equipment and workplaces. An example of its use by Eastman Kodak Company is the company's application of the data to design efficient, productive and comfortable workplaces for employees in the Rochester, NY processing laboratories. The sourcebook was used to determine such dimensions as leg space, work surface height and thickness, employee reach distances, proper height for computer terminal screen, seat height and knee space.

  11. Narcotics Anonymous: Understanding the "Bridge of Recovery."

    ERIC Educational Resources Information Center

    Ronel, Natti

    1998-01-01

    Narcotics Anonymous (NA) is investigated as a subculture of recovery bridging the drug subculture and the prevailing culture. A phenomenological study of NA in Israel is reported. Innovation, cultural conflict, the value of recovery and its norms, supporting social mechanisms, limitations of the program, and intercultural attributes are…

  12. "Dear Professor: I Hate You"--Anonymous

    ERIC Educational Resources Information Center

    Bartlett, Thomas

    2009-01-01

    Flip through a stack of anonymous student evaluations of professors and the mild comments, even the compliments, tend to blend together. But often, hidden among them, is a dagger. Then there are the out-and-out insults. Students' comments can be more than simply mean. Sometimes student comments aren't cruel, just weird. In this article, some…

  13. In Defence of Anonymity: Rejoining the Criticism

    ERIC Educational Resources Information Center

    Kelly, Anthony

    2009-01-01

    This article is a response to the growing criticisms of the British Educational Research Association (BERA) and Economic and Social Research Council (ESRC) ethical guidelines on anonymity and pseudonymity as default positions for participants in qualitative educational research. It discusses and responds to those criticisms under four…

  14. HIV prevalence in dental outpatients in Brazil.

    PubMed

    de Almeida, O P; de Souza Filho, F J; Scully, C; Line, S R; Porter, S

    1997-10-01

    A series of dental outpatients in Brazil was anonymously screened for HIV antibodies in whole unstimulated saliva with an immunoglobulin G antibody-capture enzyme-linked immunosorbent assay. Salivary HIV antibodies were detected in 40 patients in the control group who were known to be HIV-seropositive but were not detected in any of a series of 40 known HIV-seronegative patients in the control group, confirming the very high sensitivity and specificity of the immunoglobulin G antibody-capture enzyme-linked immunosorbent assay. Only one patient from 84 consecutive dental outpatients of unknown HIV serostatus who were examined anonymously for HIV by immunoglobulin G antibody-capture enzyme linked immunosorbent assay showed HIV positivity (1.2% of the population). PMID:9347499

  15. AIDS and HIV Testing: Implications for Health Education.

    ERIC Educational Resources Information Center

    Quinn, Sandra Crouse

    1992-01-01

    The article makes health educators aware of issues raised by a move from anonymous to confidential HIV testing. It examines implications of contact tracing and notification and of reporting requirements that identify HIV-positive persons to public health departments. Implications for health education professionals responsible for HIV test…

  16. Workplace Health and Safety.

    ERIC Educational Resources Information Center

    Massachusetts Career Development Inst., Springfield.

    This booklet is one of six texts from a workplace literacy curriculum designed to assist learners in facing the increased demands of the workplace. It is a short guide to workplace health and safety issues, laws, and regulations, especially in Massachusetts. Topics covered include the following: (1) safety issues--workplace ergonomics, the…

  17. Lack of HIV Testing and Awareness of HIV Infection among Men Who Have Sex with Men, Beijing, China

    ERIC Educational Resources Information Center

    Choi, Kyung-Hee; Lui, Hui; Guo, Yaqi; Han, Lei; Mandel, Jeffrey S.

    2006-01-01

    In China, men who have sex with men (MSM) are at high risk for HIV. However, little is known about their HIV testing behavior. From September 2001 to January 2002, we recruited 482 men through social networks and MSM venues. We conducted HIV testing and counseling, and anonymous, standardized face-to-face interviews. Eighty-two percent of…

  18. A Model of Onion Routing with Provable Anonymity

    NASA Astrophysics Data System (ADS)

    Feigenbaum, Joan; Johnson, Aaron; Syverson, Paul

    Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its anonymity guarantees. We give an IO-automata model of an onion-routing protocol and, under possibilistic definitions, characterize the situations in which anonymity and unlinkability are guaranteed.

  19. Academic freedom, public reactions, and anonymity.

    PubMed

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. PMID:24724541

  20. Privacy, anonymity and subjectivity in genomic research.

    PubMed

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729

  1. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  2. Infrared observations of anonymous IRC sources

    NASA Technical Reports Server (NTRS)

    Strecker, D. W.; Ney, E. P.

    1974-01-01

    Infrared (0.9 to 18 microns) observations of 232 anonymous 2-micron Sky survey (IRC) sources are reported. Most of the objects appear to be late-type stars with little or no long-wave excess. About ten percent exhibit large excesses. Thirty-one of the brightest 11-micron sources have been remeasured to determine variability. These brighter objects appear to fall into two groups; one group resembles NML Tauri, while the other is like NML Cygni.

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  5. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  6. [Use of illicit substances in the workplace].

    PubMed

    Lhermitte, M; Frimat, P; Labat, L; Haguenoer, J-M

    2012-01-01

    The development of addictive behaviors is a source of worry and concern for workplace and occupational physicians. To estimate the prevalence of behaviors, two types of surveys can be carried out: self-assessment surveys and biological testing in the workplace. For the latter, when a settlement is within the company, the prevalence is often lower compared to those enterprises that have not adapted this policy. Very few investigations have been published in France to date. Data published by the United Nations Office against Drugs and Crime (UNODC) shows a stable consumption of illicit substances in recent years. They reported consumption in the world among the general population (all subjects aged 15 to 64). For France, were described a prevalence estimated in 2005 to 8.6%, 0.6% and 0.2% for cannabis, cocaine and amphetamine derivatives, respectively, and in 2007 to 4.6% for opiates. Some prevalence in the workplace have been reported in Europe in chemical, petrochemical, metallurgical, automotive, in the transport sector and in medical and military fields. However, it appears that few surveys in the workplace have been published in France, this lack may be explained by a desire for anonymity on the subject at the level of company management and doctors work that focus on individual support with the problem of addiction. Screening for illicit substances is necessary because these psychotropic substances affect alertness and pose risks in the workplace, especially such that the association cannabis-alcohol further increases the risk. Knowledge of consumption is, moreover, an important factor in job security. It may be acquired if reliable methods, inexpensive to allow routine screening. Publication of results will reveal the extent of the problem and implement more effective campaigns of information and prevention in the workplace. PMID:22341004

  7. [Workplace mobbing].

    PubMed

    Soljan, Ivana; Josipović-Jelić, Zeljka; Jelić Kis, I Anita

    2008-03-01

    Workplace mobbing is a hostile and unethical communication, systematically aimed from one or more individuals towards mostly one individual, who are forced into a helpless position and are held in it by constant bullying. This article describes some of the most important characteristics of mobbing: offensive behaviour, organizational and non-organizational causes of this behaviour, the victim and the consequences. Modern business environment is complex, dynamic, volatile, and requires better ability to adjust. Constant changes are a part of organizational reality, but they also produce an ideal environment for all kinds of conflicts. Conflicts are inevitable in every organization, but the task of its management is to identify them and resolve before they affect the workforce, productivity and costs. The idea is to avert psychological abuse and aberrant behaviour such as mobbing which that may cause physical and mental disorders. Mobbing is a problem of the modern society; as a violation of human rights it is relatively new and unrecognised in Croatia. Abuse is mostly psychological: it affects the victim's health and life, quality of work, productivity, profitability, and may lead to significant economic losses in the community. Mobbing can be averted by joint forces that would involve employee and management, medical and legal professionals, and even community as a whole. The more an organization pursues excellence based on trust and business ethics, the higher the probability that mobbing will be averted or stopped. PMID:18411493

  8. Ethical considerations of providers and clients on HIV testing campaigns in Burkina Faso

    PubMed Central

    2014-01-01

    Background Campaigns have been conducted in a number of low HIV prevalence African settings, as a strategy to expand HIV testing, and it is important to assess the extent to which individual rights and quality of care are protected during campaigns. In this article we investigate provider and client perceptions of ethical issues, including whether they think that accessibility of counseling and testing sites during campaigns may hinder confidentiality. Methods To examine how campaigns have functioned in Burkina Faso, we undertook a qualitative study based on individual interviews and focus group discussions with 52 people (providers and clients tested during or outside campaigns and individuals never tested). Thematic analysis was performed on discourse about perceptions and experiences of HIV-testing campaigns, quality of care and individual rights. Results Respondents value testing accessibility and attractiveness during campaigns; clients emphasize convenience, ripple effect, the sense of not being alone, and the anonymity resulting from high attendance. Confronted with numerous clients, providers develop context-specific strategies to ensure consent, counseling, confidentiality and retention in the testing process, and they adapt to workplace arrangements, local resources and social norms. Clients appreciate the quality of care during campaigns. However, new ethical issues arise about confidentiality and accessibility. Confidentiality of HIV-status may be jeopardized due to local social norms that encourage people to share their results with others, when HIV-positive people may not wish to do so. Providers’ ethical concerns are consistent with WHO norms known as the ‘5 Cs,’ though articulated differently. Clients and providers value the accessibility of testing for all during campaigns, and consider it an ethical matter. The study yields insights on the way global norms are adapted or negotiated locally. Conclusions Future global recommendations for HIV

  9. Anonymity: An Impediment to Performance in Healthcare

    PubMed Central

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are “Always” or “Often” able to identify which care team is responsible for their patients, while 79% of nurses reported that they either “Often” or “Sometimes” page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either “Rarely” or “Never” able to recognize, by face and name, attending level providers. Residents were “Rarely” or “Never” recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  10. Anonymity: an impediment to performance in healthcare.

    PubMed

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  11. Part of the Job? Workplace Violence in Massachusetts Social Service Agencies

    ERIC Educational Resources Information Center

    Zelnick, Jennifer R.; Slayter, Elspeth; Flanzbaum, Beth; Butler, Nanci Ginty; Domingo, Beryl; Perlstein, Judith; Trust, Carol

    2013-01-01

    Workplace violence is a serious and surprisingly understudied occupational hazard in social service settings. The authors of this study conducted an anonymous, Internet-based survey of Massachusetts social service agencies to estimate the incidence of physical assault and verbal threat of violence in social service agencies, understand how social…

  12. Importance of an Early HIV Antibody Differentiation Immunoassay for Detection of Dual Infection with HIV-1 and HIV-2

    PubMed Central

    Zbinden, Andrea; Dürig, Roland; Shah, Cyril; Böni, Jürg; Schüpbach, Jörg

    2016-01-01

    Background HIV-2 is primarily endemic in West Africa and India, however, in time of global migration, a possible HIV-2 infection or co-infection with HIV-1 should be recognized right at the time of HIV diagnosis, in order to enable optimized antiretroviral treatment. Laboratory HIV testing consists of a combined HIV1/2/O antibody + antigen screening test and subsequent confirmation and type differentiation by a serological test formatted as a multi-line or multi-spot assay. CDC has proposed a revised alternative HIV diagnostic strategy which, in case of a reactive result in a combined HIV1/2/O antibody + antigen screening test, comprises an HIV-1 nucleic acid test (NAT) for HIV confirmation instead of an antibody differentiation immunoassay (ADI). Only a negative NAT must be further investigated by an ADI, thus saving expenses for ADI in most instances. We have investigated this alternative strategy with respect to its recognition of dual HIV-1 and HIV-2 infection. Methods and Results Anonymized data of HIV notifications of patients newly diagnosed with HIV in Switzerland between 2007 and 2014 were analysed retrospectively. In a total of 4'679 notifications, we found 35 HIV-2 infections, 9 (25.7%) of which were dually infected with HIV-1. In 7 of the 9 dual HIV-1 and HIV-2 infections, HIV-1 RNA testing at the time of HIV diagnosis was positive with concentrations from 102 to 94'300 copies/mL plasma. HIV-1 RNA data were not available for the other two cases. Conclusions The alternative CDC strategy would have missed the concomitant HIV-2 infection in at least 7, but probably even more, of the 9 dually infected patients, as the detectable HIV-1 RNA would have precluded a supplemental ADI. Early ADI is mandatory for diagnosis of dual HIV-1/HIV-2 infection and guidance of appropriate therapy. PMID:27310138

  13. Critters in the cube farm: perceived psychological and organizational effects of pets in the workplace.

    PubMed

    Wells, M; Perrine, R

    2001-01-01

    This article reports the findings of an exploratory study examining the perceived functions and psychological and organizational effects of pets in the workplace. Participants were 193 employees from 31 companies allowing pets in the workplace who completed anonymous questionnaires. Results indicated that participants perceived pets in the workplace to reduce stress and to positively affect employee health and the organization. Participants who brought their pets to work perceived greater benefits than participants who did not bring their pets to work and participants who did not own pets. PMID:11199259

  14. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  15. Yahtzee: An Anonymized Group Level Matching Procedure

    PubMed Central

    Jones, Jason J.; Bond, Robert M.; Fariss, Christopher J.; Settle, Jaime E.; Kramer, Adam D. I.; Marlow, Cameron; Fowler, James H.

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being “leaked” or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records. PMID:23441156

  16. Unions and Workplace Reorganization.

    ERIC Educational Resources Information Center

    Nissen, Bruce, Ed.

    The 11 chapters in this book focus on "The New American Workplace" and assess its adequacy or inadequacy as a guide for the U.S. labor movement in relation to new work systems. "Unions and Workplace Reorganization" (Bruce Nissen) introduces the subject. "The New American Workplace: A Labor Perspective" (AFL-CIO Committee on the Evolution of Work,…

  17. Constituting the Workplace Curriculum

    ERIC Educational Resources Information Center

    Billett, Stephen

    2006-01-01

    This paper advances some bases for a workplace curriculum. These are premised on conceptions of curriculum as intents directed to individual's progression towards full and effective workplace performance, yet whose enactment is shaped by workplace factors and is ultimately experienced by workers as learners. So whether the intentions will be…

  18. Divisible E-Cash Systems Can Be Truly Anonymous

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Gouget, Aline

    This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2 L that he can parceled and spend anonymously and unlinkably. We present the construction of a security tag that allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a binary tree structure without using a trusted third party. This is the first divisible e-cash scheme that provides both full unlinkability and anonymity without requiring a trusted third party.

  19. AIDS in the Workplace: A Training for Managers and Supervisors. District of Oregon.

    ERIC Educational Resources Information Center

    Tyree, Jimmy L.

    This document provides a summary of "AIDS in the Workplace for Court Managers," a 3-hour seminar that was presented to the District of Oregon. The document begins with a summary of the seminar goals and objectives, which included the following: reduce fears and anxieties about HIV/AIDS in the workplace; provide information about the fundamentals…

  20. AIDS: Workplace Issues. INFO-LINE. Practical Guidelines for Training and Development Professionals. Issue 9208.

    ERIC Educational Resources Information Center

    American Society for Training and Development, Alexandria, VA.

    Practical guidelines are presented for training and development professionals dealing with acquired immune deficiency syndrome (AIDS) in the workplace. The following topics are covered: AIDS in the workplace; AIDS basics, including information on the required corporate commitment and transmission of human immunodeficiency virus (HIV); employment…

  1. Design of Anonymous Attribute Authentication Mechanism

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  2. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    PubMed

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery. PMID:3975305

  3. Reconstructing Spatial Distributions from Anonymized Locations

    SciTech Connect

    Horey, James L; Forrest, Stephanie; Groat, Michael

    2012-01-01

    Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many real-world scenarios.

  4. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    PubMed

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared. PMID:27219861

  5. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    NASA Astrophysics Data System (ADS)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  6. Group Aggression: The Effects of Friendship Ties and Anonymity.

    ERIC Educational Resources Information Center

    Zabrack, Merle; Miller, Norman

    The degree of acquaintance among group members (friends or strangers) and the opportunity for group members to observe each other's actions (anonymous or non-anonymous) were manipulated in a 2 x 2 factorial design, to determine the amount of aversive stimulation that would be administered to a target person. When group members could not observe…

  7. An Applet-based Anonymous Distributed Computing System.

    ERIC Educational Resources Information Center

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  8. Global Trends in Workplace Learning

    ERIC Educational Resources Information Center

    Lee, Lung-Sheng; Lai, Chun-Chin

    2012-01-01

    The paradigm of human resource development has shifted to workplace learning and performance. Workplace can be an organization, an office, a kitchen, a shop, a farm, a website, even a home. Workplace learning is a dynamic process to solve workplace problems through learning. An identification of global trends of workplace learning can help us to…

  9. Workplace Discrimination, A Picture of Hope and Concern. Global Report.

    ERIC Educational Resources Information Center

    World of Work, 2003

    2003-01-01

    An International Labour Organisation report finds that workplace discrimination is a persistent global problem. Although sex discrimination is most prevalent, discrimination in racial, HIV/AIDS, disability, religious, and age categories is rising. Progress is uneven, and inequalities within groups are widening. (SK)

  10. Burnout and workplace deviance among flight attendants in Taiwan.

    PubMed

    Liang, Su-Chiun; Hsieh, An-Tien

    2007-10-01

    The relationship between burnout and workplace deviance, identified as a component of job performance, was examined. Burnout was assessed with the Maslach Burnout Inventory which has three dimensions, Emotional Exhaustion, Depersonalization, and Reduced Personal Accomplishment. Workplace deviance was defined as voluntary behavior that violates significant organizational norms and threatens the well-being of an organization, its members, or both. This was assessed with the Workplace Deviance Scale, measuring the extent to which the participants had engaged in workplace deviant behavior such as taking property from work without permission, making fun of someone at work, or cursing at someone at work. Anonymous questionnaires with stamped envelopes were distributed to a sample of 1,470 Taiwanese flight attendants at the Arrival Hall of Taiwan Taoyuan International Airport. A response rate of 22.45% was obtained. After cases with missing data (n = 27) had been eliminated, the sample totaled 303, 17 men and 286 women. The average age was 28.7 yr. (SD = 4.6). Results of hierarchical regression showed that Depersonalization scores were significantly predictive of Workplace Deviance scores but not Emotional Exhaustion and Reduced Personal Accomplishment scores. Possible reasons and implications of these findings were discussed. PMID:18175485

  11. Anonymous reviews: Self-serving, counterproductive, and unacceptable

    NASA Astrophysics Data System (ADS)

    Beck, Myrl E., Jr.

    Recently I became involved in an incident in which a manuscript was rejected on the advice of two anonymous reviewers and an anonymous associate editor. This re-activated my long-standing disgust at the entire system of anonymous reviews and pushed me—finally—into doing something about it. A few weeks or months ago, I read a similar protest, somewhere—one much more persuasive than I am likely to write—but my high-mileage brain has misplaced its provenance. Consider this a “high-five” to that misplaced author.

  12. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  13. Proactive Copyright: Workplace Compliance

    ERIC Educational Resources Information Center

    Butler, Rebecca P.; Parker, Preston

    2009-01-01

    Oftentimes, copyright is addressed in the workplace only after a blatant infringement is discovered or a cease-and-desist letter is received. Then, too, some workplaces may feel that they are immune to copyright issues due to their educational nature; while private organizations, businesses, and industry may feel that the term "fair use" will…

  14. Developing Workplace Education Curriculum.

    ERIC Educational Resources Information Center

    Burkhart, Jennifer

    This guide, which is intended for project directors, coordinators, and other professional staff involved in developing/delivering workplace education programs, explains the process of developing a functional context workplace education curriculum. Discussed first are the following: the types of information needed to develop a functional context…

  15. Canadian Chefs' Workplace Learning

    ERIC Educational Resources Information Center

    Cormier-MacBurnie, Paulette; Doyle, Wendy; Mombourquette, Peter; Young, Jeffrey D.

    2015-01-01

    Purpose: This paper aims to examine the formal and informal workplace learning of professional chefs. In particular, it considers chefs' learning strategies and outcomes as well as the barriers to and facilitators of their workplace learning. Design/methodology/approach: The methodology is based on in-depth, face-to-face, semi-structured…

  16. Combating Workplace Ageism.

    ERIC Educational Resources Information Center

    Reio, Thomas G., Jr.; Sanders-Reio, Joanne

    1999-01-01

    Age discrimination in the workplace is widespread and often based on stereotypes. Research has demonstrated that older workers learn and perform well. Adult educators should eliminate ways in which educational practices perpetuate ageism, raise awareness of it in the workplace, and help older workers continue learning. (SK)

  17. Intervention as Workplace Learning

    ERIC Educational Resources Information Center

    Elkjaer, Bente; Nickelsen, Niels Christian Mossfeldt

    2016-01-01

    Purpose: The purpose of this paper is to illustrate how workplace interventions may benefit from a simultaneous focus on individuals' learning and knowledge and on the situatedness of workplaces in the wider world of changing professional knowledge regimes. This is illustrated by the demand for evidence-based practice in health care.…

  18. Workplace Education Guide, 1999.

    ERIC Educational Resources Information Center

    Massachusetts State Dept. of Education, Boston.

    These eight chapters share diverse experiences, lessons, and tips gleaned by the Massachusetts Workplace Literacy Consortium. "Workplace Needs Analysis (WNA)" (Harneen Chernow, Emily Singer, Jenny Lee Utech) focuses on the Worker Education Program's (WEP's) strategy, including tools, access, interviews and focus groups, presenting findings to the…

  19. Employment discrimination and HIV stigma: survey results from civil society organisations and people living with HIV in Africa.

    PubMed

    Sprague, Laurel; Simon, Sara; Sprague, Courtenay

    2011-01-01

    The article presents findings from three surveys of people living with HIV (PLHIV) and civil society organisations about the experience of employment discrimination and stigma in the workplace. The work seeks to contribute to efforts by businesses and other organisations to effectively respond to the HIV epidemic within the world of work, and to deepen our understanding of the ways in which HIV stigma and employment discrimination persist in the workplace. The findings of global and regional surveys indicate the existence of high levels of employment discrimination based on HIV status worldwide, including forced disclosure of HIV status, exclusion in the workplace, refusals to hire or promote, and terminations of people known to be living with HIV. The survey findings show that employment discrimination based on HIV status is experienced in all African subregions. Country-level surveys conducted in Kenya and Zambia indicated that PLHIV face marked barriers to employment, including discrimination in hiring, loss of promotions, and termination because of HIV status. Additionally, large variances were found in the degree of support versus discrimination that employees living with HIV in those two countries received following their disclosure. The discussion emphasises the importance of the workplace as a site for intervention and behaviour change. To address this, we introduce a conceptual framework - the employment continuum - that maps multiple points of entry within the workplace to address HIV-related stigma and discrimination. Additional recommendations include: actions to ensure equal opportunity in hiring for PLHIV; ensuring that HIV testing is voluntary, never mandatory, and that disclosure is not necessary for employment; ensuring confidentiality of HIV status; communicating and enforcing HIV-related antidiscrimination policies; establishing support groups in the workplace; providing safe and confidential processes for resolving complaints of employment

  20. HIV disclosure among adults living with HIV.

    PubMed

    Mayfield Arnold, E; Rice, E; Flannery, D; Rotheram-Borus, M J

    2008-01-01

    Research on disclosure among heterosexual adult person(s) living with HIV (PLH) was reviewed, omitting disclosure of parental HIV to children. Disclosure has been studied within five additional relational contexts: with partners, family members, friends, healthcare professionals and in work settings. Disclosure is higher among women than men, among Latino and white compared to African-American families, and among younger compared to older HIV-positive adults. Most PLH disclose to their sexual partners and family members, yet there is a significant minority who do not disclose. Similarly, rates of disclosure to employers range from 27-68%, suggesting broad variability in perceived consequences of employment disclosures. Of concern, 40% of PLH do not consistently disclose to their healthcare professionals. Rather than examine HIV disclosures in the context of relationships, it is possible to understand disclosures around personal identity. Disclosure decisions are often made to tell everyone (making HIV status a central attribute of one's identity), no one (requiring strategies for securing social support while remaining anonymous) or some people (requiring strategic decisions based on context). Given that disclosure decisions are central to personal identity, future data on disclosure and interventions designed to increase disclosure or comfort with disclosure must focus on communication strategies adopted by PLH to present a coherent identity. PMID:18278618

  1. "Brother Anonymous" and the Quiet Revolution in Quebec Education.

    ERIC Educational Resources Information Center

    Bennett, Paul W.; Jones, Richard A.

    1986-01-01

    This article offers a brief review of the writing of Jean-Paul Desbiens, an educational reformer and Quebec education official known as "Brother Anonymous." Juxtaposes two different articles by Desbiens, exposing the contradictions and conflicts between them. (JDH)

  2. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity

    SciTech Connect

    Shue, Craig A; Gupta, Prof. Minaxi

    2010-01-01

    Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active or passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.

  3. Pair Gamblers Anonymous with Other Treatments for Best Results

    MedlinePlus

    ... 2016 (HealthDay News) -- Gamblers Anonymous helps people with gambling problems, and it's even more effective when used ... published between 2002 and 2015 that examined problem gambling. The research included data on various aspects of ...

  4. Anonymization of DICOM electronic medical records for radiation therapy.

    PubMed

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-10-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1min/patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved. PMID:25147130

  5. Anonymization of DICOM Electronic Medical Records for Radiation Therapy

    PubMed Central

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-01-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1 minute per patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved. PMID:25147130

  6. [Self-disclosure on the Internet: the effects of anonymity of the self and the other].

    PubMed

    Sato, Hirotsune; Yoshida, Fujio

    2008-02-01

    The effects of anonymity on self-disclosure were investigated in a CMC (computer-mediated communication) situation by separately manipulating the anonymity of the self and the other. It was hypothesized that anonymity of the self would enhance disclosure, whereas anonymity of the other would decrease it. Female undergraduate students (n = 60) were randomly assigned to a 2 (self: anonymous or non-anonymous) x 2 (other: anonymous or non-anonymous) experimental design. The anonymity of the self and the other was manipulated in the profile, such as the photo, name, and sex of the self or the other, on the computer screen. The results indicated that anonymity of the self decreased the feeling of anxiety, but had no effect on disclosure, whereas anonymity of the other decreased the feeling of closeness and decreased the intimacy of disclosure. PMID:18402057

  7. Details for Manuscript Number SSM-D-07-01816R2 “Stigma in the workplace: Employer attitudes about people with HIV in Beijing, Hong Kong, and Chicago”

    PubMed Central

    Angell, Beth; Lam, Chow; Corrigan, Patrick

    2008-01-01

    Studies of HIV stigma in China are becoming more prevalent, but these studies have seldom involved direct cross-cultural comparisons. Moreover, although researchers consider employers to be a key power group whose practices can significantly impact the adjustment and recovery of people with HIV, the attitudes of employers in China towards people with HIV have rarely been studied. The present study sought to investigate employers’ attitudes and hiring practices towards people with HIV across three culturally and linguistically distinct cities: Chicago, Beijing, and Hong Kong. One hundred employers from a broad spectrum of firm types were interviewed across the three cities, and their qualitative data were analyzed for information about the processes behind employer practices in hiring people with HIV. Employers from all three cities showed reluctance to hire people with HIV, but this trend was most pronounced with employers from Beijing and Hong Kong. Concerns about biological contagion were apparent in all three cities. Social contagion, or the belief that people with HIV could morally corrupt those around them, was a particular concern of employers from Beijing and Hong Kong. The concerns about hiring people with HIV in Hong Kong and Beijing may be related to specific cultural dynamics related to loss of ‘face’, level of contact and knowledge about people with HIV, and the psychological interconnectedness between people in society. In sum, employers in all three cities showed concerns about hiring people with HIV, but at the same time, their attitudes about discriminating against people with HIV differed widely across the cities. PMID:18760869

  8. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  9. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  10. MRSA and the Workplace

    MedlinePlus

    ... Topics Publications and Products Programs Contact NIOSH NIOSH MRSA and the Workplace Recommend on Facebook Tweet Share ... infections from their healthcare provider Other FAQs About MRSA Signs and Symptoms What does a staph or ...

  11. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  12. Understanding HIV-related stigma among Indonesian nurses.

    PubMed

    Waluyo, Agung; Culbert, Gabriel J; Levy, Judith; Norr, Kathleen F

    2015-01-01

    Evidence indicates widespread stigmatization of persons living with HIV (PLWH) in Indonesia. Such attitudes among health care workers could impede the country's policies for effective diagnosis and medical treatment of PLWH. Nonetheless, research to guide interventions to reduce stigma in health care settings is lacking. Also, the contributions of workplace, religion, and HIV knowledge to nurses' HIV-related stigma are poorly understood. Our cross-sectional study aimed to describe factors associated with nurses' stigmatizing attitudes toward PLWH. Four hundred nurses recruited from four hospitals in Jakarta, Indonesia, were surveyed using the Nurse AIDS Attitude Scale to measure stigma. Stigmatizing attitudes were significantly predicted by education, HIV training, perceived workplace stigma, religiosity, Islamic religious identification, and affiliation with the Islamic hospital. HIV knowledge was not a significant predictor of stigmatizing attitudes. Organization changes fostering workplace diversity are likely to substantially reduce stigmatizing attitudes in nurses. PMID:24759060

  13. Understanding HIV-related stigma among Indonesian nurses

    PubMed Central

    Waluyo, Agung; Culbert, Gabriel J.; Levy, Judith; Norr, Kathleen

    2014-01-01

    Evidence indicates widespread stigmatization of persons living with HIV (PLWH) in Indonesia. Such attitudes among health care workers could impede the country’s policies for effective diagnosis and medical treatment of PLWH. Nonetheless, research to guide interventions to reduce stigma in health care settings is lacking. Also, the contributions of workplace, religion, and HIV knowledge to nurses’ HIV-related stigma are poorly understood. Our cross-sectional study aimed to describe factors associated with nurses’ stigmatizing attitudes toward PLWH. Four hundred nurses recruited from 4 hospitals in Jakarta, Indonesia, were surveyed using the Nurse AIDS Attitude Scale (NAAS) to measure stigma. Stigmatizing attitudes were significantly predicted by education, HIV training, perceived workplace stigma, religiosity, Islamic religious identification, and affiliation with the Islamic hospital. HIV knowledge was not a significant predictor of stigmatizing attitudes. Organization changes fostering workplace diversity are likely to substantially reduce stigmatizing attitudes in nurses. PMID:24759060

  14. Verifying Anonymous Credential Systems in Applied Pi Calculus

    NASA Astrophysics Data System (ADS)

    Li, Xiangxi; Zhang, Yu; Deng, Yuxin

    Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user's identity at the same time. A credential system (a.k.a. pseudonym system) usually consists of multiple interactive procedures between users and organizations, including generating pseudonyms, issuing credentials and verifying credentials, which are required to meet various security properties. We propose a general symbolic model (based on the applied pi calculus) for anonymous credential systems and give formal definitions of a few important security properties, including pseudonym and credential unforgeability, credential safety, pseudonym untraceability. We specialize the general formalization and apply it to the verification of a concrete anonymous credential system proposed by Camenisch and Lysyanskaya. The analysis is done automatically with the tool ProVerif and several security properties have been verified.

  15. Anonymous pastoral care for problems pertaining to sexuality.

    PubMed

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431

  16. On the Definitions of Anonymity for Ring Signatures

    NASA Astrophysics Data System (ADS)

    Ohkubo, Miyako; Abe, Masayuki

    This paper studies the relations among several definitions of anonymity for ring signature schemes in the same attack environment. It is shown that one intuitive and two technical definitions we consider are asymptotically equivalent, and the indistinguishability-based technical definition is the strongest, i. e., the most secure when achieved, when the exact reduction cost is taken into account. We then extend our result to the threshold case where a subset of members cooperate to create a signature. The threshold setting makes the notion of anonymity more complex and yields a greater variety of definitions. We explore several notions and observe certain relation does not seem hold unlike the simple single-signer case. Nevertheless, we see that an indistinguishability-based definition is the most favorable in the threshold case. We also study the notion of linkability and present a simple scheme that achieves both anonymity and linkability.

  17. Anonymous and Confidential Communications from an IP Addressless Computer

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on a mediating computer interposed between the sender and the receiver of an e-mail message have been used for several years by senders of e-mail messages who do not wish to disclose their identity to the receivers. In this model, the strength of the system to protect the identity of the sender depends on the ability and willingness of the mediator to keep the secret. In this paper, we propose a novel approach for sending truly anonymous message over the Internet which does not depend on a third party. Our idea departs from the traditional approach by sending the anonymous messages from an Internet wireless and addressless computer, such as a Personal Digital Assistant (PDA) bridged to the Internet by a Mobile Support Station (MSS).

  18. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. PMID:23675490

  19. Workplace in fluency management: factoring the workplace into fluency management.

    PubMed

    Cassar, M C; Neilson, M D

    1997-01-01

    This article addresses competency-based standards and guidelines for the involvement of speech-language pathologists in the workplace of clients who stutter. It advocates broadening customary practices in stuttering treatment and suggests that speech-language pathologists should extend their scope of service delivery to the workplace. It presents a sequence for the collaborative involvement of the employer and other workplace members and proposes strategies for evaluating workplace based fluency programs. Issues of fluency management, transfer, maintenance, and efficacy are discussed in the workplace context. Also addressed is workplace communication as well as such factors as stereotypes, discrimination, and resistance to change which may impinge on workplace intervention. It is argued that structured intervention, transfer, and generalization within a collaborative workplace framework facilitates best practice for the fluency clinician and more appropriate outcomes for the diversity of clients who stutter. PMID:9434336

  20. [Workplace-related anxiety, workplace phobia and disorders of participation].

    PubMed

    Muschalla, B; Linden, M

    2009-06-01

    Work is an important domain of life. It is therefore clear that problems at the workplace and mental disorders will have negative interactions. Job-related anxieties are of special importance as any workplace causes or intensifies anxiety by its very nature. A common final pathway of mental disorders in general and workplace-related anxieties in particular is workplace phobia. Similarly to agoraphobia, it is characterised by panic when approaching or even thinking of the stimulus, in this case the workplace. Workplace phobia has serious negative consequences for the further course of illness. It impairs the ability to work, and can lead to sick leave and early retirement. It requires special therapeutic interventions. This paper describes workplace-related anxieties and workplace phobia and gives a conceptual framework for their understanding. PMID:19544717

  1. SA's workplace programmes still poor, study finds.

    PubMed

    Mason, B

    1995-08-01

    In South Africa, a survey was conducted of 24 agencies that implement workplace HIV/AIDS programs to determine the range of programs, services, and resources offered by these agencies and the extent to which the programs observe generally-accepted strategies for AIDS and the workplace. The agencies were from the public sector (50%), the private sector (33%), and nongovernmental organizations (17%). Most of the programs consulted management but did not consult employee representatives at all levels. About 33% tried to talk to trade unions and fewer actually contacted them. Even though about 66% claimed to have provided peer educator training courses, most participants were health personnel, human resources personnel, or supervisors rather than peers of most employees. Most agencies either provided directly or facilitated access to resources (e.g., condoms and printed educational materials). Some agencies provided HIV testing and counseling. Almost 50% of agencies claimed that their audiovisual and printed materials were targeted to certain groups, yet none used evaluated media. More than 50% of agencies offered consultation on policy issues but few companies used this service. Less than 50% included follow-up as part of their program. 30-40% acknowledged the importance of follow-up and either advocated it to the companies or provided it on request. A formal evaluation of program effectiveness had been conducted of only one program. Less than 50% of programs claimed that informal evaluations of their programs had been done. A major reason for not conducting a formal evaluation was cost. These findings show that programs tend not to follow the generally-accepted strategies of AIDS and the workplace programs. Decision makers in management and in trade unions need to become familiar with guidelines for effective AIDS programs so they can make informed choices about programs and services. They should see that the company complies with those guidelines by insisting on a

  2. Workplace Safety: Indoor Environmental Quality

    MedlinePlus

    ... message, please visit this page: About CDC.gov . Workplace Safety & Health Topics Indoor Environmental Quality Health Hazard Evaluation ... Pinterest Twitter YouTube NIOSH Homepage NIOSH A-Z Workplace Safety & Health Topics Publications and Products Programs Contact NIOSH ...

  3. Simulated workplace neutron fields

    NASA Astrophysics Data System (ADS)

    Lacoste, V.; Taylor, G.; Röttger, S.

    2011-12-01

    The use of simulated workplace neutron fields, which aim at replicating radiation fields at practical workplaces, is an alternative solution for the calibration of neutron dosemeters. They offer more appropriate calibration coefficients when the mean fluence-to-dose equivalent conversion coefficients of the simulated and practical fields are comparable. Intensive Monte Carlo modelling work has become quite indispensable for the design and/or the characterization of the produced mixed neutron/photon fields, and the use of Bonner sphere systems and proton recoil spectrometers is also mandatory for a reliable experimental determination of the neutron fluence energy distribution over the whole energy range. The establishment of a calibration capability with a simulated workplace neutron field is not an easy task; to date only few facilities are available as standard calibration fields.

  4. Education and Nutritional Status of Orphans and Children of HIV-Infected Parents in Kenya

    ERIC Educational Resources Information Center

    Mishra, Vinod; Arnold, Fred; Otieno, Fredrick; Cross, Anne; Hong, Rathavuth

    2007-01-01

    We examined whether orphaned and fostered children and children of HIV-infected parents are disadvantaged in schooling, nutrition, and health care. We analyzed data on 2,756 children aged 0-4 years and 4,172 children aged 6-14 years included in the 2003 Kenya Demographic and Health Survey, with linked anonymous HIV testing, using multivariate…

  5. Online Role-Play: Anonymity, Engagement and Risk.

    ERIC Educational Resources Information Center

    Bell, Maureen

    2001-01-01

    Discussion of role-play focuses on a case study of an asynchronous, anonymous online role-play at an Australian university within a WebCT bulletin board that was designed as an alternative to an existing face-to-face workshop to offer more flexible access for participants. Suggests further research needs. (Author/LRW)

  6. Radical Reeducation: Alcoholics Anonymous as a Model in Adult Education.

    ERIC Educational Resources Information Center

    Crossman, Lenard H.

    1980-01-01

    The peer self-help group approach used by Alcoholics Anonymous can be a model for other types of adult learning. The group's power, solidarity, experience sharing, and values clarification can provide positive social and educational experiences to others such as the chronically unemployed, illiterate adults, and high school dropouts. (SK)

  7. Who Goes There? Staying Anonymous on the Internet

    ERIC Educational Resources Information Center

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  8. Anonymous Reviews: Self-serving, Counterproductive, and Unacceptable

    NASA Astrophysics Data System (ADS)

    Beck, Myrl E., Jr.

    Recently, I became involved in an incident in which a manuscript was rejected on the advise of two anonymous reviewers and an anonymous Associate Editor. This re-activated my long-standing disgust at the entire system of anonymous reviews and pushed me-finally-into doing something about it. A few weeks or months ago, I read a similar protest, somewhere-one much more persuasive than I am likely to write-but my high-mileage brain has misplaced its provenance. Consider this a ``high-five'' to that misplaced author. The system of reviewing is supposed to filter out junk science and provide useful feedback to authors of non-junk science who have submitted work that can be improved. These are honest, commendable endeavors that can be accomplished quite comfortably out in the open. Concealment, on the other hand, permits and invites all manner of dishonorable motives-not least of which is laziness-to creep in. Offhand I can think of four reasons for remaining anonymous in a review, none valid.

  9. A Survey on Non-transferable Anonymous Credentials

    NASA Astrophysics Data System (ADS)

    Pape, Sebastian

    There are at least two principal approaches to prevent users from sharing their anonymous credentials: adding valuable secrets into the system the user does not want to share or embedding biometric access control. This paper seeks to identify possible fields of application and to compare both approaches with respect to the credentials’ non-transferability.

  10. The Efficacy of Non-Anonymous Measures of Bullying

    ERIC Educational Resources Information Center

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this method is…

  11. Anonymously Productive and Socially Engaged While Learning at Work

    ERIC Educational Resources Information Center

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  12. Knowledge Sharing Systems: Advantages of Public Anonymity and Private Accountability

    ERIC Educational Resources Information Center

    Davis, Sarah

    2003-01-01

    This paper explores the benefits of the design elements of public anonymity and private accountability in classroom Knowledge Sharing Systems (KSS). The major findings of this study indicate that classroom KSS have the potential to allow for greater equity of input, reduce academic anxiety, increase teachers knowledge of student understanding …

  13. Social distance and anonymity modulate fairness consideration: An ERP study

    PubMed Central

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  14. Student Feedback, Anonymity, Observable Change and Course Barometers.

    ERIC Educational Resources Information Center

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  15. 18. Historic American Buildings Survey. Portion of an anonymous watercolor ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Historic American Buildings Survey. Portion of an anonymous watercolor painting of Fort McHenry bombardment of 1814. Peale Museum, Baltimore. View of southeast bastion and sally port. - Fort McHenry National Monument & Historic Shrine, East Fort Avenue at Whetstone Point, Baltimore, Independent City, MD

  16. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  17. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    ERIC Educational Resources Information Center

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  18. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  19. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    ERIC Educational Resources Information Center

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  20. Attitudes toward Spirituality and the Core Principles of Alcoholics Anonymous

    ERIC Educational Resources Information Center

    Davis, S. J.; Benshoff, John J.; Koch, D. Shane

    2006-01-01

    One-hundred and fifty-one students enrolled in substance abuse counselor training classes were surveyed on their attitudes about spirituality in substance abuse treatment and their beliefs about the principles of Alcoholics Anonymous (AA). Significant correlations were found between the subjects' spirituality and their attitudes toward…

  1. The Impact of Anonymization for Automated Essay Scoring

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  2. Anonymity in Blended Learning: Who Would You like to Be?

    ERIC Educational Resources Information Center

    Miyazoe, Terumi; Anderson, Terry

    2011-01-01

    This paper examines the learning outcomes associated with implementing discussion forums and blog writings using pseudonyms in blended learning. Although anonymity or masking one's identity has been used as a teaching strategy designed to induce higher writing production and lowering anxiety in face-to-face writing instruction, little research has…

  3. Collaborative Workplace Development: An Overview.

    ERIC Educational Resources Information Center

    Folinsbee, Sue; Jurmo, Paul

    This booklet, which is intended for educators, human resource specialists, and others responsible for training and education and workplace development, presents principles of good practice and steps for planning and implementing collaborative workplace development initiatives. A collaborative method of workplace development is detailed that…

  4. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  5. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    PubMed

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731

  6. Safety in the Workplace.

    ERIC Educational Resources Information Center

    Shaw, Richard

    1999-01-01

    Addresses workplace safety needs and tips for helping an organization achieve a high level of safety. Tips include showing administration commitment, establishing retribution-free reporting of safety problems and violations, rewarding excellent safety effort, and allowing no compromises in following safety procedures. (GR)

  7. Marketing Manual: Workplace Literacy.

    ERIC Educational Resources Information Center

    Fanshawe Coll., Strathroy (Ontario).

    This manual applies marketing concepts and methods, selling techniques and principles to the workplace literacy program for the purpose of assisting individuals involved in promoting and selling these programs. Part I provides a rationale for marketing and discusses the following: the role of the sponsor in marketing, market versus marketing,…

  8. Mathematics in Masons' Workplace

    ERIC Educational Resources Information Center

    Moreira, Darlinda; Pardal, Eugénia

    2012-01-01

    This paper presents masons' professional practices, which are related to mathematics. It aims to contribute to the area of adult mathematics education and to enlarge knowledge about how mathematics is used at the workplace. Methodologically it was followed an ethnographic approach. The key informants of the study were four masons aged between 40…

  9. The Changing American Workplace.

    ERIC Educational Resources Information Center

    Ranard, Donald A.

    1989-01-01

    An examination is made of the increasing educational demands of the modern workplace during a time when the makeup of an already shrinking workforce is becoming more composed of minorities, women, and immigrants. Articles in this newsletter issue discuss which jobs will grow and which will decline; the new educational demands and skills required…

  10. Workplace Diversity Issues.

    ERIC Educational Resources Information Center

    1999

    This document contains three symposium papers on workplace diversity issues. "Expanding Theories of Career Development: Adding the Voices of African American Women in the White Academy" (Mary V. Alfred) questions the validity of existing career development models for women and minority groups and examines the professional development of five…

  11. Workplace Counseling Tools.

    ERIC Educational Resources Information Center

    Kirk, James J.; Woody, Connie; Burns, Naomi; Howard, Sherrie; Rice, Misty

    This publication describes counseling approaches supervisors and human resource professionals can use to help marginal employees become better adjusted and more productive in the workplace. Three case studies are also provided for training purposes. The counseling tools are as follows: (1) Adlerian counseling, involving the belief that humans'…

  12. Multilingualism in European Workplaces

    ERIC Educational Resources Information Center

    Gunnarsson, Britt-Louise

    2014-01-01

    This state-of-the-art article includes a review of past and recent studies on multilingualism at work in European environments. One aim is to provide the reader with a cross-cultural picture of workplace studies on various languages in Europe, another to discuss both positive and problem-based accounts of multilingualism at work. The overview…

  13. Changing Families, Changing Workplaces

    ERIC Educational Resources Information Center

    Bianchi, Suzanne M.

    2011-01-01

    American families and workplaces have both changed dramatically over the past half-century. Paid work by women has increased sharply, as has family instability. Education-related inequality in work hours and income has grown. These changes, says Suzanne Bianchi, pose differing work-life issues for parents at different points along the income…

  14. Diversity in the Workplace.

    ERIC Educational Resources Information Center

    1996

    This document contains three papers presented at a symposium on diversity in the workplace moderated by Sandra Johnson at the 1996 conference of the Academy of Human Resource Development (AHRD). "Diversity and Development: An Assessment of Equal Opportunities and the Role of HRD in the Police Service" (Rashmi Biswas, Penny Dick) examines aspects…

  15. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    ERIC Educational Resources Information Center

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  16. Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    A user identity anonymity is an important property for roaming services. In 2011, Kang et al. proposed an improved user authentication scheme that guarantees user anonymity in wireless communications. This letter shows that Kang et al.'s improved scheme still cannot provide user anonymity as they claimed.

  17. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  18. ARX - A Comprehensive Tool for Anonymizing Biomedical Data

    PubMed Central

    Prasser, Fabian; Kohlmayer, Florian; Lautenschläger, Ronald; Kuhn, Klaus A.

    2014-01-01

    Collaboration and data sharing have become core elements of biomedical research. Especially when sensitive data from distributed sources are linked, privacy threats have to be considered. Statistical disclosure control allows the protection of sensitive data by introducing fuzziness. Reduction of data quality, however, needs to be balanced against gains in protection. Therefore, tools are needed which provide a good overview of the anonymization process to those responsible for data sharing. These tools require graphical interfaces and the use of intuitive and replicable methods. In addition, extensive testing, documentation and openness to reviews by the community are important. Existing publicly available software is limited in functionality, and often active support is lacking. We present ARX, an anonymization tool that i) implements a wide variety of privacy methods in a highly efficient manner, ii) provides an intuitive cross-platform graphical interface, iii) offers a programming interface for integration into other software systems, and iv) is well documented and actively supported. PMID:25954407

  19. Anonymizing patient genomic data for public sharing association studies.

    PubMed

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes. PMID:23920753

  20. Faculty mentoring programme--ways of reducing anonymity.

    PubMed

    Woessner, R; Honold, M; Stehle, I; Stehr, S; Steudel, W I

    1998-07-01

    Increasing anonymity and the lack of personal contact between professor and student due to high enrolment is one of the major problems at German universities. Therefore, the Faculty of Medicine of the University of the Saarland started a pilot project in 1995. The intention was to reduce anonymity within the faculty by introducing a faculty mentoring programme (Studientutorium). A group of up to 12 students from different years is allocated a faculty member on a personal basis. The member responds to questions and problems concerning such areas as the curriculum, career planning or doctoral thesis as well as to personal problems. After 2 years participants were interviewed about the programme for the first time and the acceptance turned out to be high. PMID:9743811

  1. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-06-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  2. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle

    PubMed Central

    Pagano, Maria E.; Post, Stephen G.; Johnson, Shannon M.

    2012-01-01

    The helper therapy principle (HTP) observes the helper’s health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry. PMID:23525280

  3. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post

  4. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  5. Social desirability, anonymity, and Internet-based questionnaires.

    PubMed

    Joinson, A

    1999-08-01

    It has been argued that behavior on the Internet differs from similar behavior in the "real world" (Joinson, 1998a). In the present study, participants completed measures of self-consciousness, social anxiety, self-esteem, and social desirability, using either the World-Wide Web (WWW) or pen and paper, and were assigned to either an anonymous or a nonanonymous condition. It was found that people reported lower social anxiety and social desirability and higher self-esteem when they were anonymous than when they were nonanonymous. Furthermore, participants also reported lower social anxiety and social desirability when they were using the Internet than when they were using paper-based methods. Contrast analyses supported the prediction that participants using the WWW anonymously would show the lowest levels of social desirability, whereas participants answering with pen and paper nonanonymously would score highest on the same measure. Implications for the use of the Internet for the collection of psychological data are discussed. PMID:10502866

  6. [E-research: problems with anonymity and consent].

    PubMed

    Woolderink, Marla; van Asselt, Antoinette D I; van Schayck, Constant P; van Wijmen, Frans C B

    2013-01-01

    The Medical Research Involving Human Subjects Act (WMO) requires that participants in medical-scientific studies provide written consent. This requirement makes e-research (online research) unnecessarily difficult and sometimes impossible. Much of e-research involves online interventions that focus on sensitive issues such as sexual dysfunction, addiction and child abuse, for which anonymity is an important condition. WMO procedures, however, strictly interpret the word "written" as "on paper", and participants are not permitted to give consent by email, for example. A second requirement, which mainly makes studies among minors between the ages of 12 and 18 more difficult, is that both parents or the guardian must provide written consent. This undermines anonymity to such an extent that virtually no subjects remain. Participants in medical-scientific studies must always be identifiable to the investigator. But, apart from this, he/she should be possible to guarantee anonymity within the regulatory framework. There is good reason to adapt legal regulations to today's needs. PMID:24345359

  7. Guaranteeing anonymity when sharing medical data, the Datafly System.

    PubMed

    Sweeney, L

    1997-01-01

    We present a computer program named Datafly that maintains anonymity in medical data by automatically generalizing, substituting, and removing information as appropriate without losing many of the details found within the data. Decisions are made at the field and record level at the time of database access, so the approach can be used on the fly in role-based security within an institution, and in batch mode for exporting data from an institution. Often organizations release and receive medical data with all explicit identifiers, such as name, address and phone number, removed in the incorrect belief that patient confidentiality is maintained because the resulting data look anonymous; however, we show the remaining data can often be used to re-identify individuals by linking or matching the data to other databases or by looking at unique characteristics found in the fields and records of the database itself. When these less apparent aspects are taken into account, each released record can be made to ambiguously map to many possible people, providing a level of anonymity determined by the user. PMID:9357587

  8. Utility-preserving transaction data anonymization with low information loss

    PubMed Central

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-01-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual’s record to their identity. Approaches that anonymize data by eliminating certain values in an individual’s record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers’ utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency. PMID:22563145

  9. How to kill gamete donation: retrospective legislation and donor anonymity.

    PubMed

    Pennings, Guido

    2012-10-01

    Victoria (Australia) is considering retrospective legislation on the abolition of gamete donor anonymity. Retrospective legislation evokes many negative emotions mainly because it is considered unfair. It also makes it impossible for citizens to organize their life with reasonable certainty of the consequences. Introduction of this law for donor anonymity is defended by the right of the child to know its genetic origins. Against this law, people appeal to the right to privacy and confidentiality of the donor. This paper analyses the arguments for and against a retrospective law on donor anonymity by looking at the conditions that should be respected when two principles (the donor's right to privacy and the child's right to genetic information) have to be balanced. It is concluded that the justification for introducing retrospective law is lacking: the conditions are not fulfilled. Moreover, retroactive laws in the context of gamete donation may jeopardize the whole practice by destroying the trust of candidate donors and recipients in the government. PMID:22786778

  10. Learning in the Workplace. Review of Research.

    ERIC Educational Resources Information Center

    Hager, Paul

    Research on changes and issues in workplace learning in Australia over the past 6 years was reviewed. Special attention was paid to four topics: importance of learning in the workplace; nature of workplace learning; factors affecting the quality of workplace learning; and recognition of workplace learning. Selected findings were as follows: (1)…

  11. Human factors workplace considerations

    NASA Technical Reports Server (NTRS)

    Haines, Richard F.

    1988-01-01

    Computer workstations assume many different forms and play different functions today. In order for them to assume the effective interface role which they should play they must be properly designed to take into account the ubiguitous human factor. In addition, the entire workplace in which they are used should be properly configured so as to enhance the operational features of the individual workstation where possible. A number of general human factors workplace considerations are presented. This ongoing series of notes covers such topics as achieving comfort and good screen visibility, hardware issues (e.g., mouse maintenance), screen symbology features (e.g., labels, cursors, prompts), and various miscellaneous subjects. These notes are presented here in order to: (1) illustrate how one's workstation can be used to support telescience activities of many other people working within an organization, and (2) provide a single complete set of considerations for future reference.

  12. Defining workplace bullying behaviour professional lay definitions of workplace bullying.

    PubMed

    Saunders, Paula; Huynh, Amy; Goodman-Delahunty, Jane

    2007-01-01

    As is commonly the case in new areas of research, workplace bullying researchers and practitioners have struggled to establish a single agreed-upon definition of this phenomenon. As a consequence, there are numerous definitions of workplace bullying currently in use around the world to investigate this serious workplace issue, to educate the workforce about this form of harassment and to assess claims involving allegations of workplace bullying. Additionally, little is known about how employees and people in general define workplace bullying behaviour, and whether current researcher, practitioner and legal definitions coincide with lay definitions of bullying. To compare researcher, practitioner and legal definitions of workplace bullying with lay definitions, the content of definitions composed by adults from diverse personal and professional backgrounds (N=1095) was analysed. Results confirmed that components commonly used by researchers and practitioners, including the occurrence of harmful and negative workplace behaviours, were frequently cited by participants as central defining components of bullying behaviour. In addition, lay definitions often included themes of fairness and respect. The emergence of these themes has important consequences for organisations responding to, and attempting to prevent the occurrence of workplace bullying behaviour in that organisations in which bullying is tolerated may violate both local laws as well as their ethical responsibility to provide employees with a safe, professional and respectful workplace. PMID:17692375

  13. The impact of workplace factors on evidence-based speech-language pathology practice for children with autism spectrum disorders.

    PubMed

    Cheung, Gladys; Trembath, David; Arciuli, Joanne; Togher, Leanne

    2013-08-01

    Although researchers have examined barriers to implementing evidence-based practice (EBP) at the level of the individual, little is known about the effects workplaces have on speech-language pathologists' implementation of EBP. The aim of this study was to examine the impact of workplace factors on the use of EBP amongst speech-language pathologists who work with children with Autism Spectrum Disorder (ASD). This study sought to (a) explore views about EBP amongst speech-language pathologists who work with children with ASD, (b) identify workplace factors which, in the participants' opinions, acted as barriers or enablers to their provision of evidence-based speech-language pathology services, and (c) examine whether or not speech-language pathologists' responses to workplace factors differed based on the type of workplace or their years of experience. A total of 105 speech-language pathologists from across Australia completed an anonymous online questionnaire. The results indicate that, although the majority of speech-language pathologists agreed that EBP is necessary, they experienced barriers to their implementation of EBP including workplace culture and support, lack of time, cost of EBP, and the availability and accessibility of EBP resources. The barriers reported by speech-language pathologists were similar, regardless of their workplace (private practice vs organization) and years of experience. PMID:22967045

  14. [Workplace related anxiety and phobia].

    PubMed

    Linden, M; Muschalla, B

    2007-01-01

    Work is an important aspect of life. Problems at the workplace must therefore have negative consequences on the mental status and mental problems will interfere with the working place. The relation between anxiety and the workplace is especially important because the workplace causes anxiety due to its very nature. A common final pathway of mental disorders in general, and work related anxieties in particular, are workplace phobias, with panic when approaching or even thinking of the workplace. This is a serious complication with negative consequences for the further course of illness. It makes special therapeutic intervention necessary. This paper describes the phenomenon of workplace related anxieties and phobia and provides a conceptual framework for their understanding. PMID:17106728

  15. The implications of stigma and anonymity for self-disclosure in health blogs.

    PubMed

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness. PMID:23356432

  16. The ethics of unlinked anonymous testing of blood: views from in-depth interviews with key informants in four countries

    PubMed Central

    Kessel, Anthony S; Datta, Jessica; Wellings, Kaye; Perman, Sarah

    2012-01-01

    Objectives In this study we explore the ethical issues around unlinked anonymous testing (UAT) of blood, a method of seroprevalence surveillance for infectious diseases. Our study focused on UAT for HIV, although UAT can be used for other infectious diseases. The objectives of the research were to gain a better understanding of the views of key informants in countries adopting different UAT testing strategies, and to use the findings of the research to inform health policy. Design Qualitative study using in-depth interviews and ethical analysis. Setting Four countries using different strategies around UAT of blood for HIV (the UK, the USA, the Netherlands and Norway). Participants Twenty-three key informants in the four countries. Results Participants from the four countries have different views on UAT of blood, and the approaches and policies on UAT adopted by different countries have been historically and culturally determined. We use our findings to explore the relationship between public health policy and ethics, framing our discussion in relation to two important contemporary debates: informed consent for participation in medical and public health research; and the balance between the individual good and the public good. Conclusions Qualitative research and ethical analysis of UAT of blood in different countries has yielded important findings for consideration by policy makers. The policy of UAT of blood for HIV and other diseases in the UK needs reconsideration in the light of these findings. PMID:23263019

  17. HIV Symptoms

    MedlinePlus

    ... Submit Home > HIV/AIDS > What is HIV/AIDS? HIV/AIDS This information in Spanish ( en español ) HIV symptoms Photo courtesy of AIDS.gov More information ... and brain Return to top More information on HIV symptoms Explore other publications and websites Basic Information ...

  18. Experienced Teachers' Informal Workplace Learning and Perceptions of Workplace Conditions

    ERIC Educational Resources Information Center

    Hoekstra, Annemarieke; Korthagen, Fred; Brekelmans, Mieke; Beijaard, Douwe; Imants, Jeroen

    2009-01-01

    Purpose: The purpose of this paper is to explore in detail how teachers' perceptions of workplace conditions for learning are related to their informal workplace learning activities and learning outcomes. Design/methodology/approach: From a sample of 32 teachers, a purposeful sampling technique of maximal variation was used to select two cases…

  19. Workplace English: From Literature Classics to Workplace Literacy.

    ERIC Educational Resources Information Center

    Dixon-Krauss, Lisbeth; McClanahan, Linda

    This paper explains the rationale and methods for integrating workplace literacy with English literature instruction for high school or adult students. The workplace literacy/English literature activities presented include: (1) a newsletter format reporting on the major historical periods in English literature; (2) a business project report used…

  20. Monitoring HIV through sentinel surveillance in Morocco.

    PubMed

    Elharti, E; Zidouh, A; Mengad, R; Bennani, O; Elaouad, R

    2002-01-01

    HIV sentinel surveillance was performed in five provinces of Morocco in 1993, expanded to 10 provinces in 1996. The activity was done by unlinked anonymous testing procedures. We analysed the data from 1993 to 1999. The groups studied were sexually transmitted infections, clinic attendees, pregnant women and patients with pulmonary tuberculosis. The results show that overall HIV prevalence rate over the whole period in 10 cities was 0.10% (45/44,233). Casablanca had a significantly high rate with 0.39% (10/2567). The patients with pulmonary tuberculosis displayed the highest prevalence with 0.36% (9/2530). These data confirm the assumption that the HIV epidemic is low in Morocco. However, the increase of HIV prevalence lately calls for reinforcing preventive measures to limit its spread. PMID:15330569

  1. HIV Prevention

    MedlinePlus

    ... to treat HIV infection (called antiretroviral therapy, or ART) the right way, every day and his or ... way, every day, the medicine to treat HIV (ART) reduces the amount of HIV (called “viral ...

  2. Deindividuation, anonymity, and violence: findings from Northern Ireland.

    PubMed

    Silke, Andrew

    2003-08-01

    The author examined the relation between anonymity and aggression in violent interpersonal assaults that occurred in Northern Ireland. Of the 500 violent attacks that the author studied, 206 were carried out by offenders who wore disguises to mask their identities. The findings revealed that significant positive relationships existed between the use of disguises and several measures of aggression. Disguised offenders inflicted more serious physical injuries, attacked more people at the scene, engaged in more acts of vandalism, and were more likely to threaten victims after the attacks. The author discussed these results within the framework of deindividuation theory. PMID:12934837

  3. Quantum anonymous ranking based on the Chinese remainder theorem

    NASA Astrophysics Data System (ADS)

    Lin, Song; Guo, Gong-De; Huang, Feng; Liu, Xiao-Fen

    2016-01-01

    In this paper, an efficient quantum anonymous ranking protocol with single particles is proposed. A semitrusted server is introduced to help multiple users achieve this secure task. At the end of the protocol, each user can obtain the rankings of his private data, and keep these data secret. The Chinese remainder theorem is utilized to reduce the level of signal particles and to improve the efficiency of the presented protocol. Meanwhile, a secret transmission order of the signal particles is used to keep the traveling particles secure. Finally, we discuss the security of this protocol and prove it to be secure against certain common attacks under ideal conditions.

  4. AIDS and the workplace: signs of hope from Zimbabwe.

    PubMed

    Williams, G; Ray, S

    1994-01-01

    Strategies for Hope is a series of booklets and videos about innovative and practical approaches to AIDS management and prevention in developing countries. It is published by the UK development agency ACTIONAID and the African Medical and Research Foundation with technical and financial support from the World Health Organization Global Program on AIDS. More than 500,000 booklets and 5000 videos have been distributed worldwide. The authors describe what they learned while researching the eighth booklet in the series, Work Against AIDS, analyzing seven workplace-based AIDS programs in Zimbabwe. They argue that the workplace can play a far greater role in AIDS awareness and prevention than is generally realized. AIDS is already affecting the health and productivity of the workforce in Zimbabwe, where in some areas more than 15% of adults are estimated to be HIV-positive. Morbidity and mortality are rising with concomitant worker absenteeism, yet most workplaces in Zimbabwe do not have even a poster about AIDS on display. There are, however, some impressive education programs under way. These programs, run by a significant number of volunteer peer educators, are working to reduce the stigma attached with sexually transmitted diseases and promote low-cost or free treatment. The authors also note as most promising the program of the Zimbabwe Congress of Trade Unions training 700 Health and Safety representatives at shop-floor and branch levels in AIDS-related human rights issues at the workplace as well as AIDS awareness and prevention. PMID:12318814

  5. Ohio Workplace Education Resource Guide.

    ERIC Educational Resources Information Center

    Northwest ABLE Resource Center, Toledo, OH.

    This manual is designed for adult basic education programs to use as a resource for workplace education (WE). It begins with a section of introductory materials, including a WE definition, scope of work, and survey results. The next section contains a program profile; director/coordinator profile; instructor profiles; Ohio ABLE workplace site…

  6. Workplace Literacy: A Resource Book.

    ERIC Educational Resources Information Center

    Guglielmino, Lucy Madsen; Byran, Valerie C.

    This resource book provides information on developing a workplace literacy program, descriptions of Florida Workplace Literacy Programs, and an annotated bibliography of resources. An introduction discusses the problem of basic skills deficiencies, projections that indicate the problem will increase, the Florida context, and benefits realized when…

  7. Experience, Competence and Workplace Learning

    ERIC Educational Resources Information Center

    Paloniemi, Susanna

    2006-01-01

    Purpose: This paper aims to examine employees' conceptions of the meaning of experience in job-competence and its development in workplace context. The aim is to bring out the variety of conceptions related to experience, competence and workplace learning. Design/methodology/approach: The paper is based on interview data from six Finnish small and…

  8. Union Roles in Workplace Literacy.

    ERIC Educational Resources Information Center

    Hensley, Stephen Michael

    1993-01-01

    Discusses roles for labor unions in resolving workforce deficiencies, suggesting that labor, management, and government must work together to develop cooperative training initiatives. Describes labor's historic role in basic and workplace literacy training, lists skills workers need in the "new" workplace, describes exemplary union-management…

  9. Workplace Spirituality and Organizational Performance.

    ERIC Educational Resources Information Center

    Garcia-Zamor, Jean-Claude

    2003-01-01

    Examines workplace spirituality in an historical context and compares it to religious beliefs and to established ethical theories and moral principles. Suggests how managers and administrators in both the public and private sectors can use workplace spirituality to increase performance and develop ethical organizations. (Contains 54 references.)…

  10. Workplace incivility: a concept analysis.

    PubMed

    Abolfazl Vagharseyyedin, Seyyed

    2015-01-01

    This study aimed to describe the meaning of the concept 'workplace incivility' and promote consistency in its application in nursing research and practice. The methodology introduced by Walker and Avant was used to analyze this concept. A total number of 50 studies that had essentially addressed the concept of incivility in employees' work environment was selected. Ambiguous intent, violation of mutual respect, low intensity and lack of physical assault were identified as the defining attributes of workplace incivility. The necessary antecedent of workplace incivility consisted of the presence of two or more people, with one or more as the source of the incivility, and another or others as its target in the workplace. Moreover, certain individual and organisational factors were the potential antecedents of workplace incivility. Possible negative outcomes for victims, witnesses, organisations, society and perpetrators of such behaviours, such as increased cost for the organisation, reduced citizenship performance, psychological distress and anxiety were identified as outcomes of workplace incivility. Results of the current concept analysis can guide nurse managers to design interventions so that the occurrence of workplace incivility can be reduced. Further studies can focus on testing the psychometric properties of the existing workplace incivility scales, especially uncivil behaviours experienced by nurses across different societies or cultures. PMID:26213258

  11. Workplace Literacy: A Labour Perspective.

    ERIC Educational Resources Information Center

    Nesbit, Tom

    The policies and practices of Canadian labor unions in the area of workplace literacy were examined through a comprehensive literature review and site visits to an unspecified number of labor-initiated workplace literacy programs representing different geographic areas, industries and types of occupations, levels of participation of equity groups,…

  12. Black Boxes in Workplace Mathematics

    ERIC Educational Resources Information Center

    Williams, Julian; Wake, Geoff

    2007-01-01

    We ground Cultural-Historical Activity Theory (CHAT) in studies of workplace practices from a mathematical point of view. We draw on multiple case study visits by college students and teacher-researchers to workplaces. By asking questions that "open boxes", we "outsiders and boundary-crossers" sought to expose contradictions between College and…

  13. Communication Skills for Workplace Assessors.

    ERIC Educational Resources Information Center

    Corbett, Deborah

    This document is designed to help develop the communication skills of individuals training for the position of workplace assessor in Australia's National Training Framework and practicing workplace assessors who require additional assistance with on-the-job communication skills. The document consists of 11 units of study that each contain some or…

  14. Adult Learning in the Workplace.

    ERIC Educational Resources Information Center

    1999

    This document contains four symposium papers on adult learning in the workplace. "The Relationship between Workplace Learning and Employee Satisfaction in Small Businesses" (Robert W. Rowden, Shamsuddin Ahmad) reports the results of a study of the nature and extent of HRD, level of job satisfaction among workers, and correlation between HRD…

  15. The Toll of Workplace Bullying

    ERIC Educational Resources Information Center

    Killoren, Robert

    2014-01-01

    Bullying may be more common than most people think. According to a study commissioned by the Workplace Bullying Institute, one in three employees experience bullying in the workplace either as a victim or as a witness suffering collateral damage. Bullying is a serious problem. Directors, managers, and staff members need to ensure that it does not…

  16. The Workplace and Mental Health.

    ERIC Educational Resources Information Center

    Pierre, Karin Domnick

    1986-01-01

    Findings of the Canadian Mental Health and the Workplace Project are that (1) the quality of interpersonal relations in the workplace is a major factor in emotional well-being and (2) work must be balanced with other parts of one's life. These findings imply the need for social support networks and alternative work patterns. (SK)

  17. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    PubMed

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. PMID:27073260

  18. Workplace discrimination and cancer.

    PubMed

    McKenna, Maureen A; Fabian, Ellen; Hurley, Jessica E; McMahon, Brian T; West, Steven L

    2007-01-01

    Data from the Equal Employment Opportunity Commission (EEOC) Integrated Mission System database were analyzed with specific reference to allegations of workplace discrimination filed by individuals with cancer under ADA Title One. These 6,832 allegations, filed between July 27, 1992 and September 30, 2003, were compared to 167,798 allegations from a general disability population on the following dimensions: type of workplace discrimination; demographic characteristics of the charging parties (CPs); the industry designation, location, and size of employers; and the outcome or resolution of EEOC investigations. Results showed allegations derived from CPs with cancer were more likely than those in the general disability population to include issues involving discharge, terms and conditions of employment, lay-off, wages, and demotion. Compared to the general disability group, CPs with cancer were more likely to be female, older, and White. Allegations derived from CPs with cancer were also more likely to be filed against smaller employers (15-100 workers) or those in service industries. Finally, the resolution of allegations by CPs with cancer were more likely to be meritorious than those filed from the general disability population; that is, actual discrimination is more likely to have occurred. PMID:18057571

  19. Private anonymous fingerprinting for color images in the wavelet domain

    NASA Astrophysics Data System (ADS)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  20. Quantum anonymous voting with unweighted continuous-variable graph states

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-05-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  1. Quantum anonymous voting with unweighted continuous-variable graph states

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  2. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    PubMed

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought. PMID:22908618

  3. Nonexposure accurate location K-anonymity algorithm in LBS.

    PubMed

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR. PMID:24605060

  4. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    PubMed Central

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR. PMID:24605060

  5. Challenges of educational and cultural diversity in the workplace.

    PubMed

    Hyde, S; White, S

    1993-01-01

    In South Africa, the estimate of HIV-infected population was 300,000 in September 1993, with 500 new infections occurring daily, mostly in poor neighborhoods with illiteracy rates of 25-50%. The AIDS Education and Training (AET) targeted low-literate groups by developing an educational package for the workplace. The methodology included repetition of key messages, stories from their own culture with pictures, interaction in groups, and visual aids to retain information. The content involved biomedical aspects of HIV/AIDS, testing and counseling, safe sex, traditional healers, the needs of the infected, and workplace/community issues. The pictures depicted men and women of all racial varieties to drive home the message that the infection can infect everybody. 31 colorful laminated posters were developed for the AIDS flip chart kit, and over 100 flip chart sessions were conducted at workplaces. An evaluation of the flip chart sessions queried 143 English- and 897 Tswana-speaking people at one company. 58% of respondents considered condom use and reducing the number of partners the most important message. 28% deemed biomedical facts and latency of the infection important, 25% the deadly nature of the disease, and 15% the modes of transmission. 44% desired to learn about prevention and 30% appreciated the interactive method of learning. All participants sought more information on STDs, where to get an HIV test, and how to have safer sex. AET provides assistance to clients to become educators themselves by means of policy development, refresher courses for educators, and action planning (condom distribution, STD control, referral for testing, and follow-up). The flip chart is also used for other health and lifestyle education regarding family planning, tuberculosis, sexuality, and communication skills aimed at company managers, union officials, and supervisors. PMID:12345400

  6. Ten-year trends in HIV prevalence among visitors to public health centers under the National HIV Surveillance System in Korea, 2000 to 2009

    PubMed Central

    2012-01-01

    Background Korea saw a sharp increase in HIV diagnosis from 2000. This serious public health concern must be monitored diligently. We identified the characteristics and trends in HIV prevalence among visitors to public health centers (PHCs) from 2000 to 2009. Methods We retrieved ten-year data of HIV tests from 253 PHCs. The HIV prevalence was analyzed by gender, age, nationality, region, and reason for HIV testing. Data were analyzed using logistic regression and score test for trend. Results HIV prevalence among PHCs’ visitors has rapidly increased for six years since 2000, decreased from 2006, and then remained stable. Approximately 50% of total HIV tests were performed for sexually transmitted infection risk group (STI RG), who were tested 1.4 times within a year. Women and the 20s comprised approximately 70% and 40% of PHCs’ visitors, respectively. The prevalence of voluntary test takers was the highest and showed most rapid increase (P = 0.007), but that of prisoners declined (P = 0.003). The prevalence of STI RG was lower than those of the other groups and remained stable throughout the ten-year period (P = 0.606). Percentage of anonymous tests was 2–3% of a total HIV tests, but overall HIV-positive rate showed a rapid increase (P < 0.001). Conclusions As voluntary or anonymous testing groups are actively engaged in learning their status of HIV, these groups showed the highest in HIV infection. Groups in the population with these characteristics should be located and encouraged to be tested, and offered anonymity. This study suggests that it is important to ascertain the characteristics of people choosing to take voluntary testing. PMID:23020818

  7. Diversity management: the treatment of HIV-positive employees.

    PubMed

    Yap, Matthew H T; Ineson, Elizabeth M

    2012-01-01

    Socio-demographic dimensions such as age, gender, sexual orientation, race and ethnicity are commonly included in diversity studies. With a view to helping Asian hospitality managers to manage HIV-positive employees in their workplaces through diversity management (DM) theory, this research extends the boundaries of previous diversity studies by considering Human Immunodeficiency Virus (HIV) infection as a diverse characteristic. Both quantitative and qualitative primary data were collected from purposively selected Asian hospitality managers through postal questionnaire and follow-up telephone interviews. Transformed raw data were analysed using summary statistics and template analysis. Asian hospitality managers agreed that DM would be appropriate in the management of HIV-positive employees and that it could generate substantial benefits for employees and employers. However, they believe that the successful adoption and implementation of DM is not easy; it requires training and, ideally, the recruitment of experienced directors. Nevertheless, Asian hospitality managers are confident that implementing DM to manage HIV-positive employees can enhance tolerance, improve understanding and promote equality. The purposive sampling technique and the small number of respondents have impacted the external validity of the study. However, this exploratory study initiates an equality discussion to include HIV-positive employees in DM discourse beyond antidiscrimination legislation. It also supplements the sparse literature addressing HIV-positive employees in the Asian hospitality workplace. Asian hospitality managers are advised to understand and employ DM to treat HIV-positive employees fairly to overcome hospitality workplace marginalisation, discrimination and stigmatisation. PMID:22293097

  8. Antiferromagnetic character of workplace stress

    NASA Astrophysics Data System (ADS)

    Watanabe, Jun-Ichiro; Akitomi, Tomoaki; Ara, Koji; Yano, Kazuo

    2011-07-01

    We study the nature of workplace stress from the aspect of human-human interactions. We investigated the distribution of Center for Epidemiological Studies Depression Scale scores, a measure of the degree of stress, in workplaces. We found that the degree of stress people experience when around other highly stressed people tends to be low, and vice versa. A simulation based on a model describing microlevel human-human interaction reproduced this observed phenomena and revealed that the energy state of a face-to-face communication network correlates with workplace stress macroscopically.

  9. Predicting workplace aggression and violence.

    PubMed

    Barling, Julian; Dupré, Kathryne E; Kelloway, E Kevin

    2009-01-01

    Consistent with the relative recency of research on workplace aggression and the considerable media attention given to high-profile incidents, numerous myths about the nature of workplace aggression have emerged. In this review, we examine these myths from an evidence-based perspective, bringing greater clarity to our understanding of the predictors of workplace aggression. We conclude by pointing to the need for more research focusing on construct validity and prevention issues as well as for methodologies that minimize the likelihood of mono-method bias and that strengthen the ability to make causal inferences. PMID:18793089

  10. Workplace bullying: the effectiveness of a workplace program.

    PubMed

    Stagg, Sharon J; Sheridan, Daniel J; Jones, Ruth A; Speroni, Karen Gabel

    2013-08-01

    Workplace bullying can not only cost thousands of dollars to replace an affected nurse, but also have detrimental economic effects on health care organizations. Occupational health nurses can provide leadership in preventing or eliminating workplace bullying. This pilot study determined that attendance at a cognitive rehearsal program decreased workplace bullying. The study used an Internet-based survey administered 6 months after nurses completed the 2-hour cognitive rehearsal program. Half of the nurses reported witnessing bullying behaviors since attending the program; 70% of the nurses reported changing their own behaviors following the course; and 40% of the nurses reported a decrease in bullying behaviors during the past 6 months. Although 70% of the nurses believed they could intervene in bullying situations, only 16% reported they responded to bullying at the time of occurrence. This study illuminates the need to continue searching for other effective methods to prevent and manage workplace bullying. PMID:23875566

  11. Workplace bullying in nursing.

    PubMed

    Ovayolu, Ozlem; Ovayolu, Nimet; Karadag, Gulendam

    2014-09-01

    This research was designed to determine whether nurses are bullied by other staff members and the effects of such behaviors on the nurse victims. This study reports on nurses' interpersonal workplace relationships in a culturally unique environment. The study was conducted with 260 nurses working in three public hospitals. Data were collected using a questionnaire. The majority of nurses were female with bachelor's degrees and reported being assigned duties outside their usual responsibilities, held responsible for coworkers' mistakes, and criticized for job performance although they thought they had done their work properly. Most of the nurses who were bullied experienced health and sleep problems,did not want to go to work, and had communication problems with other staff members. Nearly all of the study nurses received psychological support to solve their problems and believed that the best way to prevent bullying was education. PMID:25102477

  12. Underreporting of Workplace Violence

    PubMed Central

    Arnetz, Judith E.; Hamblin, Lydia; Ager, Joel; Luborsky, Mark; Upfal, Mark J.; Russell, Jim; Essenmacher, Lynnette

    2016-01-01

    This study examined differences between self-report and actual documentation of workplace violence (WPV) incidents in a cohort of health care workers. The study was conducted in an American hospital system with a central electronic database for reporting WPV events. In 2013, employees (n = 2010) were surveyed by mail about their experience of WPV in the previous year. Survey responses were compared with actual events entered into the electronic system. Of questionnaire respondents who self-reported a violent event in the past year, 88% had not documented an incident in the electronic system. However, more than 45% had reported violence informally, for example, to their supervisors. The researchers found that if employees were injured or lost time from work, they were more likely to formally report a violent event. Understanding the magnitude of underreporting and characteristics of health care workers who are less likely to report may assist hospitals in determining where to focus violence education and prevention efforts. PMID:26002854

  13. Evaluating alcoholics anonymous sponsor attributes using conjoint analysis.

    PubMed

    Stevens, Edward B; Jason, Leonard A

    2015-12-01

    Alcoholics Anonymous (AA) considers sponsorship an important element of the AA program, especially in early recovery. 225 adult individuals who had experience as either a sponsor, sponsee, or both, participated in a hypothetical sponsor ranking exercise where five attributes were varied across three levels. Conjoint analysis was used to compute part-worth utility of the attributes and their levels for experience, knowledge, availability, confidentiality, and goal-setting. Differences in utilities by attribute were found where confidentiality had the greatest overall possible impact on utility and sponsor knowledge had the least. These findings suggest qualitative differences in sponsors may impact their effectiveness. Future research on AA should continue to investigate sponsor influence on an individual's overall recovery trajectory. PMID:26186375

  14. Shared ideology in Alcoholics Anonymous: a grounded theory approach.

    PubMed

    Wright, K B

    1997-01-01

    This article uses grounded theory to explore the shared ideology espoused in Alcoholics Anonymous, specifically the nature and role of shared ideology in increasing the efficacy of the recovery process, and the features of the group's tenets and meetings that help facilitate members' indoctrination. Findings support Kassel and Wagner's (1993) contention of shared ideology's major role in the change process of the group, and Antze's (1976) categorizations of the AA ideology and alcoholics' characteristics. Antze's (1979) finding that AA ideology removes the concept of drinking from the voluntary sphere was also supported. The group was found to be a context in which members could change their assumptive worlds through reinterpreting life events, as Frank and Frank (1991) contended. Little support was found for Alexander and Rollins's (1984) comparison of AA to religious cults. The findings underscore the importance of human interaction as persuasion and reinforcement for AA ideology. PMID:10977242

  15. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  16. Watermarking medical images with anonymous patient identification to verify authenticity.

    PubMed

    Coatrieux, Gouenou; Quantin, Catherine; Montagner, Julien; Fassa, Maniane; Allaert, François-André; Roux, Christian

    2008-01-01

    When dealing with medical image management, there is a need to ensure information authenticity and dependability. Being able to verify the information belongs to the correct patient and is issued from the right source is a major concern. Verification can help to reduce the risk of errors when identifying documents in daily practice or when sending a patient's Electronic Health Record. At the same time, patient privacy issues may appear during the verification process when the verifier accesses patient data without appropriate authorization. In this paper we discuss the combination of watermarking with different identifiers ranging from DICOM standard UID to an Anonymous European Patient Identifier in order to improve medical image protection in terms of authenticity and maintainability. PMID:18487808

  17. Father-daughter incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Beard, Keith W; Kuo, Shih-Ya; Swindell, Samuel V S; Kommor, Martin J

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were more likely than controls to endorse feeling damaged, psychologically injured, estranged from one or both parents, and shamed by others when they tried to open up about their experience. They had been eroticized early on by the incest experience, and it interfered with their adult sexuality. Incest victims experienced coitus earlier than controls and after reaching age 18 had more sex partners and were more likely to have casual sex outside their primary relationship and engage in sex for money than controls. They also had worse scores on scales measuring depression, sexual satisfaction, and communication about sex than controls. PMID:22452300

  18. Participant Anonymity in the Internet Age: From Theory to Practice

    PubMed Central

    Saunders, Benjamin; Kitzinger, Jenny; Kitzinger, Celia

    2015-01-01

    Qualitative researchers attempting to protect the identities of their research participants now face a multitude of new challenges due to the wealth of information once considered private but now readily accessible online. We will draw on our research with family members of people with severe brain injury to discuss these challenges in relation to three areas: participant engagement with the mass media, the availability of court transcripts online, and participants’ use of social media. We suggest strategies for managing these challenges via disguise, refining informed consent, and discussion with interviewees. In the context of a largely theoretical literature on anonymization, this article offers concrete examples of the dilemmas we faced and will be of illustrative use to other researchers confronting similar challenges. PMID:25866484

  19. Using Adult Education Principles for HIV/AIDS Awareness Intervention Strategies in Botswana

    ERIC Educational Resources Information Center

    Preece, Julia; Ntseane, Gabo

    2004-01-01

    This paper reports on a mainly qualitative study into company strategies for HIV/AIDS information, education and communication (IEC) strategies in the Botswana workplace. The authors argue that HIV/AIDS awareness and prevention strategies in Botswana need a new approach. The research proposal hypothesized that IEC strategies need to take account…

  20. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    PubMed Central

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  1. AIDS Education for the Workplace.

    ERIC Educational Resources Information Center

    Mello, Jeffrey A.

    1990-01-01

    Sun Life in Wellesley, Massachusetts, has an ongoing education program about acquired immune deficiency syndrome (AIDS) that provides employees with facts and works to change attitudes about the implications of AIDS for the workplace. (SK)

  2. LGBT Workplace Climate in Astronomy

    NASA Astrophysics Data System (ADS)

    Gaudi, B. S.; Danner, R.; Dixon, W. V.; Henderson, C. B.; Kay, L. E.

    2013-01-01

    The AAS Working Group on LGBTIQ Equality (WGLE) held a town hall meeting at the 220th AAS meeting in Anchorage to explore the workplace climate for LGBTIQ individuals working in Astronomy and related fields. Topics of discussion included anti-discrimination practices, general workplace climate, and pay and benefit policies. Four employment sectors were represented: industry, the federal government, private colleges, and public universities. We will summarize and expand on the town hall discussions and findings of the panel members.

  3. Stress within the academic workplace.

    PubMed

    Kenner, Carole A; Pressler, Jana L

    2014-01-01

    Many new nursing leaders assuming deanships, assistant deanships, or interim deanships have limited education, experience, or background to prepare them to deal with workplace stress. To assist new deans and those aspiring to be deans, the authors of this department offer survival tips based on their personal experiences and insights. They address common issues such as time management, handling workplace bullying, and negotiating deadlines and assignments. The authors welcome counterpoint discussions with readers. PMID:24743171

  4. Visual ergonomics in the workplace.

    PubMed

    Anshel, Jeffrey R

    2007-10-01

    This article provides information about visual function and its role in workplace productivity. By understanding the connection among comfort, health, and productivity and knowing the many options for effective ergonomic workplace lighting, the occupational health nurse can be sensitive to potential visual stress that can affect all areas of performance. Computer vision syndrome-the eye and vision problems associated with near work experienced during or related to computer use-is defined and solutions to it are discussed. PMID:17969539

  5. Women and HIV

    MedlinePlus

    ... Consumer Information by Audience For Women Women and HIV Share Tweet Linkedin Pin it More sharing options ... HIV? What should pregnant women know about HIV? HIV Quick Facts What is HIV? HIV is the ...

  6. Targeting HIV services to male migrant workers in southern Africa would not reverse generalized HIV epidemics in their home communities: a mathematical modeling analysis

    PubMed Central

    Klein, Daniel J.; Eckhoff, Philip A.; Bershteyn, Anna

    2015-01-01

    Background Migrant populations such as mine workers contributed to the spread of HIV in sub-Saharan Africa. We used a mathematical model to estimate the community-wide impact of targeting treatment and prevention to male migrants. Methods We augmented an individual-based network model, EMOD-HIV v0.8, to include an age-dependent propensity for males to migrate. Migrants were exposed to HIV outside their home community, but continued to participate in HIV transmission in the community during periodic visits. Results Migrant-targeted interventions would have been transformative in the 1980s to 1990s, but post-2015 impacts were more modest. When targetable migrants comprised 2% of adult males, workplace HIV prevention averted 3.5% of community-wide infections over 20 years. Targeted treatment averted 8.5% of all-cause deaths among migrants. When migrants comprised 10% of males, workplace prevention averted 16.2% of infections in the community, one-quarter of which were among migrants. Workplace prevention and treatment acted synergistically, averting 17.1% of community infections and 11.6% of deaths among migrants. These estimates do not include prevention of secondary spread of HIV or tuberculosis at the workplace. Conclusions Though cost-effective, targeting migrants cannot collapse generalized epidemics in their home communities. Such a strategy would only have been possible prior to the early 1990s. However, migrant-targeted interventions synergize with general-population expansion of HIV services. PMID:25733560

  7. HIV-Related Risk Behaviors, Perceptions of Risk, HIV Testing, and Exposure to Prevention Messages and Methods among Urban American Indians and Alaska Natives

    ERIC Educational Resources Information Center

    Lapidus, Jodi A.; Bertolli, Jeanne; McGowan, Karen; Sullivan, Patrick

    2006-01-01

    The goal of this study was to describe HIV risk behaviors, perceptions, testing, and prevention exposure among urban American Indians and Alaska Natives (AI/AN). Interviewers administered a questionnaire to participants recruited through anonymous peer-referral sampling. Chi-square tests and multiple logistic regression were used to compare HIV…

  8. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    ERIC Educational Resources Information Center

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  9. Toward Analysis of the Relations Among the Youth Counterculture, Telephone Hotlines, and Anonymity

    ERIC Educational Resources Information Center

    Baizerman, Michael

    1974-01-01

    During the 1960's, there emerged innovative human service programs for youth. Among the actual differences in these programs compared to their older, established human service agencies was (is) the prominent position of the social value of client anonymity. This anonymity is examined in an attempt to understand its role. (RC)

  10. Comparison of Anonymous versus Confidential Survey Procedures: Effects on Health Indicators in Dutch Adolescents

    ERIC Educational Resources Information Center

    van de Looij-Jansen, Petra M.; Goldschmeding, Judith E. J.; de Wilde, Erik Jan

    2006-01-01

    Self-report questionnaires are frequently used in youth research, but doubt remains whether total anonymity affects the results. This study compared the responses of 704 mainly 16-17-year-old adolescents to self-report measures of various health indicators in 2 groups: anonymous and confidential collection. For most health indicators no…