Sample records for narcotics anonymous na

  1. A review of Alcoholics Anonymous/ Narcotics Anonymous programs for teens.

    PubMed

    Sussman, Steve

    2010-03-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/ NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed.

  2. How safe are adolescents at Alcoholics Anonymous and Narcotics Anonymous meetings? A prospective investigation with outpatient youth.

    PubMed

    Kelly, John F; Dow, Sarah J; Yeterian, Julie D; Myers, Mark

    2011-06-01

    Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) have proven to be cost-effective recovery resources for adults and also appear helpful for youth. However, anecdotal concerns about adolescents' safety at meetings have dampened enthusiasm regarding youth participation. Unfortunately, little information exists to evaluate such concerns. Outpatients (N = 127; 24% female) were assessed at intake and at 3, 6, and 12 months regarding perceived safety at AA/NA, experience of negative incidents, and reasons for nonattendance/discontinuation. By 12-month follow-up, 57.5% reported some AA/NA attendance with a combined lifetime exposure of 5,340 meetings. Of these, 21.9% reported at least one negative experience, which was more common among NA than AA attendees. Overall, youth reported feeling very safe at meetings, and ratings did not differ by age or gender. Reasons for discontinuation or nonattendance were unrelated to safety or negative incidents. Weighing risks against documented benefits, these preliminary findings suggest that referral to AA/NA should not be discouraged, but, similar to adults, youth experiences at meetings should be monitored. Copyright © 2011 Elsevier Inc. All rights reserved.

  3. Abstinence from drugs of abuse in community-based members of Narcotics Anonymous.

    PubMed

    Galanter, Marc; Dermatis, Helen; Post, Stephen; Santucci, Courtney

    2013-03-01

    Narcotics Anonymous (NA) is an abstinence-based fellowship with more than 58,000 groups worldwide. There has, however, been little research reported on its members. This study was designed to clarify the nature of the participants in NA who are primarily abstinent, long-term members. A protocol was implemented to survey members at 10 NA group meetings in three different states, through the cooperation of the NA World Service Office. A 51-item self-administered questionnaire, addressing key aspects of substance use and recovery, was anonymously completed by 396 respondents. Respondents were 71.5% male; the mean age was 38.1 years; 68.2% were White; and the principal drug problems comprised cocaine (28.5%), heroin (27.5%), other opiates (13.4%), methamphetamine (12.9%), alcohol (8.6%), marijuana (6.6%), and other stimulants (2.5%). Eighty-seven percent had prior treatment for a substance use disorder. On average respondents had first encountered NA at age 26.9, they had been abstinent an average of 5.7 years at the time they filled out the questionnaire, and 47.5% had served as sponsors. Ninety-four percent designated themselves as spiritual, and only 29.6% designated themselves as religious. NA offers support for long-term abstinence from diverse misuse of drugs among users of different backgrounds.

  4. Spirituality-based recovery from drug addiction in the twelve-step fellowship of narcotics anonymous.

    PubMed

    Galanter, Marc; Dermatis, Helen; Post, Stephen; Sampson, Cristal

    2013-01-01

    Narcotics Anonymous is a worldwide fellowship that employs the Twelve-Step model for members dependent on drugs of abuse. The spiritual orientation of its program of abstinence has not been subjected to empirical study. Responses of 527 American Narcotics Anonymous meeting attendees to a structured questionnaire were evaluated for the roles of cognitive and psychosocial aspects of spirituality in their recovery. Respondents had last used drugs or alcohol on average 6.1 years previously. They were found to be more oriented toward a spiritual than a formally religious orientation than probability samples of the general population. Aspects of membership such as affiliation toward other members and the experience of spiritual awakening were associated with lower rates of drug or alcohol craving, whereas scores on depression were associated with higher craving scores. Spiritual renewal combined with an abstinence-oriented regimen in Narcotics Anonymous social context can play a role in long-term recovery from drug addiction.

  5. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis.

    PubMed

    Kelly, John F; Greene, M Claire; Bergman, Brandon G

    2014-11-01

    Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for 'primary drug' patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. © The Author 2014. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  6. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis

    PubMed Central

    Kelly, John F.; Greene, M. Claire; Bergman, Brandon G.

    2014-01-01

    Aims: Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Method: Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for ‘primary drug’ patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). Results: The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Conclusion: Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. PMID:25294352

  7. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    PubMed

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  8. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS

    PubMed Central

    Orwat, John; Samet, Jeffrey H.; Tompkins, Christopher P.; Cheng, Debbie M.; Dentato, Michael P.; Saitz, Richard

    2013-01-01

    Background Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. Objective This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Methods Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. Results At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past six months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Conclusions Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. PMID:20832197

  9. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    ERIC Educational Resources Information Center

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  10. Personality Patterns in Narcotics Anonymous Members versus Individuals with Addiction Receiving Methadone Maintenance Therapy.

    PubMed

    Akhondzadeh, Shahin; Shabrang, Moslem; Rezaei, Omid; Rezaei, Farzin

    2014-07-01

    Therapeutic interventions can be classified into two distinct approaches: abstinent and maintenance method. Currently, there are no clear criteria for referring addicted patients to one of these modalities. We aimed to compare the personality characteristics of individuals with addiction who attended narcotics anonymous sessions with those who received methadone maintenance therapy. This was a cross- sectional study. The participants were NA members and patients who were undergoing methadone maintenance treatment in outpatient clinics. Using the randomized cluster sampling method, 200 individuals with opioid dependence were selected (each group 100 persons). Data were collected through a demographic questionnaire and the five-factor personality inventory (NEO-FFI). Comparison of the mean scores of NEO-PPI in the two groups was performed by independent t test, and qualitative variables were compared using the Chi-square test. We found a significant difference between the MMT and NA groups with respect to neuroticism, extroversion, and agreeableness. No significant difference was found in the subscales of conscientious and openness. People who regularly attended the NA sessions had lower neuroticism and higher agreeableness than patients who were under the maintenance modality. Whether this is the cause or effect of attending NA sessions requires future large-scale cohort studies.

  11. Understanding the Role of Storytelling in the Transformation of Female Cocaine Addicts in Narcotics Anonymous

    ERIC Educational Resources Information Center

    Ventresca, Melissa Weida

    2012-01-01

    The purpose of this qualitative study was to understand the role of storytelling in the transformation of female cocaine addicts in Narcotics Anonymous. For this research the primary investigator utilized a theoretical orientation of transformative learning theory and storytelling. The rationale for employing transformative learning theory is that…

  12. Comparing Acceptance and Commitment Group Therapy and 12-Steps Narcotics Anonymous in Addict's Rehabilitation Process: A Randomized Controlled Trial.

    PubMed

    Azkhosh, Manoochehr; Farhoudianm, Ali; Saadati, Hemn; Shoaee, Fateme; Lashani, Leila

    2016-10-01

    Objective: Substance abuse is a socio-psychological disorder. The aim of this study was to compare the effectiveness of acceptance and commitment therapy with 12-steps Narcotics Anonymous on psychological well-being of opiate dependent individuals in addiction treatment centers in Shiraz, Iran. Method: This was a randomized controlled trial. Data were collected at entry into the study and at post-test and follow-up visits. The participants were selected from opiate addicted individuals who referred to addiction treatment centers in Shiraz. Sixty individuals were evaluated according to inclusion/ exclusion criteria and were divided into three equal groups randomly (20 participants per group). One group received acceptance and commitment group therapy (Twelve 90-minute sessions) and the other group was provided with the 12-steps Narcotics Anonymous program and the control group received the usual methadone maintenance treatment. During the treatment process, seven participants dropped out. Data were collected using the psychological well-being questionnaire and AAQ questionnaire in the three groups at pre-test, post-test and follow-up visits. Data were analyzed using repeated measure analysis of variance. Results: Repeated measure analysis of variance revealed that the mean difference between the three groups was significant (P<0.05) and that acceptance and commitment therapy group showed improvement relative to the NA and control groups on psychological well-being and psychological flexibility. Conclusion : The results of this study revealed that acceptance and commitment therapy can be helpful in enhancing positive emotions and increasing psychological well-being of addicts who seek treatment.

  13. The Impact of Alcoholics Anonymous on other substance abuse related Twelve Step programs

    PubMed Central

    Laudet, Alexandre B.

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the 12-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery 12-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug dependent populations, many of whom are cross-addicted to alcohol. Future directions in 12-step research are noted in closing. PMID:19115764

  14. 31 CFR 598.310 - Narcotics trafficking.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Narcotics trafficking. 598.310... General Definitions § 598.310 Narcotics trafficking. The term narcotics trafficking means any illicit activity to cultivate, produce, manufacture, distribute, sell, finance, or transport narcotic drugs...

  15. 31 CFR 536.311 - Narcotics trafficking.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Narcotics trafficking. 536.311... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY NARCOTICS TRAFFICKING SANCTIONS REGULATIONS General Definitions § 536.311 Narcotics trafficking. The term narcotics trafficking means any activity...

  16. 31 CFR 536.311 - Narcotics trafficking.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Narcotics trafficking. 536.311 Section... FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY NARCOTICS TRAFFICKING SANCTIONS REGULATIONS General Definitions § 536.311 Narcotics trafficking. The term narcotics trafficking means any activity undertaken...

  17. 31 CFR 598.310 - Narcotics trafficking.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Narcotics trafficking. 598.310 Section... Definitions § 598.310 Narcotics trafficking. The term narcotics trafficking means any illicit activity to cultivate, produce, manufacture, distribute, sell, finance, or transport narcotic drugs, controlled...

  18. Narcotic antagonists. Treatment tool for addiction.

    PubMed

    Valentine, N M; Meyer, R E

    1976-09-01

    Narcotic antagonists have recently gained attention through research aimed at evaluating both biochemical effects and treatment potential for opiate addiction. Narcotic antagonists are a classification of drugs which block the euphoric (and all other) effects of opiates. Naltrexone is the most promising narcotic antagonist based on ability to produce blockade, length of duration, and relative absence of side effects. The narcotic antagonists offer an adjunctive or alternative method of treatment for opiate addicts based on Wikler's biobehavioral theory of conditioned abstinence. Narcotic antagonists are presently being investigated at seven research centers throughout the United States and may be available for clinical use in the future.

  19. Intravenous Narcotic Antagonists in Ambulatory Oral Surgery

    PubMed Central

    Greenfield, William; Granada, Margarito G.

    1975-01-01

    Results of a study indicate that significant respiratory depression can be produced by the intravenous administration of narcotics in the anesthetic management of oral surgery patients. Naloxone hydrochloride reversed this reaction in all instances. Naloxone is a unique narcotic antagonist in that it does not possess agonistic properties of its own, it is effective in reversing respiratory depression resulting from all commonly used narcotics and narcotic antagonists, it causes no undesirable side effects, and it acts as a placebo when administered to a patient who has not had a narcotic. The use of naloxone should be considered when a potent narcotic is administered to an ambulatory patient. PMID:19598479

  20. 31 CFR 598.310 - Narcotics trafficking.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Narcotics trafficking. 598.310 Section 598.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 598.310 Narcotics trafficking. The term narcotics trafficking means any illicit activity to...

  1. 31 CFR 598.310 - Narcotics trafficking.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Narcotics trafficking. 598.310 Section 598.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 598.310 Narcotics trafficking. The term narcotics trafficking means any illicit activity to...

  2. 31 CFR 598.310 - Narcotics trafficking.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Narcotics trafficking. 598.310 Section 598.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 598.310 Narcotics trafficking. The term narcotics trafficking means any illicit activity to...

  3. How do emergency physicians interpret prescription narcotic history when assessing patients presenting to the emergency department with pain?

    PubMed

    Grover, Casey A; Garmel, Gus M

    2012-01-01

    Narcotics are frequently prescribed in the Emergency Department (ED) and are increasingly abused. Prescription monitoring programs affect prescribing by Emergency Physicians (EPs), yet little is known on how EPs interpret prescription records. To assess how EPs interpret prescription narcotic history for patients in the ED with painful conditions. DESIGN/MAIN Outcome Measures: We created an anonymous survey of EPs consisting of fictitious cases of patients presenting to the ED with back pain. For each case, we provided a prescription history that varied in the number of narcotic prescriptions, prescribing physicians, and narcotic potency. Respondents rated how likely they thought each patient was drug seeking, and how likely they thought that the prescription history would change their prescribing behavior. We calculated κ values to evaluate interobserver reliability of physician assessment of drug-seeking behavior. We collected 59 responses (response rate = 70%). Respondents most suspected drug seeking in patients with greater than 6 prescriptions per month or greater than 6 prescribing physicians in 2 months. Medication potency did not affect physician interpretation of drug seeking. Respondents reported that access to a prescription history would change their prescribing practice in all cases. κ values for assessment of drug seeking demonstrated moderate agreement. A greater number of prescriptions and a greater number of prescribing physicians in the prescription record increased suspicion for drug seeking. EPs believed that access to prescription history would change their prescribing behavior, yet interobserver reliability in the assessment of drug seeking was moderate.

  4. [Provision System of Medical Narcotics].

    PubMed

    Kushida, Kazuki; Toshima, Chiaki; Fujimaki, Yoko; Watanabe, Mutsuko; Hirohara, Masayoshi

    2015-12-01

    Patients with cancer are increasingly opting for home health care, resulting in a rapid increase in the number of prescriptions for narcotics aimed at pain control. As these narcotics are issued by pharmacies only upon presentation of valid prescriptions, the quantity stored in the pharmacies is of importance. Although many pharmaceutical outlets are certified for retail sale of narcotic drugs, the available stock is often extremely limited in variety and quantity. Affiliated stores of wholesale(or central wholesale)dealers do not always have the necessary certifications to provide medical narcotics. Invariably, the quantity stored by individual branches or sales offices is also limited. Hence, it may prove difficult to urgently secure the necessary and appropriate drugs according to prescription in certain areas of the community. This report discusses the problems faced by wholesalers and pharmacies during acquisition, storage, supply, and issue of prescription opioids from a stockpiling perspective.

  5. Narcotic Use and Postoperative Doctor Shopping in the Orthopaedic Trauma Population.

    PubMed

    Morris, Brent J; Zumsteg, Justin W; Archer, Kristin R; Cash, Brian; Mir, Hassan R

    2014-08-06

    The negative consequences of narcotic use and diversion for nonmedical use are on the rise. A growing number of narcotic abusers obtain narcotic prescriptions from multiple providers ("doctor shopping"). This study sought to determine the effects of multiple postoperative narcotic providers on the number of narcotic prescriptions, duration of narcotics, and morphine equivalent dose per day in the orthopaedic trauma population. Our prospective cohort study used the state-controlled substance monitoring database to identify all narcotic prescriptions filled three months prior to admission and six months following discharge for enrolled patients. Patients were assigned into two groups: a single narcotic provider group with prescriptions only from the treating surgeon (or extenders) or a multiple narcotic provider group with prescriptions from both the treating surgeon and an additional provider or providers. Complete data were available for 130 of 151 eligible patients. Preoperative narcotic use, defined by three or more narcotic prescriptions within three months of admission, was noted in 8.5% of patients. Overall, 20.8% of patients sought multiple narcotic providers postoperatively. There were significant increases in postoperative narcotic prescriptions (p < 0.001) between the single narcotic provider group (two prescriptions) and the multiple narcotic provider group (seven prescriptions), in duration of postoperative narcotic use (p < 0.001) between the single narcotic provider group (twenty-eight days) and the multiple narcotic provider group (110 days), and in morphine equivalent dose per day (p = 0.002) between the single narcotic provider group (26 mg) and the multiple narcotic provider group (43 mg). Patients with a high school education or less were 3.2 times more likely to seek multiple providers (p = 0.02), and patients with a history of preoperative narcotic use were 4.5 times more likely to seek multiple providers (p < 0.001). There is a 20.8% prevalence

  6. 44 CFR 15.9 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... beverages, narcotic drugs, hallucinogens, marijuana, barbiturates or amphetamines as defined in Title 21 of... property being under the influence of or using or possessing any narcotic drug, marijuana, hallucinogen... influence of alcoholic beverages; (d) Bringing alcoholic beverages, narcotic drugs, hallucinogens, marijuana...

  7. 44 CFR 15.9 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... beverages, narcotic drugs, hallucinogens, marijuana, barbiturates or amphetamines as defined in Title 21 of... property being under the influence of or using or possessing any narcotic drug, marijuana, hallucinogen... influence of alcoholic beverages; (d) Bringing alcoholic beverages, narcotic drugs, hallucinogens, marijuana...

  8. 44 CFR 15.9 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... beverages, narcotic drugs, hallucinogens, marijuana, barbiturates or amphetamines as defined in Title 21 of... property being under the influence of or using or possessing any narcotic drug, marijuana, hallucinogen... influence of alcoholic beverages; (d) Bringing alcoholic beverages, narcotic drugs, hallucinogens, marijuana...

  9. 44 CFR 15.9 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... beverages, narcotic drugs, hallucinogens, marijuana, barbiturates or amphetamines as defined in Title 21 of... property being under the influence of or using or possessing any narcotic drug, marijuana, hallucinogen... influence of alcoholic beverages; (d) Bringing alcoholic beverages, narcotic drugs, hallucinogens, marijuana...

  10. 44 CFR 15.9 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... beverages, narcotic drugs, hallucinogens, marijuana, barbiturates or amphetamines as defined in Title 21 of... property being under the influence of or using or possessing any narcotic drug, marijuana, hallucinogen... influence of alcoholic beverages; (d) Bringing alcoholic beverages, narcotic drugs, hallucinogens, marijuana...

  11. Narcotic Drug and Marihuana Controls.

    ERIC Educational Resources Information Center

    Miller, Donald E.

    As a background paper for the National Association of Student Personnel Administrators Drug Education Conference held in November, 1966, this paper focuses first on narcotic control in general, and second, on the reasons for insisting on marijuana control. Brief descriptions are given of the currently existing narcotics acts at federal and state…

  12. 15 CFR 265.37 - Narcotics and other drugs.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Narcotics and other drugs. 265.37... other drugs. The possession, sale, consumption, or use on the site of narcotic or other drugs illegal... with respect to the possession, sale, consumption, or use of narcotic or other drugs. ...

  13. 15 CFR 265.37 - Narcotics and other drugs.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Narcotics and other drugs. 265.37... other drugs. The possession, sale, consumption, or use on the site of narcotic or other drugs illegal... with respect to the possession, sale, consumption, or use of narcotic or other drugs. ...

  14. 15 CFR 265.37 - Narcotics and other drugs.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Narcotics and other drugs. 265.37... other drugs. The possession, sale, consumption, or use on the site of narcotic or other drugs illegal... with respect to the possession, sale, consumption, or use of narcotic or other drugs. ...

  15. 15 CFR 265.37 - Narcotics and other drugs.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Narcotics and other drugs. 265.37... other drugs. The possession, sale, consumption, or use on the site of narcotic or other drugs illegal... with respect to the possession, sale, consumption, or use of narcotic or other drugs. ...

  16. Narcotic Use for Inflammatory Bowel Disease and Risk Factors During Hospitalization

    PubMed Central

    Long, Millie D.; Barnes, Edward L.; Herfarth, Hans H.; Drossman, Douglas A.

    2012-01-01

    Background and Aims Growing evidence demonstrates adverse effects of narcotics in inflammatory bowel disease (IBD). We sought to study the relationship between narcotic use, objective measures of disease activity and other associated factors in hospitalized patients with IBD. Methods We performed a retrospective cohort study of all adult IBD patients admitted to a general medical or surgical ward service at a United States tertiary care center over a 1 year period. We collected demographic and disease specific information, inpatient narcotic use and disease activity measurements from endoscopic and radiologic reports. Bivariate comparisons were made between characteristics and narcotic use. Logistic regression was used to evaluate the independent effects of characteristics on narcotic use. Results A total of 117 IBD patients were included. Narcotics were given to 70.1% of hospitalized patients. Factors significantly associated with any inpatient narcotic use: Crohn’s disease (CD); p=<0.01, duration of IBD, p=0.02, prior psychiatric diagnosis, p=0.02, outpatient narcotic use, p=<0.01, current smoking, p=<0.01, prior IBD-specific surgery, p<0.02, and prior IBD-IBS diagnosis, p=0.02. Narcotic use was not significantly associated with disease severity on computed tomography (CT) scan or endoscopy. On multivariate analysis, smoking (OR 4.34, 95% CI 1.21–15.6) and prior outpatient narcotic use (OR 5.41, 95% CI 1.54–19.0) were independently associated with inpatient narcotic use. Conclusions A majority of patients with IBD are prescribed narcotics during hospitalization in spite of data on increased complications. Risk factors for narcotic use include CD and associated factors (disease duration, surgeries), substance abuse (outpatient narcotics and smoking), psychiatric diagnoses and IBD-IBS. PMID:21739533

  17. Female and male life stories published in the Finnish Alcoholics Anonymous journal.

    PubMed

    Aaltonen, I; Mäkelä, K

    1994-03-01

    To study differences in how women and men describe their drinking problems, key expressions were recorded in 50 female and 50 male stories published in the Finnish A.A. (Alcoholics Anonymous) journal. Men show more interest in the past and try to understand their lives in causal terms. Women focus on the present and on experiences in A.A. Men more frequently mention narcotics and alcohol substitutes; medical drugs are more common in female stories. Men's stories more frequently contain social deviance. Women pay more attention to social relationships. The phrase Higher Power is used with equal frequency, but women more commonly use the word God. Women express more positive emotions. Registers of negative emotions differ. The drinking man is threatened by feelings of inferiority; the drinking woman by shame and guilt.

  18. Pain medications - narcotics

    MedlinePlus

    ... other medical problems does not itself lead to dependence. Store narcotics safely and securely in your home. ... help with constipation, drink more fluids, get more exercise, eat foods with extra fiber, and use stool ...

  19. Narcotic Independence After Pancreatic Duct Stenting Predicts Narcotic Independence After Lateral Pancreaticojejunostomy for Chronic Pancreatitis.

    PubMed

    Kwon, Richard S; Young, Benjamin E; Marsteller, William F; Lawrence, Christopher; Wu, Bechien U; Lee, Linda S; Mullady, Daniel; Klibansky, David A; Gardner, Timothy B; Simeone, Diane M

    2016-09-01

    This study aimed to determine if the improved pain response to endoscopic retrograde cholangiopancreatogrphy (ERCP) and pancreatic stent placement (EPS) predicts pain response in patients with chronic pancreatitis after modified lateral pancreaticojejunostomy (LPJ). A multi-institutional, retrospective review of patients who underwent successful EPS before LPJ between 2001 and 2010 was performed. The primary outcome was narcotic independence (NI) within 2 months after ERCP or LPJ. A total of 31 narcotic-dependent patients with chronic pancreatitis underwent successful EPS before LPJ. Ten (32%) achieved post-LPJ NI (median follow-up, 8.5 months; interquartile range [IQR], 2-38 months). Eight (80%) of 10 patients with NI post-ERCP achieved NI post-LPJ. Two (10%) without NI post-ERCP achieved NI post-LPJ. Narcotic independence post-EPS was associated strongly with NI post-LPJ with an odds ratio of 38 (P = 0.0025) and predicted post-LPJ NI with a sensitivity, specificity, positive predictive value, and negative predictive value of 80%, 90.5%, 80%, and 90.5%, respectively. Narcotic independence after EPS is associated with NI after LPJ. Failure to achieve NI post-ERCP predicts failure to achieve NI post-LPJ. These results support the need for larger studies to confirm the predictive value of pancreatic duct stenting for better selection of chronic pancreatitis patients who will benefit from LPJ.

  20. Factors Associated With Narcotic Use After Clavicle Fractures.

    PubMed

    Weinberg, Douglas S; Napora, Joshua K; West, William H; Grimberg, Dominic C; Vallier, Heather A

    2016-09-01

    Clavicle fractures are common in adults. Recent studies have shown that operative treatment of clavicle fractures has benefits in many situations. However, there is controversy about the indications. Data on social outcomes are limited. A total of 434 patients with 436 clavicle fractures treated both operatively and nonoperatively at a level 1 trauma center were identified. Narcotic use was recorded 2, 4, 6, 8, 10, 12, 14, and 16 weeks after injury for both treatment groups. Other descriptive data included age, sex, laterality, hand dominance, rib fractures, smoking, alcohol use, employment, long bone or spine fracture, open clavicle fracture, and mechanism of injury. Logistic regression analysis was performed to determine the independent predictors of narcotic use after clavicle fracture. Open reduction and internal fixation was performed in 105 fractures (24%), and 329 fractures were managed nonoperatively. A total of 154 patients (35%) reported some narcotic use 2 weeks after injury, and 15% were still using narcotics 16 weeks after injury. Narcotic use decreased over time in patients treated with open reduction and internal fixation (10% vs 15% after nonoperative management). Patients treated with open reduction and internal fixation reported reduced narcotic use at 16 weeks (odds ratio [OR], 0.454; P=.070). Concurrent rib fracture (OR, 5.668; P<.001), smoking (OR, 3.095; P=.013), unemployment (OR, 5.429; P<.0005), and long bone or spine fracture (OR, 6.761; P<.001) were predictors of narcotic use. Further studies of the social, economic, and financial outcomes of clavicle fracture and osteosynthesis are warranted. [Orthopedics. 2016; 39(5):e917-e923.]. Copyright 2016, SLACK Incorporated.

  1. Narcotics detection using piezoelectric ringing

    NASA Astrophysics Data System (ADS)

    Rayner, Timothy J.; Magnuson, Erik E.; West, Rebecca; Lyndquist, R.

    1997-02-01

    Piezo-electric ringing (PER) has been demonstrated to be an effective means of scanning cargo for the presence of hidden narcotics. The PER signal is characteristic of certain types of crystallized material, such as cocaine hydrochloride. However, the PER signal cannot be used to conclusively identify all types of narcotic material, as the signal is not unique. For the purposes of cargo scanning, the PER technique is therefore most effective when used in combination with quadrupole resonance analysis (QRA). PER shares the same methodology as QRA technology, and can therefore be very easily and inexpensively integrated into existing QRA detectors. PER can be used as a pre-scanning technique before the QRA scan is applied and, because the PER scan is of a very short duration, can effectively offset some of the throughput limitations of standard QRA narcotics detectors. Following is a discussion of a PER detector developed by Quantum Manetics under contract to United States Customs. Design philosophy and performance are discussed, supported by results from recent tests conducted by the U.S. Drug Enforcement Agency and U.S. Customs.

  2. 31 CFR 598.313 - Significant foreign narcotics trafficker.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Significant foreign narcotics trafficker. 598.313 Section 598.313 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.313 Significant foreign narcotics trafficker. The term significant...

  3. 31 CFR 598.313 - Significant foreign narcotics trafficker.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Significant foreign narcotics trafficker. 598.313 Section 598.313 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.313 Significant foreign narcotics trafficker. The term significant...

  4. 31 CFR 598.313 - Significant foreign narcotics trafficker.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Significant foreign narcotics trafficker. 598.313 Section 598.313 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.313 Significant foreign narcotics trafficker. The term significant...

  5. 31 CFR 598.313 - Significant foreign narcotics trafficker.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Significant foreign narcotics trafficker. 598.313 Section 598.313 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.313 Significant foreign narcotics trafficker. The term significant...

  6. 31 CFR 598.313 - Significant foreign narcotics trafficker.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Significant foreign narcotics trafficker. 598.313 Section 598.313 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.313 Significant foreign narcotics trafficker. The term significant...

  7. 21 CFR 1304.31 - Reports from manufacturers importing narcotic raw material.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Reports from manufacturers importing narcotic raw... RECORDS AND REPORTS OF REGISTRANTS Reports § 1304.31 Reports from manufacturers importing narcotic raw material. (a) Every manufacturer which imports or manufactures from narcotic raw material (opium, poppy...

  8. 21 CFR 1304.31 - Reports from manufacturers importing narcotic raw material.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Reports from manufacturers importing narcotic raw... RECORDS AND REPORTS OF REGISTRANTS Reports § 1304.31 Reports from manufacturers importing narcotic raw material. (a) Every manufacturer which imports or manufactures from narcotic raw material (opium, poppy...

  9. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    NASA Astrophysics Data System (ADS)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  10. Quantum anonymous ranking

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Wen, Qiao-Yan; Liu, Bin; Su, Qi; Qin, Su-Juan; Gao, Fei

    2014-03-01

    Anonymous ranking is a kind of privacy-preserving ranking whereby each of the involved participants can correctly and anonymously get the rankings of his data. It can be utilized to solve many practical problems, such as anonymously ranking the students' exam scores. We investigate the issue of how quantum mechanics can be of use in maintaining the anonymity of the participants in multiparty ranking and present a series of quantum anonymous multiparty, multidata ranking protocols. In each of these protocols, a participant can get the correct rankings of his data and nobody else can match the identity to his data. Furthermore, the security of these protocols with respect to different kinds of attacks is proved.

  11. Anonymity in Voting Revisited

    NASA Astrophysics Data System (ADS)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  12. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  13. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  14. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  15. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  16. 32 CFR 700.1138 - Responsibilities concerning marijuana, narcotics, and other controlled substances.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Responsibilities concerning marijuana, narcotics... concerning marijuana, narcotics, and other controlled substances. (a) All personnel shall endeavor to prevent and eliminate the unauthorized use of marijuana, narcotics and other controlled substances within the...

  17. 31 CFR 598.304 - Foreign Narcotics Kingpin Designation Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Foreign Narcotics Kingpin Designation Act. 598.304 Section 598.304 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.304 Foreign Narcotics Kingpin Designation Act. The term Foreign...

  18. 31 CFR 598.304 - Foreign Narcotics Kingpin Designation Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Foreign Narcotics Kingpin Designation Act. 598.304 Section 598.304 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.304 Foreign Narcotics Kingpin Designation Act. The term Foreign...

  19. 31 CFR 598.304 - Foreign Narcotics Kingpin Designation Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Foreign Narcotics Kingpin Designation Act. 598.304 Section 598.304 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.304 Foreign Narcotics Kingpin Designation Act. The term Foreign...

  20. 31 CFR 598.304 - Foreign Narcotics Kingpin Designation Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Foreign Narcotics Kingpin Designation Act. 598.304 Section 598.304 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.304 Foreign Narcotics Kingpin Designation Act. The term Foreign...

  1. 31 CFR 598.304 - Foreign Narcotics Kingpin Designation Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Foreign Narcotics Kingpin Designation Act. 598.304 Section 598.304 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS General Definitions § 598.304 Foreign Narcotics Kingpin Designation Act. The term Foreign...

  2. 19 CFR 162.66 - Penalties for unlading narcotic drugs or marihuana without a permit.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Penalties for unlading narcotic drugs or marihuana... Substances, Narcotics, and Marihuana § 162.66 Penalties for unlading narcotic drugs or marihuana without a permit. In every case where a narcotic drug or marihuana is unladen without a permit, the penalties...

  3. 19 CFR 162.66 - Penalties for unlading narcotic drugs or marihuana without a permit.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Penalties for unlading narcotic drugs or marihuana... Substances, Narcotics, and Marihuana § 162.66 Penalties for unlading narcotic drugs or marihuana without a permit. In every case where a narcotic drug or marihuana is unladen without a permit, the penalties...

  4. 78 FR 9997 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... the President to impose sanctions against significant foreign narcotics traffickers and their... controlled by significant foreign narcotics traffickers as identified by the President. In addition, the..., Rio Grande, Zacatecas 98400, Mexico; Matamoros, Tamaulipas, Mexico; Rio Grande, Zacatecas, Mexico; DOB...

  5. Alcoholics Anonymous and other mutual help organizations: Impact of a 45-minute didactic for primary care and categorical internal medicine residents.

    PubMed

    Marcovitz, David; Cristello, Julie V; Kelly, John F

    2017-01-01

    Substance use disorders (SUDs) are highly prevalent among primary care patients. One evidence-based, cost-effective referral option is ubiquitous mutual help organizations (MHOs) such as Alcoholics Anonymous (AA), Narcotics Anonymous (NA), and SMART Recovery; however, little is known about how to effectively increase trainee knowledge and confidence with these referrals. The primary aim of this study was to evaluate whether a single 45-minute combined lecture and role play-based didactic for primary care residents could enhance knowledge, improve attitudes, and bolster confidence in referring patients with addictions to community MHOs. The authors developed a 45-minute lecture and role play addressing the evidence for MHOs, their respective background/content, and how to make effective referrals. Participants were administered a brief survey of their MHO-related knowledge, attitudes, and confidence before and after the session to evaluate the didactic impact. Participants were 55 primary care and categorical internal medicine residents divided among postgraduate year 1 (PGY1; 27.3%), PGY2 (38.2%), and PGY3 (34.5%). They had a mean age of 29 (SD = 2.62); 49% were female, 69% were Caucasian, and 78% reported some religious affiliation. Participants' subjective knowledge about MHOs increased significantly (P < .001), as did their confidence in making referrals (P < .001). Changes in participants' attitudes about the importance of MHOs in aiding successful addiction recovery approached significance (P = .058). The proportion of participants with correct responses to each of 4 knowledge-based questions increased substantially. Primary care and internal medicine residents reported variable baseline knowledge of MHOs and confidence in making referrals, both of which were improved in response to a 45-minute didactic. Role play may be a useful supplementary tool in enhancing residents' knowledge and skill in treating patients with SUD.

  6. The narcotic clinic in New Orleans, 1919-21.

    PubMed

    Tallaksen, Amund

    2017-09-01

    This paper traces the history of the narcotic clinic in New Orleans, Louisiana, comparing its merits to a similar clinic in Shreveport. How do the clinics compare, and why did the Shreveport clinic operate for longer than its New Orleans counterpart? Qualitative analysis of contemporary medical journals and newspapers, as well as archival materials from the Narcotic Division. In addition, the records of Louisiana Governor John M. Parker, the papers of Dr Willis P. Butler in Shreveport, as well as the records of the Orleans Parish Medical Society have been utilized. The narcotic clinic in Shreveport benefited from strong local support, while the New Orleans clinic faced a more vocal opposition. In addition, the Shreveport clinic offered a broad array of services and was a pillar of the community; the New Orleans clinic was newly established and offered fewer services. It was especially the influx of out-of-state addicts that angered many New Orleanians, many of whom witnessed the addicts lined up in the French Quarter. The effectiveness of the narcotic clinics in Louisiana (1919-23) was influenced by local opinion. The New Orleans clinic faced a tougher political climate than its counterpart in Shreveport, and therefore proved less resilient in the face of federal opposition. © 2017 Society for the Study of Addiction.

  7. 19 CFR 162.65 - Penalties for failure to manifest narcotic drugs or marihuana.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... or marihuana. 162.65 Section 162.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF... Substances, Narcotics, and Marihuana § 162.65 Penalties for failure to manifest narcotic drugs or marihuana. (a) Cargo or baggage containing unmanifested narcotic drugs or marihuana. When a package of regular...

  8. 19 CFR 162.65 - Penalties for failure to manifest narcotic drugs or marihuana.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... or marihuana. 162.65 Section 162.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF... Substances, Narcotics, and Marihuana § 162.65 Penalties for failure to manifest narcotic drugs or marihuana. (a) Cargo or baggage containing unmanifested narcotic drugs or marihuana. When a package of regular...

  9. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical. The terms narcotic drug, controlled substance, and listed chemical have the meanings given those terms...

  10. Protecting Privacy Using k-Anonymity

    PubMed Central

    El Emam, Khaled; Dankar, Fida Kamal

    2008-01-01

    Objective There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Design Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Measurement Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. Results For one of the re-identification scenarios, k-Anonymity consistently over-anonymizes data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions to the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. Conclusion Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity. PMID:18579830

  11. Less is more: limiting narcotic prescription quantities for common orthopedic procedures.

    PubMed

    O'Neill, Daniel Fulham; Webb Thomas, Christopher

    2014-11-01

    Clinicians are now appreciating that the perception of pain is a multifaceted, biopsychosocial construct. Expectation of postsurgical pain is part of this construct and should be considered preoperatively. It is our belief that by establishing reasonable expectations with preoperative teaching, we can minimize narcotic use and lessen untoward issues that can potentially follow. With this goal in mind, we have been using a comprehensive pre- and postoperative program for our outpatient orthopedic surgery patients for the last 5 years, which includes physical, pharmacologic, and simple sport psychological techniques. We reviewed postoperative prescription narcotic purchases in 133 consecutive surgical patients during the last year (2013). All patients were given a prescription postoperatively for 10 hydrocodone 5-mg/acetaminophen 500-mg tablets, with 1 refill. We then contacted the patients' pharmacies to assess the actual amount purchased. Data were available for 100 patients. Of these, 62 patients had undergone "simple" arthroscopies and 38 had had "open" procedures, including 25 anterior cruciate ligament reconstructions, 4 tibial tubercle osteotomies, and various other surgeries. Of the 62 arthroscopies, 24 patients (39%) refilled their prescriptions, with 4 patients (6%) needing > 1 refill. Of the 38 open procedures, 16 patients (42%) refilled their medications, 2 (5%), more than once. Thus, 89% of patients required ≤ 20 narcotic tablets after undergoing common orthopedic operations. No patient needed chronic narcotic medication. Pain is a complex issue and patient expectation of postoperative pain is one aspect that can potentially affect the amount of narcotics used. By preparing the patient both physically and psychologically, we believe the amount of narcotics used postoperatively can be decreased without affecting pain control. As a result, the multiple possible detriments of having more narcotics available than actually necessary would be lessened. By

  12. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  13. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  14. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  15. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  16. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  17. The Narcotics Situation and the Prevention of Narcotics Use in Higher Educational Institutions of Krasnoiarsk Krai

    ERIC Educational Resources Information Center

    Nevirko, D. D.; Shinkevich, V. E.; Korobitsina, T. V.

    2013-01-01

    Research on narcotics use among students in Russia shows that many are under pressure become involved, and that knowledge of and willingness to participate in clinics and other sources of help are not widespread.

  18. [Psychophysiological aspects of the problem of narcotic dependency].

    PubMed

    Tursunkhodzhaev, M Kh; Tursunkhodzhaeva, L A

    2002-01-01

    An attempt has been made at analyzing mechanisms of formation of addiction to narcotics from the standpoint of a systemic approach to a functional organization of psychic activity. A model is proposed of the pathological functional system as the basis of narcodependence, which combines processes of two adjoining levels--those of psychic activity and of higher nervous activity. It is suggested that pathological hyperactivity of the functional structure maintaining the need for a change in the emotional state might be the basis of addiction to narcotic drugs.

  19. Anonymous quantum nonlocality.

    PubMed

    Liang, Yeong-Cherng; Curchod, Florian John; Bowles, Joseph; Gisin, Nicolas

    2014-09-26

    We investigate the phenomenon of anonymous quantum nonlocality, which refers to the existence of multipartite quantum correlations that are not local in the sense of being Bell-inequality-violating but where the nonlocality is--due to its biseparability with respect to all bipartitions--seemingly nowhere to be found. Such correlations can be produced by the nonlocal collaboration involving definite subset(s) of parties but to an outsider, the identity of these nonlocally correlated parties is completely anonymous. For all n≥3, we present an example of an n-partite quantum correlation exhibiting anonymous nonlocality derived from the n-partite Greenberger-Horne-Zeilinger state. An explicit biseparable decomposition of these correlations is provided for any partitioning of the n parties into two groups. Two applications of these anonymous Greenberger-Horne-Zeilinger correlations in the device-independent setting are discussed: multipartite secret sharing between any two groups of parties and bipartite quantum key distribution that is robust against nearly arbitrary leakage of information.

  20. Early intravenous ibuprofen decreases narcotic requirement and length of stay after traumatic rib fracture.

    PubMed

    Bayouth, Lilly; Safcsak, Karen; Cheatham, Michael L; Smith, Chadwick P; Birrer, Kara L; Promes, John T

    2013-11-01

    Pain control after traumatic rib fracture is essential to avoid respiratory complications and prolonged hospitalization. Narcotics are commonly used, but adjunctive medications such as nonsteroidal anti-inflammatory drugs may be beneficial. Twenty-one patients with traumatic rib fractures treated with both narcotics and intravenous ibuprofen (IVIb) (Treatment) were retrospectively compared with 21 age- and rib fracture-matched patients who received narcotics alone (Control). Pain medication requirements over the first 7 hospital days were evaluated. Mean daily IVIb dose was 2070 ± 880 mg. Daily intravenous morphine-equivalent requirement was 19 ± 16 vs 32 ± 24 mg (P < 0.0001). Daily narcotic requirement was significantly decreased in the Treatment group on Days 3 through 7 (P < 0.05). Total weekly narcotic requirement was significantly less among Treatment patients (P = 0.004). Highest and lowest daily pain scores were lower in the Treatment group (P < 0.05). Hospital length of stay was 4.4 ± 3.4 versus 5.4 ± 2.9 days (P = 0.32). There were no significant complications associated with IVIb therapy. Early IVIb therapy in patients with traumatic rib fractures significantly decreases narcotic requirement and results in clinically significant decreases in hospital length of stay. IVIb therapy should be initiated in patients with traumatic rib fractures to improve patient comfort and reduce narcotic requirement.

  1. Treatment in England of Canadian Patients Addicted to Narcotic Drugs

    PubMed Central

    Frankau, Lady

    1964-01-01

    The method of treatment and the results obtained from the treatment of 50 Canadian patients addicted to narcotic drugs who went to England are recorded. These patients were first stabilized on the minimal dose of narcotic drug which permitted them to work, and to acquire security and self-respect. Then, after psychiatric treatment dealing with the basic problem of their personality disorder, complete withdrawal treatment of the narcotic drug was undertaken. Nine of 10 patients aged between 20 and 30, of good social and cultural background, have been relieved of dependence on drugs for over two years. The other 40 patients came from a different background. Nearly all had been imprisoned for drug offences and they had come to England to obtain treatment and to avoid further prison sentences in Canada. The 31 patients whose prison sentences had been directly connected with drug offences are working steadily and leading an apparently normal life. The remaining nine patients had been convicted of criminal acts before becoming addicted to narcotic drugs and, with two exceptions, the results of their treatment compare unfavourably with the other patients, seven having been convicted and imprisoned in London. PMID:14123667

  2. No End in Sight: The Abuse of Prescription Narcotics.

    PubMed

    Cicero, Theodore J

    2015-01-01

    From teenagers dying from heroin overdoses to crime tied to Vicodin and OxyContin addiction to road fatalities in which sedatives and muscle relaxants are involved, 20,000 deaths in the United States in 2014 were attributed to problems associated with narcotics and prescription drug use. Our author, whose research involves the neurobiological basis of drug addiction, traces the history and evolution of narcotics and leans on his clinical experience to discuss why certain drugs are powerful, addicting-and dangerous.

  3. Effects of Interventions on Relapse to Narcotics Addiction: An Event-History Analysis.

    ERIC Educational Resources Information Center

    Hser, Yih-Ing; And Others

    1995-01-01

    Event-history analysis was applied to the life history data of 581 male narcotics addicts to specify the concurrent, postintervention, and durational effects of social interventions on relapse to narcotics use. Results indicate the advisability of supporting methadone maintenance with other prevention strategies. (SLD)

  4. Spectral Anonymization of Data

    PubMed Central

    Lasko, Thomas A.; Vinterbo, Staal A.

    2011-01-01

    The goal of data anonymization is to allow the release of scientifically useful data in a form that protects the privacy of its subjects. This requires more than simply removing personal identifiers from the data, because an attacker can still use auxiliary information to infer sensitive individual information. Additional perturbation is necessary to prevent these inferences, and the challenge is to perturb the data in a way that preserves its analytic utility. No existing anonymization algorithm provides both perfect privacy protection and perfect analytic utility. We make the new observation that anonymization algorithms are not required to operate in the original vector-space basis of the data, and many algorithms can be improved by operating in a judiciously chosen alternate basis. A spectral basis derived from the data’s eigenvectors is one that can provide substantial improvement. We introduce the term spectral anonymization to refer to an algorithm that uses a spectral basis for anonymization, and we give two illustrative examples. We also propose new measures of privacy protection that are more general and more informative than existing measures, and a principled reference standard with which to define adequate privacy protection. PMID:21373375

  5. Who Are the Anonymous? Involvement and Predictors of Gamblers Anonymous Attendance Among Disordered Gamblers Presenting for Treatment.

    PubMed

    McGrath, Daniel S; Kim, Hyoun S; Hodgins, David C; Novitsky, Christine; Tavares, Hermano

    2018-04-24

    Gamblers Anonymous is the most widely available form of support for disordered gambling. Although chapters exist worldwide, knowledge of how attendees interact with the program is limited. The present study aimed to investigate involvement in Gamblers Anonymous among attendees, motives for attendance, and overall satisfaction with the program. Furthermore, potential gambling-related predictors of attendance versus deciding not to attend Gamblers Anonymous were investigated. A treatment-seeking sample of disordered gamblers (N = 512) from São Paulo, Brazil completed a series of self-report measures including an author-compiled Gamblers Anonymous survey. From the sample, 141 gamblers reported attending Gamblers Anonymous over the previous 30 days. An examination of involvement, satisfaction, and motives for attending Gamblers Anonymous was conducted, followed by regression analyses to assess predictors of attendance and satisfaction with the program. The majority of attendees (80%) reported some satisfaction with the program. The most common motive for attending Gamblers Anonymous was related to relapse prevention. Regression analyses revealed that greater gambling severity and number of days gambled were associated with not attending Gamblers Anonymous while giving testimonials was strongly related (OR = 6.18) to satisfaction with the program. The findings of this study contribute to the literature on Gamblers Anonymous. In particular, that members derive great satisfaction from the program and see it as a way to strengthen their abstinence goals. However, despite high satisfaction, the results also suggest that most members were passively involved in the program. More research that assesses the effectiveness of Gamblers Anonymous as either a stand-alone or adjunct treatment is needed.

  6. Against anonymity.

    PubMed

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. © 2014 John Wiley & Sons Ltd.

  7. Concept analysis: lack of anonymity.

    PubMed

    Swan, Marilyn A; Hobbs, Barbara B

    2017-05-01

    To re-examine and expand understanding of the concept 'lack of anonymity' as a component of rural nursing theory. Early healthcare literature reports lack of anonymity as part of social and working environments, particularly rural nursing. Rural nursing theory included the first published concept analysis on lack of anonymity but lacked empirical referents. Workforce, societal and rural healthcare changes support an updated analysis. To further understand lack of anonymity, its present day use and applicability to diverse environments, research from multiple disciplines was reviewed. Concept analysis. A literature search using eight terms in eleven databases was conducted of literature published between 2008-2013. Walker and Avant's concept analysis methodology guided the analysis. The previous concept analysis is supported in part by current literature. The defining attributes, 'identifiable', 'establishing boundaries for public and private self and interconnectedness' in a community were updated. Updated antecedents include: (i) environmental context; (ii) opportunities to become visible; (iii) developing relationships and (iv) unconscious or limited awareness of public or personal privacy. Consequences are: (i) familiarity; (ii) visibility; (iii) awareness of privacy and (iv) manage or balance of lack of anonymity. Cases were constructed and empirical referents identified. The concept of lack of anonymity was updated; portions of the original definition remain unchanged. Empirical referents reveal the defining attributes in daily life and may guide future research on the effect of lack of anonymity on nursing practice. This analysis advances the conceptual understanding of rural nursing theory. © 2016 John Wiley & Sons Ltd.

  8. Multimodal Pain Management Protocol Versus Patient Controlled Narcotic Analgesia for Postoperative Pain Control after Shoulder Arthroplasty.

    PubMed

    Nicholson, Thema; Maltenfort, Mitchell; Getz, Charles; Lazarus, Mark; Williams, Gerald; Namdari, Surena

    2018-05-01

    Our institution's traditional pain management strategy after shoulder arthroplasty has involved the utilization of postoperative patient-controlled narcotic analgesia. More recently, we have implemented a protocol (TLC) that utilizes a multimodal approach. The purpose of this study was to determine whether this change has improved pain control and decreased narcotic utilization. Patients undergoing primary total shoulder or reverse arthroplasty were retrospectively studied. All patients underwent interscalene brachial plexus blockade. "Traditional" patients were provided a patient-controlled analgesic pump postoperatively. TLC patients were given preoperative and postoperative multimodal, non-narcotic analgesic medications and breakthrough narcotics. Morphine equivalent units (MEU) consumed and Visual Analog Scale (VAS) scores for pain (0, 8, 16, and 24 hours) were considered. There were 108 patients in each group. Total postoperative narcotic consumption in the first 24 postoperative hours was 38.5 +/- 81.1 MEU in the "Traditional group" compared to 59.3 +/- 59.1 MEU in the TLC group ( P<0.001 ). Of patients in the TLC group, 88% utilized breakthrough narcotics. VAS pain was significantly higher in the "Traditional group" at 16 hours (4.1 +/- 2.9 vs 3.2 +/- 2.7, P=0.020 ) and 24 hours (4.8 +/- 2.7 vs 3.7 +/- 2.6, P=0.004 ). Those treated with the TLC protocol had greater narcotic utilization but better VAS pain scores at 24 hours after surgery. Both groups experienced rebound pain. While the TLC protocol led to an improved pain experience, further modification of the currently protocol may be necessary to reduce overall narcotic utilization.

  9. Toward a conditional approach to anonymity? An explorative multicenter longitudinal study among anonymous living kidney donors and recipients.

    PubMed

    Pronk, Mathilde C; Slaats, Dorthe; van der Pant, Karlijn A M I; Vervelde, Janneke; Dooper, Ine M; Dor, Frank J M F; Weimar, Willem; van de Wetering, Jacqueline; Zuidema, Willij C; Massey, Emma K

    2017-12-01

    Anonymity between living donors and recipients is a topic of discussion among transplant professionals. This longitudinal study explored living kidney donors' and patients' perspectives on anonymity. Prior to surgery (T0) and 3 months afterward (T1), participants in unspecified or specified indirect donation programs completed a questionnaire on their experiences with and attitudes toward anonymity as well as demographic and medical characteristics. Nonparametric tests were used to assess group differences and associations. Participants were content with anonymity at T0 and T1. Fourteen and 23% wanted to meet at T0 and T1, respectively. If the other party expressed the wish to meet, 50% (T0) and 55% (T1) would be willing to meet. Most participants agreed that meeting should be allowed if both parties agree. Attitude toward anonymity did not differ between donors/recipients, nor between T0/T1 and unspecified/specified indirect donation programs. This study showed that most donors and recipients who participated in anonymous donation schemes are in favor of a conditional approach to anonymity. Guidelines on how to revoke anonymity if both parties agree are needed and should include education about pros and cons of (non-) anonymity and a logistical plan on how, when, where, and by whom anonymity should be revoked. © 2017 Steunstichting ESOT.

  10. 4 CFR 25.8 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... alcoholic beverages, narcotic drugs, hallucinogens, marijuana, barbiturates, or amphetamines is prohibited..., marijuana, barbiturate, or amphetamine. This prohibition shall not apply in cases where the drug is being...

  11. 4 CFR 25.8 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... alcoholic beverages, narcotic drugs, hallucinogens, marijuana, barbiturates, or amphetamines is prohibited..., marijuana, barbiturate, or amphetamine. This prohibition shall not apply in cases where the drug is being...

  12. 4 CFR 25.8 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... alcoholic beverages, narcotic drugs, hallucinogens, marijuana, barbiturates, or amphetamines is prohibited..., marijuana, barbiturate, or amphetamine. This prohibition shall not apply in cases where the drug is being...

  13. 4 CFR 25.8 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... alcoholic beverages, narcotic drugs, hallucinogens, marijuana, barbiturates, or amphetamines is prohibited..., marijuana, barbiturate, or amphetamine. This prohibition shall not apply in cases where the drug is being...

  14. 4 CFR 25.8 - Alcoholic beverages and narcotics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... alcoholic beverages, narcotic drugs, hallucinogens, marijuana, barbiturates, or amphetamines is prohibited..., marijuana, barbiturate, or amphetamine. This prohibition shall not apply in cases where the drug is being...

  15. Utility-preserving anonymization for health data publishing.

    PubMed

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  16. Classification of narcotics in solid mixtures using principal component analysis and Raman spectroscopy.

    PubMed

    Ryder, Alan G

    2002-03-01

    Eighty-five solid samples consisting of illegal narcotics diluted with several different materials were analyzed by near-infrared (785 nm excitation) Raman spectroscopy. Principal Component Analysis (PCA) was employed to classify the samples according to narcotic type. The best sample discrimination was obtained by using the first derivative of the Raman spectra. Furthermore, restricting the spectral variables for PCA to 2 or 3% of the original spectral data according to the most intense peaks in the Raman spectrum of the pure narcotic resulted in a rapid discrimination method for classifying samples according to narcotic type. This method allows for the easy discrimination between cocaine, heroin, and MDMA mixtures even when the Raman spectra are complex or very similar. This approach of restricting the spectral variables also decreases the computational time by a factor of 30 (compared to the complete spectrum), making the methodology attractive for rapid automatic classification and identification of suspect materials.

  17. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  18. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  19. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  20. Narcotic Use and Postoperative Doctor Shopping by Patients with Nephrolithiasis Requiring Operative Intervention: Implications for Patient Safety.

    PubMed

    Kappa, Stephen F; Green, Elizabeth A; Miller, Nicole L; Herrell, Stanley D; Mitchell, Christopher R; Mir, Hassan R; Resnick, Matthew J

    2016-09-01

    We sought to determine perioperative patterns of narcotic use and the prevalence of postoperative doctor shopping among patients with nephrolithiasis requiring operative management. We retrospectively reviewed the records of consecutive patients residing in Tennessee who required ureteroscopy with laser lithotripsy for nephrolithiasis at a single institution from January to December 2013. Using the Tennessee CSMD (Controlled Substances Medication Database) patients were categorized by the number of postoperative narcotic providers. Doctor shopping behavior was identified as any patient seeking more than 1 narcotic provider within 3 months of surgery. Demographic and clinical characteristics associated with doctor shopping behavior were identified. During the study period 200 eligible patients underwent ureteroscopy with laser lithotripsy for nephrolithiasis, of whom 48 (24%) were prescribed narcotics by more than 1 provider after surgery. Compared to those receiving narcotics from a single provider, patients with multiple narcotic providers were younger (48.1 vs 54.2 years, p <0.001), less educated (high school education or less in 83.3% vs 58.7%, p = 0.014), more likely to have a history of mental illness (37.5% vs 16%, p <0.01) and more likely to have undergone prior stone procedures (66% vs 42%, p <0.01). Additionally, these patients demonstrated more frequent preoperative narcotic use (87.5% vs 63.2%), longer postoperative narcotic use (39.1 vs 6.0 days) and a higher morphine equivalent dose per prescription (44.7 vs 35.2 dose per day, each p <0.001). Postoperative doctor shopping is common among patients with nephrolithiasis who require operative management. Urologists should be aware of available registry data to decrease the likelihood of redundant narcotic prescribing. Copyright © 2016 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  1. Antecedents of narcotic use and addiction. A study of 898 Vietnam veterans.

    PubMed

    Helzer, J E; Robins, L N; Davis, D H

    1976-02-01

    Previous studies of predictors of narcotic abuse have been retrospective and based on samples of long-term addicts obtained from legal or medical channels. There are several methodological problems in this approach. The present study is an attempt to test certain alleged predictors of narcotic use in a cohort of 898 Vietnam veterans. The design overcomes several of the methodological weaknesses of previous studies. Eight variables which have been reported as predictors of drug use or addiction in the drug literature were inquired about during a personal interview which included the premilitary life of each subject. The antecedent variables were socioeconomic background, inner city residence, psychiatric illness, broken home, race, employment history, education and antisocial history. Using information obtained from interviews and military records, we then tested the predictive value of each of these antecedents by comparing narcotic used and addiction in Vietman and use after Vietnam in men differing with respect to each antecedent. Results indicate that some of the variables were very poor, and others very good predictors of the various levels of narcotic involvement. The predictive value and overall importance of each of the variables we tested are discussed.

  2. Precise definition of anonymization in genetic polymorphism studies.

    PubMed

    Hamajima, Nobuyuki; Atsuta, Yoshiko; Niwa, Yoshimitsu; Nishio, Kazuko; Tanaka, Daisuke; Yamamoto, Kazuhito; Tamakoshi, Akiko

    2004-01-01

    Anonymization is an essential tool to protect privacy of participants in epidemiological studies. This paper classifies types of anonymization in genetic polymorphism studies, providing precise definitions. They are: 1) unlinkable anonymization at enrollment without a participant list; 2) unlinkable anonymization before genotyping with a participant list; 3) linkable anonymization; 4) unlinkable anonymization for outsiders; and 5) linkable anonymization for outsiders. The classification in view of accessibility to a table including genotype data with directly identifiable data such as names is important; if such tables exist, staff may obtain genotype information about participants. The first three modes are defined here as anonymization unaccessible to genotype data with directly identifiable information for research staff. Anonymization with a key code held by participants is possible with any of the above anonymization modes, by which participants can access to their own genotypes through telephone or internet. A guideline issued on March 29, 2001 with collaboration of three Ministries in Japan defines "anonymization in a linkable fashion" and "anonymization in an unlinkable fashion", "for the purpose of preventing the personal information from being divulged externally in violation of law, the present guidelines or a research protocol", but the contents are not clear in practice. The proposed definitions will be useful when we describe and discuss the preferable mode of anonymization for a given polymorphism study.

  3. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  4. 46 CFR 10.211 - Criminal record review.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... years. Assault (simple) 1 year 5 years. Sexual Assault (rape, child molestation) 5 years 10 years... membership in a rehabilitation or counseling group, such as Alcoholics Anonymous or Narcotics Anonymous; (3...

  5. 7 CFR 500.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., by a person under the influence of intoxicating beverages or a narcotic drug, is prohibited. (b... USNA property is prohibited. (c) The sale of alcoholic beverages on the grounds of the USNA is...

  6. Peptidase inhibitors reduce opiate narcotic withdrawal signs, including seizure activity, in the rat.

    PubMed

    Pinsky, C; Dua, A K; LaBella, F S

    1982-07-15

    Narcotic withdrawal was precipitated by administration of naloxone in a low dose at 2 h after the final dose of morphine in a 9-day dependency-inducing schedule. Withdrawal was characterized by leaps, increased nocifensor activity and by cerebral cortical epileptiform activity, the latter not generally reported to be prominent in narcotic withdrawal. Single large doses of morphine did not provoke epileptiform activity at 2 h postinjection but did induce an acute opioid dependency wherein a moderately high dose of naloxone, ineffective in non-dependent rats, provoked upward leaping and electrocortical epileptiform activity. Pretreatment of the 9-day dependent rats with peptidase inhibitors, administered intracerebroventricularly, significantly reduced withdrawal severity including the epileptiform activity. We propose that peptidase inhibitors protect certain species of endogenous opioids and/or other neuropeptides that tend to suppress expression of the narcotic withdrawal syndrome. Furthermore, our findings suggest that epileptiform activity is a nascent form of cerebral activity hitherto largely unnoticed in narcotic withdrawal and that neuropeptides may be involved in certain epileptic states.

  7. Anon-Pass: Practical Anonymous Subscriptions.

    PubMed

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  8. 46 CFR 10.211 - Criminal record review.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) 1 year 5 years. Sexual Assault (rape, child molestation) 5 years 10 years. Robbery 5 years 10 years... rehabilitation or counseling group, such as Alcoholics Anonymous or Narcotics Anonymous; (3) Character references...

  9. 46 CFR 10.211 - Criminal record review.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) 1 year 5 years. Sexual Assault (rape, child molestation) 5 years 10 years. Robbery 5 years 10 years... rehabilitation or counseling group, such as Alcoholics Anonymous or Narcotics Anonymous; (3) Character references...

  10. 46 CFR 10.211 - Criminal record review.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) 1 year 5 years. Sexual Assault (rape, child molestation) 5 years 10 years. Robbery 5 years 10 years... rehabilitation or counseling group, such as Alcoholics Anonymous or Narcotics Anonymous; (3) Character references...

  11. 46 CFR 10.211 - Criminal record review.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) 1 year 5 years. Sexual Assault (rape, child molestation) 5 years 10 years. Robbery 5 years 10 years... rehabilitation or counseling group, such as Alcoholics Anonymous or Narcotics Anonymous; (3) Character references...

  12. Narcotics Misuse Victims: Is Physical Exercise for Their Fitness Needed

    NASA Astrophysics Data System (ADS)

    Tarigan, B.

    2017-03-01

    This research is purposed to find out whether physical exercise needed to improve physical fitness of narcotics misuse victims in Social Rehabilitation Center Pamardi Putera West Java Province. Survey method and field test were applied in this research. Population is all members of rehabilitation in BRSPP and the sampling technique used in this research was purposive sampling. Indonesia Physical Fitness Test (TKJI) was used as the instrument. The result of the research showed that level of narcotics misuse victims’ physical fitness is in ‘low’ category so that regular and measurable physical activity is needed in developing their physical fitness.

  13. Personality Disorders, Narcotics, and Stimulants; Relationship in Iranian Male Substance Dependents Population.

    PubMed

    Noorbakhsh, Simasadat; Zeinodini, Zahra; Khanjani, Zeynab; Poorsharifi, Hamid; Rajezi Esfahani, Sepideh

    2015-06-01

    Individuals with certain personality disorders, especially the antisocial and borderline personality disorders, are more prone to substance use disorders. Regarding the importance of substance use disorders, this study aimed to explore the association between personality disorders and types of used drugs (narcotics and stimulants) in Iranian male substance users. The current study was a correlation study. We evaluated 285 male substance users and excluded 25 according to exclusion criteria. A total of 130 narcotic users and 130 stimulant users were recruited randomly in several phases from January 2013 to October 2013. All participants were referred to Substance Dependency Treatment Clinics in Tehran, Iran. Data collection process was accomplished by means of clinical interview based on DSM-V criteria for substance use disorders, Iranian version of addiction severity index (ASI), and Millon clinical multi-axial inventory-III (MCMI-III). Data were analyzed by SPSS 21 using Pearson correlation coefficient and regression, the. There was a significant correlation between stimulant use and histrionic personality disorder (P < 0.001) and antisocial and narcissistic personality disorders (P < 0.05). In addition, correlation between avoidant, histrionic, and narcissistic personality disorders (P < 0.05) and depressed, antisocial, and borderline personality disorders (P < 0.001) with narcotics consumption were significant. In clusters, there was a significant correlation between cluster B personality disorders, and narcotic and stimulants consumption (P < 0.001). In addition, this association was explored between cluster C personality disorder and narcotics (P < 0.001). The results of this study in terms of personality disorders and types of used drugs were in accordance with the previous studies results. It is necessary to design appropriate treatment plans for medical treatment of those with personality disorders.

  14. [Anonymous birth and neonaticide in Tyrol].

    PubMed

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  15. Marathon Group Therapy with Female Narcotic Addicts.

    ERIC Educational Resources Information Center

    Kilmann, Peter R.

    This study evaluated the impact of structured and unstructured marathon therapy on institutionalized female narcotic addicts. Subjects were randomly assigned to one of five groups: two structured therapy groups, two unstructured therapy groups, and a no-treatment control group. The Personal Orientation Inventory, the Adjective Check List, and a…

  16. Birth order and hospitalization for alcohol and narcotics use in Sweden.

    PubMed

    Barclay, Kieron; Myrskylä, Mikko; Tynelius, Per; Berglind, Daniel; Rasmussen, Finn

    2016-10-01

    Previous studies have shown that birth order is an important predictor of later life health as well as socioeconomic attainment. In this study, we examine the relationship between birth order and hospitalization for alcohol and narcotics use in Sweden. We study the relationship between birth order and hospitalization related to alcohol and narcotics use before and after the age of 20 using Swedish register data for cohorts born 1987-1994. We apply Cox proportional hazard models and use sibling fixed effects, eliminating confounding by factors shared by the siblings. Before age 20 we find that later born siblings are hospitalized for alcohol use at a higher rate than first-borns, and there is a monotonic increase in the hazard of hospitalization with increasing birth order. Second-borns are hospitalized at a rate 47% higher than first-borns, and third-borns at a rate 65% higher. Similar patterns are observed for hospitalization for narcotics use. After age 20 the pattern is similar, but the association is weaker. These patterns are consistent across various sibling group sizes. Later born siblings are more likely to be hospitalized for both alcohol and narcotics use in Sweden. These birth order effects are substantial in size, and larger than the estimated sex differences for the risk of hospitalization related to alcohol and drug use before age 20, and previous estimates for socioeconomic status differences in alcohol and drug abuse. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  17. Afghanistan Narcotics: The Bigger Battle Toward Stabilization

    DTIC Science & Technology

    2009-04-01

    Development of economic opportunities coupled with effective governmental reform is necessary for the nation to become prosperous, stable, and secure. 15...without marginalizing narcotics production and narco-trafficking. Effective security, strong governance, judicial capability...introduce the possibility of meaningful alternative livelihoods. Development of these economic opportunities coupled with effective governmental

  18. Narcotic Drug Use Among Patients with Lower Back Pain in Employer Health Plans: A Retrospective Analysis of Risk Factors and Health Care Services

    PubMed Central

    Rhee, YongJoo; Taitel, Michael S.; Walker, David R.; Lau, Denys T.

    2009-01-01

    Objective: This study examines the risk factors of narcotic drug use, medical and pharmacy claim costs, and health services use among lower back pain (LBP) patients who use narcotic medications. Methods: This retrospective study used administrative claims data between September 2002 and March 2004 from 3 employer health plans that collectively contained records of 165,569 employees 18 to 64 years of age. Multivariate regression analyses were performed to examine risk factors and health care services use consequences of narcotic drug use in patients with LBR Results: The study sample included 13,760 patients with LBP due to mechanical causes. Nearly 60% were female and the average age was 47 years. Almost half of the patients with LBP (45%) used narcotic drugs. Narcotic-using patients with LBP had significantly higher rates of comorbid conditions than patients with LBP not using narcotic drugs; hypertension (23% vs 13%), arthritis (14% vs 4%), depression (10% vs 5%), anxiety (6% vs 3%), and cancer (2% vs 1%) (P < 0.001). Patients with LBP with 2 identified psychological comorbid conditions, depression and anxiety, on average used more narcotic medications. Patients with LBP who had surgery were significantly more likely to use narcotic drugs within 1 week of procedure than those patients without surgery (P < 0.001). In contrast, patients with LBP who had chiropractic services for LBP were less likely to take narcotic drugs within 7 days after services compared to those without chiropractic services (P < 0.001). Furthermore, controlling for health conditions, patients with LBP who took narcotic medications were significantly more likely than patients not taking narcotics to have an emergency room visit within 30 days after the initial narcotic drug prescription dates (P < 0.001). Narcotic-using patients with LBP accounted for 62% of health care costs among all patients with LBP. The average monthly health care cost for a narcotic-using LBP patient was $1222, compared

  19. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  20. 7 CFR 501.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 501.7 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.7 Intoxicating beverages and narcotics. Entering Research Center property or the operating of a...

  1. 7 CFR 501.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 501.7 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.7 Intoxicating beverages and narcotics. Entering Research Center property or the operating of a...

  2. 7 CFR 501.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 501.7 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.7 Intoxicating beverages and narcotics. Entering Research Center property or the operating of a...

  3. 7 CFR 501.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 501.7 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.7 Intoxicating beverages and narcotics. Entering Research Center property or the operating of a...

  4. A flexible approach to distributed data anonymization.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  6. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  7. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  8. INFORMATION ABOUT NARCOTICS - RESOURCE MATERIAL FOR TEACHERS.

    ERIC Educational Resources Information Center

    ABRAMS, IRVING; HAWKINS, BARBARA A.

    A SHORT HISTORY OF NARCOTICS AND THEIR LEGAL CONTROL IN THE UNITED STATES IS PRESENTED WITH AN EXPLANATION OF ADDICTION AND METHODS OF ITS PREVENTION. TEACHERS ARE INFORMED OF WAYS IN WHICH TO IDENTIFY ADDICTED STUDENTS. FOR EXAMPLE, THEY MAY BE CLOSELY OBSERVED IN PHYSICAL EDUCATION CLASSES, AND ABNORMALITIES INVESTIGATED BY A PHYSICIAN.…

  9. Multimodal analgesia without parenteral narcotics for total knee arthroplasty.

    PubMed

    Dorr, Lawrence D; Raya, Julio; Long, William T; Boutary, Myriam; Sirianni, Leigh Ellen

    2008-06-01

    Use of parenteral narcotics after total knee arthroplasty is considered by most orthopedic surgeons to be the standard of care. This study tested the hypothesis that a multimodal oral pain medication protocol could control pain and minimize complications of parenteral narcotics. Postoperative oral analgesia was augmented with either continuous epidural infusion or continuous femoral infusion using ropivacaine only. Seventy patients had total knee arthroplasty with a protocol that included preemptive oral analgesics, epidural anesthesia, pericapsular analgesic injection, and postoperative analgesia without parenteral opioids. The average daily pain score was less than 4 out of 10, nausea occurred in 15 patients (21%), emesis in 1 patient (1.4%), and there were no severe complications. This study proved the hypothesis that pain after total knee arthroplasty could be effectively managed without routine use of parenteral opioids.

  10. 7 CFR 503.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Intoxicating beverages and narcotics. 503.8 Section 503.8 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.8 Intoxicating...

  11. 7 CFR 503.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Intoxicating beverages and narcotics. 503.8 Section 503.8 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.8 Intoxicating...

  12. 7 CFR 503.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Intoxicating beverages and narcotics. 503.8 Section 503.8 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.8 Intoxicating...

  13. 7 CFR 503.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Intoxicating beverages and narcotics. 503.8 Section 503.8 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.8 Intoxicating...

  14. 7 CFR 503.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Intoxicating beverages and narcotics. 503.8 Section 503.8 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.8 Intoxicating...

  15. 36 CFR 504.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Intoxicating beverages and narcotics. 504.7 Section 504.7 Parks, Forests, and Public Property SMITHSONIAN INSTITUTION RULES AND REGULATIONS GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.7 Intoxicating beverages and...

  16. 7 CFR 501.7 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Intoxicating beverages and narcotics. 501.7 Section 501.7 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA...

  17. Anon-Pass: Practical Anonymous Subscriptions

    PubMed Central

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  18. Annotated Bibliography of Literature on Narcotic Addiction.

    ERIC Educational Resources Information Center

    Bowden, R. Renee

    Nearly 150 abstracts have been included in this annotated bibliography; its purpose has been to scan the voluminous number of documents on the problem of drug addiction in order to summarize the present state of knowledge on narcotic addiction and on methods for its treatment and control. The literature reviewed has been divided into the following…

  19. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... narcotic drug, hallucinogen, marijuana, barbiturate or amphetamine is prohibited. Operation of a motor..., hallucinogens, marijuana, barbiturates or amphetamines is also prohibited. These prohibitions shall not apply in...

  20. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... narcotic drug, hallucinogen, marijuana, barbiturate or amphetamine is prohibited. Operation of a motor..., hallucinogens, marijuana, barbiturates or amphetamines is also prohibited. These prohibitions shall not apply in...

  1. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... narcotic drug, hallucinogen, marijuana, barbiturate or amphetamine is prohibited. Operation of a motor..., hallucinogens, marijuana, barbiturates or amphetamines is also prohibited. These prohibitions shall not apply in...

  2. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... narcotic drug, hallucinogen, marijuana, barbiturate or amphetamine is prohibited. Operation of a motor..., hallucinogens, marijuana, barbiturates or amphetamines is also prohibited. These prohibitions shall not apply in...

  3. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... narcotic drug, hallucinogen, marijuana, barbiturate or amphetamine is prohibited. Operation of a motor..., hallucinogens, marijuana, barbiturates or amphetamines is also prohibited. These prohibitions shall not apply in...

  4. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  5. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  6. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  7. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  8. 31 CFR 598.314 - Specially designated narcotics trafficker.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Central Intelligence, the Director of the Federal Bureau of Investigation, the Administrator of the Drug... goods or services in support of, the international narcotics trafficking activities of a specially... trafficking. Note 1 to § 598.314: The names of persons determined to fall within this definition, whose...

  9. 31 CFR 407.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Intoxicating beverages and narcotics. 407.8 Section 407.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT IN THE TREASURY BUILDING AND THE...

  10. 31 CFR 407.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Intoxicating beverages and narcotics. 407.8 Section 407.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT IN THE TREASURY BUILDING AND THE...

  11. 31 CFR 407.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Intoxicating beverages and narcotics. 407.8 Section 407.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT IN THE TREASURY BUILDING AND THE...

  12. 31 CFR 407.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Intoxicating beverages and narcotics. 407.8 Section 407.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT IN THE TREASURY BUILDING AND THE...

  13. 31 CFR 407.8 - Intoxicating beverages and narcotics.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Intoxicating beverages and narcotics. 407.8 Section 407.8 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT IN THE TREASURY BUILDING AND THE...

  14. Scrambling for anonymous visual communications

    NASA Astrophysics Data System (ADS)

    Dufaux, Frederic; Ebrahimi, Touradj

    2005-08-01

    In this paper, we present a system for anonymous visual communications. Target application is an anonymous video chat. The system is identifying faces in the video sequence by means of face detection or skin detection. The corresponding regions are subsequently scrambled. We investigate several approaches for scrambling, either in the image-domain or in the transform-domain. Experiment results show the effectiveness of the proposed system.

  15. 78 FR 13760 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-28

    ...: Assistant Director, Sanctions Compliance & Evaluation, Office of Foreign Assets Control, U.S. Department of... pursuant to the Kingpin Act; or (3) playing a significant role in international narcotics trafficking. On...

  16. 21 CFR 1306.07 - Administering or dispensing of narcotic drugs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... meets both of the following conditions: (1) The practitioner is separately registered with DEA as a narcotic treatment program. (2) The practitioner is in compliance with DEA regulations regarding treatment...

  17. 21 CFR 1306.07 - Administering or dispensing of narcotic drugs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... meets both of the following conditions: (1) The practitioner is separately registered with DEA as a narcotic treatment program. (2) The practitioner is in compliance with DEA regulations regarding treatment...

  18. 14 CFR 91.19 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 91.19 Section 91.19 Aeronautics and Space FEDERAL AVIATION... operate a civil aircraft within the United States with knowledge that narcotic drugs, marihuana, and...

  19. 14 CFR 91.19 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 91.19 Section 91.19 Aeronautics and Space FEDERAL AVIATION... operate a civil aircraft within the United States with knowledge that narcotic drugs, marihuana, and...

  20. 14 CFR 125.39 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 125.39 Section 125.39 Aeronautics and Space FEDERAL AVIATION... AIRCRAFT Certification Rules and Miscellaneous Requirements § 125.39 Carriage of narcotic drugs, marihuana...

  1. 14 CFR 121.15 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 121.15 Section 121.15 Aeronautics and Space FEDERAL AVIATION....15 Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. If a...

  2. 14 CFR 121.15 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 121.15 Section 121.15 Aeronautics and Space FEDERAL AVIATION....15 Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. If a...

  3. 14 CFR 125.39 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 125.39 Section 125.39 Aeronautics and Space FEDERAL AVIATION... AIRCRAFT Certification Rules and Miscellaneous Requirements § 125.39 Carriage of narcotic drugs, marihuana...

  4. 31 CFR 598.314 - Specially designated narcotics trafficker.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Central Intelligence, the Director of the Federal Bureau of Investigation, the Administrator of the Drug... goods or services in support of, the international narcotics trafficking activities of a specially... trafficking. Note to § 598.314: Please refer to the appendices at the end of this chapter V for listings of...

  5. Legal Issues in Anonymity and Pseudonymity.

    ERIC Educational Resources Information Center

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  6. 14 CFR 135.41 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 135.41 Section 135.41 Aeronautics and Space FEDERAL AVIATION... PERSONS ON BOARD SUCH AIRCRAFT General § 135.41 Carriage of narcotic drugs, marihuana, and depressant or...

  7. 14 CFR 135.41 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 135.41 Section 135.41 Aeronautics and Space FEDERAL AVIATION... PERSONS ON BOARD SUCH AIRCRAFT General § 135.41 Carriage of narcotic drugs, marihuana, and depressant or...

  8. 14 CFR 133.14 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 133.14 Section 133.14 Aeronautics and Space FEDERAL AVIATION... narcotic drugs, marihuana, and depressant or stimulant drugs or substances. If the holder of a certificate...

  9. 14 CFR 133.14 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 133.14 Section 133.14 Aeronautics and Space FEDERAL AVIATION... narcotic drugs, marihuana, and depressant or stimulant drugs or substances. If the holder of a certificate...

  10. 14 CFR 141.18 - Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances. 141.18 Section 141.18 Aeronautics and Space FEDERAL AVIATION... General § 141.18 Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances...

  11. 14 CFR 141.18 - Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances. 141.18 Section 141.18 Aeronautics and Space FEDERAL AVIATION... General § 141.18 Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances...

  12. 14 CFR 141.18 - Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances. 141.18 Section 141.18 Aeronautics and Space FEDERAL AVIATION... General § 141.18 Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances...

  13. 14 CFR 141.18 - Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances. 141.18 Section 141.18 Aeronautics and Space FEDERAL AVIATION... General § 141.18 Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances...

  14. 14 CFR 141.18 - Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances. 141.18 Section 141.18 Aeronautics and Space FEDERAL AVIATION... General § 141.18 Carriage of narcotic drugs, marijuana, and depressant or stimulant drugs or substances...

  15. A randomized study of the effect of anonymity, quasi-anonymity, and Certificates of Confidentiality on postpartum women's disclosure of sensitive information.

    PubMed

    Beatty, Jessica R; Chase, Sara K; Ondersma, Steven J

    2014-01-01

    Under-reporting of substance use and other sensitive information is a substantial threat to internal study validity, particularly during the perinatal period. Anonymous approaches are associated with greater disclosure but are incompatible with longitudinal follow-up. Alternative approaches include use of a U.S. Federal Certificate of Confidentiality (CoC) and quasi-anonymous methods, in which there is no link between name and data. However, the relative effect of these procedures on disclosure is unknown. This randomized study was designed to evaluate the effects of consent condition (anonymous, quasi-anonymous, CoC, and traditional confidentiality) on disclosure of sensitive information among postpartum women. Participants were 200 postpartum, primarily African-American women who were randomly assigned to one of the four consent conditions and completed a brief computer-delivered assessment of alcohol and drug use, sexual risk, intimate partner violence, and emotional distress. Participants in the anonymous and quasi-anonymous conditions disclosed significantly more sensitive information than those in the traditional consent condition. In contrast, no advantage in overall disclosure was observed for the CoC condition. This result was largely consistent across specific content areas with the exception of emotional distress, disclosure of which was unrelated to consent condition. Although use of a CoC has limited impact on disclosure, the quasi-anonymous method may increase disclosure to a similar extent as full anonymity. Quasi-anonymous approaches should be considered when under-reporting is likely, a context in which the disadvantages of this approach must be balanced against its advantages. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. K-Anonymous Multi-party Secret Handshakes

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai; Yung, Moti

    Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers have proposed a set of secret handshake schemes based on different assumptions about the credentials used: from one-time credentials to the more general PKI-like credentials. In this paper, we concentrate on k-anonymous secret handshake schemes based on PKI-like infrastructures. More specifically, we deal with the k-anonymous m-party (m > 2) secret handshake problem, which is significantly more involved than its two-party counterpart due to the following: When an honest user hand-shakes with m - 1 parties, it must be assured that these parties are distinct; otherwise, under the mask of anonymity a dishonest participant may clone itself in a single handshake session (i.e., assuming multiple personalities).

  17. Afghanistan: Narcotics and U.S. Policy

    DTIC Science & Technology

    2009-04-21

    Purpose FY2008 Defense Appropriation P.L. 110-116 FY2008 Bridge Fund P.L. 110-161 (Division L ) FY2008 Supplemental P.L. 110-252 (Title...Glasser, “U.S. Backing Helps Warlord Solidify Power,” Washington Post, February 18, 2002; Ron Moreau and Sami Yousafzai, with Donatella Lorch, “Flowers of...dangers of narcotics use and to monitor and prevent drug use. Testimony of Lt. Gen. Walter L . Sharp, Director of Strategic Plans (J-5), Before the

  18. Terrorism and Drug Trafficking: Technologies for Detecting Explosives and Narcotics

    DOT National Transportation Integrated Search

    1996-09-01

    The General Accounting Office (GAO) examined information on explosives and narcotics detection technologies that are available or under development. This report discusses (1) funding for those technologies, (2) characteristics and limitations of avai...

  19. The Efficacy of Foreign Assistance in Counter Narcotics

    DTIC Science & Technology

    2013-03-01

    Crop Reduction Components)...................................................................................25 Table 6. Colombian Coffee Prices in U.S...Colombia was initiated by the Clinton administration to assist the Colombian government with counter-narcotics, governing capacity, and economic...Assistance, Sustainable Development, and the War on Terrorism (Washington, D.C.: Environmental Law Institute, 2002) 8; Jean-Paul Azam and Veronique

  20. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  1. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  2. 76 FR 25405 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... Narcotics Kingpin Designation Act. The list of additional designees is as follows: 1. SHAYESTEH, Bahram Ali (a.k.a. JADALI, Bahrami Ali; a.k.a. SHAYESTEH, Bahrami Ali), 80331 Muenchen, Bayern, Germany; DOB 6...

  3. 3 CFR - Delegation of Functions Under Subsection 804(h)(2)(A) of the Foreign Narcotics Kingpin...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Delegation of Functions Under Subsection 804(h)(2)(A) of the Foreign Narcotics Kingpin Designation Act Presidential Documents Other Presidential Documents Memorandum of May 31, 2013 Delegation of Functions Under Subsection 804(h)(2)(A) of the Foreign Narcotics Kingpin Designation Act Memorandum for...

  4. 28 CFR 2.3 - Same: Narcotic Addict Rehabilitation Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Same: Narcotic Addict Rehabilitation Act. 2.3 Section 2.3 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and Parolees...

  5. 28 CFR 2.3 - Same: Narcotic Addict Rehabilitation Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Same: Narcotic Addict Rehabilitation Act. 2.3 Section 2.3 Judicial Administration DEPARTMENT OF JUSTICE PAROLE, RELEASE, SUPERVISION AND RECOMMITMENT OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and Parolees...

  6. Anonymity in Classroom Voting and Debating

    ERIC Educational Resources Information Center

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  7. Study on Privacy Protection Algorithm Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    FeiFei, Zhao; LiFeng, Dong; Kun, Wang; Yang, Li

    Basing on the study of K-Anonymity algorithm in privacy protection issue, this paper proposed a "Degree Priority" method of visiting Lattice nodes on the generalization tree to improve the performance of K-Anonymity algorithm. This paper also proposed a "Two Times K-anonymity" methods to reduce the information loss in the process of K-Anonymity. Finally, we used experimental results to demonstrate the effectiveness of these methods.

  8. 31 CFR 700.7 - Alcoholic beverages, narcotics, and drugs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Alcoholic beverages, narcotics, and drugs. 700.7 Section 700.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FEDERAL LAW ENFORCEMENT TRAINING CENTER, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT...

  9. 31 CFR 700.7 - Alcoholic beverages, narcotics, and drugs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Alcoholic beverages, narcotics, and drugs. 700.7 Section 700.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FEDERAL LAW ENFORCEMENT TRAINING CENTER, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT...

  10. 31 CFR 700.7 - Alcoholic beverages, narcotics, and drugs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Alcoholic beverages, narcotics, and drugs. 700.7 Section 700.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FEDERAL LAW ENFORCEMENT TRAINING CENTER, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT...

  11. 31 CFR 700.7 - Alcoholic beverages, narcotics, and drugs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Alcoholic beverages, narcotics, and drugs. 700.7 Section 700.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FEDERAL LAW ENFORCEMENT TRAINING CENTER, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT...

  12. 31 CFR 700.7 - Alcoholic beverages, narcotics, and drugs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Alcoholic beverages, narcotics, and drugs. 700.7 Section 700.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FEDERAL LAW ENFORCEMENT TRAINING CENTER, DEPARTMENT OF THE TREASURY REGULATIONS GOVERNING CONDUCT...

  13. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    NASA Astrophysics Data System (ADS)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  14. Using Meditation in Addiction Counseling

    ERIC Educational Resources Information Center

    Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura

    2011-01-01

    Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.

  15. Protecting genomic sequence anonymity with generalization lattices.

    PubMed

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  16. Comments on “Anonymous reviews”

    NASA Astrophysics Data System (ADS)

    Okal, Emille A.

    I would like to add the triple perspective of a now-retired editor (GRL, 1993-19997), a reviewer and author to the ongoing debate in Eos about anonymous versus signed reviews.As an editor, I did not keep precise statistics, but my recollection would be that a little under (perhaps 40%) of the more than 3000 reviews I handled were signed. While some sort of "trend" expectedly existed between glowing reviews and signed ones, the correlation would probably not have passed a statistical test. By and large, my reviewers, whether or not they waived anonymity, were a professional and responsible pool, and the kind of personal and potentially unethical antagonisms described by Myrl Beck was the rare exception, rather than the rule, among anonymous reviews. The careful editor should be able to recognize this attitude in the tone and style of the review, and through comparison with other reviews of the same paper.

  17. Controlled fabrication of silver nanoneedles array for SERS and their application in rapid detection of narcotics

    NASA Astrophysics Data System (ADS)

    Yang, Yong; Li, Zhi-Yuan; Yamaguchi, Kohei; Tanemura, Masaki; Huang, Zhengren; Jiang, Dongliang; Chen, Yuhui; Zhou, Fei; Nogami, Masayuki

    2012-03-01

    Novel surface-enhanced Raman scattering (SERS) substrates with high SERS-activity are ideal for novel SERS sensors, detectors to detect illicitly sold narcotics and explosives. The key to the wider application of SERS technique is to develop plasmon resonant structure with novel geometries to enhance Raman signals and to control the periodic ordering of these structures over a large area to obtain reproducible Raman enhancement. In this work, a simple Ar+-ion sputtering route has been developed to fabricate silver nanoneedles arrays on silicon substrates for SERS-active substrates to detect trace-level illicitly sold narcotics. These silver nanoneedles possess a very sharp apex with an apex diameter of 15 nm and an apex angle of 20°. The SERS enhancement factor of greater than 1010 was reproducibly achieved by the well-aligned nanoneedles arrays. Furthermore, ketamine hydrochloride molecules, one kind of illicitly sold narcotics, can be detected down to 27 ppb by using our SERS substrate within 3 s, indicating the sensitivity of our SERS substrates for trace amounts of narcotics and that SERS technology can become an important analytical technique in forensic laboratories because it can provide a rapid and nondestructive method for trace detection.

  18. Transcultural use of narcotic water lilies in ancient Egyptian and Maya drug ritual.

    PubMed

    Emboden, W A

    1981-01-01

    Comparisons are made between ancient ritual uses of the flowers of Nymphaea (Nymphaeaceae) in Maya and Egyptian civilizations. Recurrent motifs encountered in the art of both of these ancient civilizations suggests that the role fo the water lily was that of a narcotic (psychodysleptic) used to mediate ecstasis among a priestly caste. Relevant literature is reviewed as are chemical data. Elements in the complex belief systems of these two civilizations need to be reinterpreted in view of the use of two water lilies as ritual narcotics. The species implicated are Nymphaea caerulea Sav., in Egypt, and N. ampla DC., among the Maya.

  19. Performance evaluation of various K- anonymity techniques

    NASA Astrophysics Data System (ADS)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  20. Regime change: re-visiting the 1961 Single Convention on Narcotic Drugs.

    PubMed

    Bewley-Taylor, David; Jelsma, Martin

    2012-01-01

    March 2011 marked the 50th anniversary of the Single Convention on Narcotic Drugs. This legal instrument, the bedrock of the current United Nations based global drug control regime, is often viewed as merely a consolidating treaty bringing together the multilateral drug control agreements that preceded it; an erroneous position that does little to provide historical context for contemporary discussions surrounding revision of the international treaty system. This article applies both historical and international relations perspectives to revisit the development of the Convention. Framing discussion within the context of regime theory, a critique of the foundational pre-1961 treaties is followed by detailed content analysis of the official records of the United Nations conference for the adoption of a Single Convention on Narcotic Drugs and, mindful of later treaties, an examination of the treaty's status as a 'single' convention. The Single Convention on Narcotic Drugs represents a significant break with the regulative focus of the preceding multilateral treaties; a shift towards a more prohibitive outlook that within international relations terms can be regarded as a change of regime rather than the straightforward codification of earlier instruments. In this respect, the article highlights the abolition of drug use that for centuries had been embedded in the social, cultural and religious traditions of many non-Western states. Further, although often-overlooked, the Convention has failed in its aim of being the 'single' instrument within international drug control. The supplementing treaties developed in later years and under different socio-economic and political circumstances have resulted in significant inconsistencies within the control regime. Having established that a shift in normative focus has taken place in the past, the article concludes that it is timely for the international community to revisit the Single Convention on Narcotic Drugs with a view to

  1. Profile of narcotic abuse in peninsula Malaysia.

    PubMed

    Buhrich, N; Haq, S

    1980-01-01

    Demographic and drug abuse characteristics of 3,484 new drug abuse contacts presenting to the General Hospital, Kuala Lumpur, Malaysia are reported. The large majority were heroin inhalers. They were different from the traditional Eastern opium inhalers and similar to Western heroin injectors in that they were young, male, single, and frequently unemployed. These features and the relative underrepresentation of Chinese suggest that the Chinese of this study did not learn narcotic abuse from opium-smoking relatives.

  2. Translations on Narcotics and Dangerous Drugs, Number 282.

    DTIC Science & Technology

    1977-01-27

    TRANSLATIONS ON NARCOTICS AND DANGEROUS DRUGS No. 282 CONTENTS PAGE ASIA AUSTRALIA Heroin, Marihuana , Hashish Pipelines From Golden Triangle...Ring (DIARIO DE PIEDRAS NEGRAS, 19 Nov 76) 41 Briefs Drug Fight Intensified 43 Marihuana Fields Destroyed 43 Drug Incineration 44 Drug...Trafficker Denies Charges 44 Trafficker’s Escape 44 Drug Sentence 45 Firearms Sentence 45 Marihuana Traffickers Sentenced 45 New Deputy Commander 45

  3. 76 FR 58562 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... controlled by significant foreign narcotics traffickers as identified by the President. In addition, the..., Jalisco, Mexico; Plaza Del Sol Local 28, Zona R, Guadalajara, Jalisco, Mexico; Paseo Del Heliotropo 3426, Monraz, Guadalajara, Jalisco, Mexico; DOB 09 Aug 1955; POB Jalisco, Mexico; Citizen Mexico; Nationality...

  4. 77 FR 71480 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... controlled by significant foreign narcotics traffickers as identified by the President. In addition, the... IBARRA, Mayela), Calle Lago de La Doga 5312, Tijuana, Baja California, Mexico; DOB 24 Feb 1961; POB Coahuila, Mexico; Passport 99020046985 (Mexico); R.F.C. CAIM610224 (Mexico) (individual) [SDNTK]. 2...

  5. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  6. The Role of Anonymity in Peer Assessment

    ERIC Educational Resources Information Center

    Li, Lan

    2017-01-01

    This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students' performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students…

  7. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  8. Anonymization of DICOM Electronic Medical Records for Radiation Therapy

    PubMed Central

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-01-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1 minute per patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved. PMID:25147130

  9. An ethnobotanical study of medicinal plants with narcotic, sedative and analgesic effects in west of Iran.

    PubMed

    Saki, K; Bahmani, M; Rafieianb-Kopaei, M D; Asadollahi, K; Emaneini, M; Taherikalani, M

    2016-01-01

    The first step for identification of medicinal plants and their therapeutic effects is to determine their use by local people, traditional medicine books and personal experiences. The aim of this study was to document the medicinal plants used as analgesic, sedative or narcotic agents by local residents of Dehloran, Iran. Interviews conducted with 53 informants (38 male and 15 female) revealed that a total of 32 medicinal plants belonging to 22 families are used in Dehloran as narcotic, sedative and analgesic agents. The most utilized plant families were Asteraceae, Rosaceae and Fabaceae. Approximately 74% of the utilized plants was attributed to herbs, followed by trees (13%) and shrubs (13%). Sixty-six percent of the medicinal plants used in the study area were perennial and the rest were annual or biannual. The most widely used plant parts were flowers (34%) followed by leaves (24%) and fruits (14%). Thirty-nine percent of the medicinal plants were used as sedatives, 39% as analgesics, and 24% as narcotics. Recommended plants in this study can be good candidates for further clinical and laboratory trials on diseases that are associated with pain, suffering, stress and depression. They also can be used to develop new sedative, narcotic and analgesic drugs.

  10. Anonymity and live-donor transplantation: an ELPAT view.

    PubMed

    Mamode, Nizam; Lennerling, Annette; Citterio, Franco; Massey, Emma; Van Assche, Kristof; Sterckx, Sigrid; Frunza, Mihaela; Jung, Harald; Pascalev, Assya; Zuidema, Willij; Johnson, Rachel; Loven, Charlotte; Weimar, Willem; Dor, Frank J M F; Dor, Frank

    2013-02-27

    Anonymity of donors or recipients in living-donor transplantation is a complex issue and practice varies widely. There are compelling arguments for maintaining anonymity of both parties before unspecified donor transplantation and specified indirect transplantation. After transplantation, there are still good reasons to avoid disclosure of identities. Although anonymity could be lifted if both parties explicitly request it, there are significant, potentially negative consequences of such an approach. Both donor and recipient should be counseled regarding these, and transplant teams should consider the considerable financial and psychosocial costs if problems are encountered as a result of contact. Given the recent rise in the number of unspecified living-donor transplants and through paired exchange schemes, it is vital that data are collected regarding the effects of maintaining or revoking anonymity after transplantation.

  11. Counter-narcotic acoustic buoy (CNAB)

    NASA Astrophysics Data System (ADS)

    Bailey, Mark E.

    2004-09-01

    As a means to detect drug trafficking in a maritime environment, the Counter Narcotic Acoustic Buoy is part of an inexpensive system designed to detect "Go Fast" boats and report via satellite to a designated location. A go fast boat for this evaluation is defined as any boat with twin 200 horsepower outboard engines. The buoy is designed for deployment in salt water at depths ranging from 50 to 600 feet and can be easily deployed by one or two persons. Detections are based on noise energy exceeding a preset level within a frequency band associated with the go fast boat's acoustic signature. Detection ranges have been demonstrated to greater than three nautical miles.

  12. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  13. 21 CFR 1306.07 - Administering or dispensing of narcotic drugs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Administering or dispensing of narcotic drugs. 1306.07 Section 1306.07 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... an incidental adjunct to medical or surgical treatment of conditions other than addiction, or to...

  14. 21 CFR 1306.07 - Administering or dispensing of narcotic drugs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Administering or dispensing of narcotic drugs. 1306.07 Section 1306.07 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... an incidental adjunct to medical or surgical treatment of conditions other than addiction, or to...

  15. 21 CFR 1306.07 - Administering or dispensing of narcotic drugs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Administering or dispensing of narcotic drugs. 1306.07 Section 1306.07 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... an incidental adjunct to medical or surgical treatment of conditions other than addiction, or to...

  16. Tempest in a Therapeutic Community: Implementation and Evaluation Issues for Faith-Based Programming

    ERIC Educational Resources Information Center

    Scott, Diane L.; Crow, Matthew S.; Thompson, Carla J.

    2010-01-01

    The therapeutic community (TC) is an increasingly utilized intervention model in corrections settings. Rarely do these TCs include faith-based curriculum other than that included in Alcoholics Anonymous or Narcotics Anonymous programs as does the faith-based TC that serves as the basis for this article. Borrowing from the successful TC model, the…

  17. Security Analysis of Accountable Anonymous Group Communication in Dissent

    DTIC Science & Technology

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  18. Translations on Narcotics and Dangerous Drugs, Number 314.

    DTIC Science & Technology

    1977-08-15

    Control Statistics 16 THAILAND Police General Talks on Narcotics Trade Methods (Chumphon Lohachala Interview; Bangkok Domestic Service, 27 Jul 77...two men drove oft - ■ The Australasian Seed is published by Noxious Weed Press Pty Ltd in Melbourne. It is the descendant of the Australasian ...34. brief Supreme Court fieärmg, the Austra- lasian Weed was correctly gazetted. Soon afterwards the Australasian Seed appeared and it is this

  19. Anonymization of DICOM electronic medical records for radiation therapy.

    PubMed

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-10-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1min/patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. A multi-institution evaluation of clinical profile anonymization

    PubMed Central

    Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C

    2016-01-01

    Background and objective: There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. Methods: We apply a state-of-the-art k-anonymization algorithm, with k set to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Results: Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Conclusions: Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. PMID:26567325

  1. 75 FR 27118 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-13

    ... OFAC's Web site ( http://www.treas.gov/ofac ) or via facsimile through a 24-hour fax-on demand service... establishes a program targeting the activities of significant foreign narcotics traffickers and their organizations on a worldwide basis. It provides a statutory framework for the President to impose sanctions...

  2. 78 FR 62946 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... significant foreign narcotics traffickers as identified by the President. In addition, the Secretary of the...; R.F.C. PAPA751109870 (Mexico); C.U.R.P. PAPA751109HNEDSL04 (Mexico) (individual) [SDNTK] (Linked To... No. 279, Supermanzana 50, Manzana 14, Lote 17, Residencial San Angel, Cancun, Quintana Roo, Mexico...

  3. 78 FR 47828 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-06

    ... significant foreign narcotics traffickers as identified by the President. In addition, the Secretary of the..., Colonia Centro, Culiacan, Sinaloa 80000, Mexico; DOB 21 Dec 1941; POB Sinaloa, Mexico; nationality Mexico; citizen Mexico; R.F.C. NUBA411221867 (Mexico); C.U.R.P. NUBA411221HSLXDN05 (Mexico) (individual) [SDNTK...

  4. Terrorism and Drug Trafficking: Responsibilities for Developing Explosives and Narcotics Detection Technologies

    DOT National Transportation Integrated Search

    1997-04-01

    This report discusses (1) the roles, responsibilities, and authority of : agencies that establish policy, provide funds or oversee funding requests, : and develop explosives and narcotics detection technologies; : (2) mechanisms used to coordinate th...

  5. 77 FR 74915 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    .... jurisdiction, owned or controlled by significant foreign narcotics traffickers as identified by the President... Enrique; DOB 25 Mar 1980; POB Culiacan, Sinaloa, Mexico; C.U.R.P. EUEJ800325HSLSSR02 (Mexico) (individual... GUTIERREZ, Julio Cesar, Calle Platon 268, Col. Paso Blanco, Ocotlan, Jalisco, Mexico; DOB 03 Oct 1981; POB...

  6. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  7. A multi-institution evaluation of clinical profile anonymization.

    PubMed

    Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C; Malin, Bradley A

    2016-04-01

    There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. We apply a state-of-the-artk-anonymization algorithm, withkset to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Overprescription of postoperative narcotics: a look at postoperative pain medication delivery, consumption and disposal in urological practice.

    PubMed

    Bates, Cory; Laciak, Robert; Southwick, Andrew; Bishoff, Jay

    2011-02-01

    Prescription narcotic abuse is a significant social problem. Surplus medication following surgery is 1 source of prescription diversion. We assessed prescribing practices, consumption and disposal of prescribed narcotics after urological surgery. Surveys were administered to a 3-month consecutive sample of adult patients who underwent surgery performed by full and adjunct University of Utah Urology faculty. Surveys were performed 2 to 4 weeks postoperatively. With the exception of the investigators, prescribing physicians had no prior knowledge of the study. Data collected included perception of pain control, type and quantity of medication prescribed, quantity of leftover medication, refills needed, disposal instructions and surplus medication disposition. Overall 47% of 586 patients participated in the study. Hydrocodone was prescribed most commonly (63%), followed by oxycodone (35%), and 86% of the patients were satisfied with pain control. Of the dispensed narcotics 58% was consumed and 12% of patients requested refills. A total of 67% of patients had surplus medication from the initial prescription and 92% received no disposal instructions for surplus medication. Of those patients with leftover medication 91% kept the medication at home while 6% threw it in the trash, 2% flushed it down the toilet and less than 1% returned it to a pharmacy. Overprescription of narcotics is common and retained surplus medication presents a readily available source of opioid diversion. It appears that no entity on the prescribing or dispensing ends of prescription opioid delivery is fulfilling the responsibility to accurately educate patients on proper surplus medication disposal. Surgeons should analyze prescribing practices and consider decreasing the quantity of postoperative narcotics prescribed. Copyright © 2011 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  9. Greater number of narcotic analgesic prescriptions for osteoarthritis is associated with falls and fractures in elderly adults.

    PubMed

    Rolita, Lydia; Spegman, Adele; Tang, Xiaoqin; Cronstein, Bruce N

    2013-03-01

    To evaluate the changes in types of medications prescribed for pain before and after withdrawal of certain selective cyclooxygenase 2 (COX-2) inhibitors in 2004 and to determine whether there was an association with fall events in elderly adults with a diagnosis of osteoarthritis (OA). A nested case-control design using electronic medical records compiled between 2001 and 2009. Electronic medical records for care provided in an integrated health system in rural Pennsylvania over a 9-year period (2001-09), the midpoint of which rofecoxib and valdecoxib were pulled from the market. Thirteen thousand three hundred fifty-four individuals aged 65 to 89 with a diagnosis of OA. The incidence of falls and fractures was examined in relation to analgesics prescribed: narcotics, COX-2 inhibitors, and nonsteroidal anti-inflammatory drugs (NSAIDs). The comparison sample of individuals who did not fall was matched 3:1 with those who fell according to age, sex, and comorbidity. Narcotic analgesic prescriptions were associated with a significantly greater risk of falls and fractures. The likelihood of experiencing a fall/fracture was higher in participants prescribed narcotic analgesics than those prescribed a COX-2 inhibitor (odds ratio (OR) = 3.3, 95% confidence interval (CI) = 2.5-4.3) or NSAID (OR = 4.1, 95% CI = 3.7-4.5). Use of narcotic analgesics is associated with risk of falls and fractures in elderly adults with OA, an observation that suggests that the current guidelines for the treatment of pain, which include first-line prescription of narcotics, should be reevaluated. © 2013, Copyright the Authors Journal compilation © 2013, The American Geriatrics Society.

  10. 77 FR 14592 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... controlled by significant foreign narcotics traffickers as identified by the President. In addition, the...''), DOB 13 Aug 1961; POB Culiacan, Sinaloa, Mexico; citizen Mexico; nationality Mexico; C.U.R.P. ZAGJ610813HSLMRS05 (Mexico) (individual) [SDNTK] Entities 2. ZARKA DE MEXICO S.A. DE C.V., Miguel Hidalgo No. 348 Pte...

  11. Screening technologies for detection of swallowed packages of narcotics

    NASA Astrophysics Data System (ADS)

    Burnett, Lowell J.; Magnuson, Erik E.; Sheldon, Alan G.; Kumar, Sankaran

    1997-01-01

    An increasingly popular method of transporting modest quantities of narcotics across international borders is to employ 'swallowers'. These are people who typically enter the country as international airline passengers after swallowing small, water-tight packages of heroin and/or cocaine. Rapid and accurate identification of swallowers in the airport environment poses difficult technical changes. Commonly used medical inspection technologies fall into one of two categories. Either they are unsuitable for widespread use, or they do not provide adequate information. An example of the former is x-ray scanning, while an example of the latter is ultrasonic imaging. Quantum Magnetics has developed a system to screen selected airline passengers for the presence of swallowed narcotics. The system utilizes magnetic resonance, which provides the physical basis for the magnetic resonance imaging systems widely used in the medical community as an alternative to x-rays. The system is currently operational, and laboratory performance testing is complete. Both the design of the system and its performance will be discussed. This work was sponsored in part by the Office of National Drug Control Policy and the US Customs Service.

  12. Anonymous HIV testing: the impact of availability on demand in Arizona.

    PubMed Central

    Hirano, D; Gellert, G A; Fleming, K; Boyd, D; Englender, S J; Hawks, H

    1994-01-01

    The purpose of this study was to evaluate the impact of anonymous testing availability on human immunodeficiency virus (HIV) test demand in Arizona. Testing patterns before and after the introduction of anonymous testing were compared. Client knowledge of new test policy and delay in testing until an anonymous option was available were assessed. Test numbers among men who have sex with men showed a statistically significant increase after introduction of an anonymous testing option. Arizona continues to maintain anonymous testing availability. Public health agencies should consider how test policy may influence people's HIV test decisions. PMID:7998649

  13. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from D. J. Wesolowski: Preserving anonymity in the review process

    NASA Astrophysics Data System (ADS)

    Wesolowski, David J.

    To those scientists who haven't served as editors or associate editors of scientific journals, I can assure you that it's already too hard to find enough qualified reviewers willing to do the job without threatening them with exposure as well! So, if you want your papers to be published within a reasonable timeframe, you'll pretty much have to put up with anonymous reviews.I've been an associate editor of Geochimica et Cosmochimica Acta for 11 years and an Editorial Board member of Chemical Geology for 4. I think anonymous reviews are perfectly acceptable, but that the editor evaluating the reviews should always be identified, both to the authors and in the published manuscript. Reviewers should be permitted to request anonymity, but authors should always be instructed to specifically acknowledge in their manuscripts the contributions of those reviewers who do not request anonymity. This, in fact, might encourage more reviewers to identify themselves. I don't know about you, but it tickles me pink when I see my name in print!

  14. Securing the anonymity of content providers in the World Wide Web

    NASA Astrophysics Data System (ADS)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  15. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    PubMed

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  16. Association between narcotic use and anabolic-androgenic steroid use among American adolescents.

    PubMed

    Denham, Bryan E

    2009-01-01

    Drawing on the data gathered in the 2006 Monitoring the Future study of American youth, the present research examines associations between use of narcotics and use of anabolic-androgenic steroids (AASs) among high-school seniors (n = 2,489). With independent measures and controls including sex, race, media exposure, socializing with friends, participation in recreational and school-sponsored sports, perceptions of drug use among professional athletes, and perceptions of steroid use among close friends, binary logistic regression analyses revealed significant associations between AAS use and the use of alcohol, crack cocaine, Vicodin, gamma-hydroxybutyrate (GHB), Ketamine, and Rohypnol. While use of both AASs and the narcotic drugs generally did not eclipse 5% of the sample, the numbers extend to many thousands in larger populations. Implications for health practitioners and recommendations for future research are offered. The study's limitations are noted.

  17. The Narcotics Situation in Russia as a Social Pedagogical Problem

    ERIC Educational Resources Information Center

    Popov, V. A.

    2012-01-01

    The increase in the use of narcotics in Russia has been complicated by the spread of new kinds of drugs that are less visible than more traditional kinds. A worsening of the situation must be prevented. This requires studying the accumulation of world experience, searching for up-to-date approaches to prevention, combining the efforts of science…

  18. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    PubMed

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  19. "Transversus Abdominis Plane Blocks in Microsurgical Breast Reconstruction: Analysis of Pain, Narcotic Consumption, Length of Stay and Cost."

    PubMed

    Salibian, Ara A; Frey, Jordan D; Thanik, Vishal D; Karp, Nolan S; Choi, Mihye

    2018-06-02

    Transversus abdominis plane (TAP) blocks are increasingly being utilized in microvascular breast reconstruction. The implications of TAP blocks on specific reconstructive, patient and institutional outcomes remain to be fully elucidated. Patients undergoing abdominally-based microvascular breast reconstruction from 2015-2017 were reviewed. Length of stay, complications, narcotic consumption, donor-site pain and hospital expenses were compared between patients that did and those that did not receive TAP blocks with liposomal bupivacaine. Outcomes were subsequently compared in patients with elevated body mass index (BMI). Fifty patients (43.9%) received TAP blocks (27 [54.0%] under ultrasound guidance) and 64 patients (56.1%) did not. Patients with TAP blocks had significantly decreased oral and total narcotic consumption (p=0.0001 and p<0.0001, respectively) as well as significantly less donor-site pain (3.3 versus 4.3, p<0.0001). There was no significant difference in hospital expenses between the two cohorts ($21,531.53 versus $22,050.15 per patient, p=0.5659). Patients with BMI≥25 who received TAP blocks had a significantly decreased length of stay (3.8 versus 4.4 days, p=0.0345) as well as decreased narcotic consumption and postoperative pain compared to patients without TAP blocks. Patients with BMI<25 did not have a significant difference in postoperative pain, narcotic consumption or length of stay between the TAP versus no TAP block groups. TAP blocks with liposomal bupivacaine significantly reduce oral and total postoperative narcotic consumption as well as donor-site pain in all patients after abdominally-based microvascular breast reconstruction without increasing hospital expenses. TAP blocks additionally significantly decrease length of stay in patients with BMI≥25.

  20. 31 CFR 91.8 - Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., hallucinogenic and dangerous drugs. 91.8 Section 91.8 Money and Finance: Treasury Regulations Relating to Money... dangerous drugs. Entering or being on the property, or operating a motor vehicle thereon by a person under the influence of alcoholic beverages, narcotics, hallucinogenic or dangerous drugs is prohibited. The...

  1. 31 CFR 91.8 - Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., hallucinogenic and dangerous drugs. 91.8 Section 91.8 Money and Finance: Treasury Regulations Relating to Money... dangerous drugs. Entering or being on the property, or operating a motor vehicle thereon by a person under the influence of alcoholic beverages, narcotics, hallucinogenic or dangerous drugs is prohibited. The...

  2. 31 CFR 91.8 - Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., hallucinogenic and dangerous drugs. 91.8 Section 91.8 Money and Finance: Treasury Regulations Relating to Money... dangerous drugs. Entering or being on the property, or operating a motor vehicle thereon by a person under the influence of alcoholic beverages, narcotics, hallucinogenic or dangerous drugs is prohibited. The...

  3. 31 CFR 91.8 - Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., hallucinogenic and dangerous drugs. 91.8 Section 91.8 Money and Finance: Treasury Regulations Relating to Money... dangerous drugs. Entering or being on the property, or operating a motor vehicle thereon by a person under the influence of alcoholic beverages, narcotics, hallucinogenic or dangerous drugs is prohibited. The...

  4. Opium and Afghanistan: Reassessing U.S. Counter-Narcotics Strategy

    DTIC Science & Technology

    2007-03-30

    and effective governance of Afghanistan.”3 This paper examines the nature of the opium problem in Afghanistan and analyzes the current strategy to...Opium is also refined for use in legal prescription painkillers such as OxyContin and Vicodin.14 However, Australia and France currently produce about...is simply inadequate to carry out an effective counter-narcotics campaign. While some regions of Afghanistan are relatively stable and free of

  5. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    PubMed

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  6. Associations of Pre-transplant Prescription Narcotic Use with Clinical Complications after Kidney Transplantation

    PubMed Central

    Lentine, Krista L.; Lam, Ngan N.; Xiao, Huiling; Tuttle-Newhall, Janet E.; Axelrod, David; Brennan, Daniel C.; Dharnidharka, Vikas R.; Yuan, Hui; Nazzal, Mustafa; Zheng, Jie; Schnitzler, Mark A.

    2015-01-01

    Background Associations of narcotic use before kidney transplantation with post-transplant clinical outcomes are not well described. Methods We examined integrated national transplant registry, pharmacy records, and Medicare billing claims to follow 16,322 kidney transplant recipients, of whom 28.3% filled a narcotic prescription in the year before transplantation. Opioid analgesic fills were normalized to morphine equivalents (ME) and expressed as mg/kg exposures (approximate quartiles: 0.1– 1.7, 1.8–5.4, 5.5–23.7, and ≥23.8 mg/kg, respectively). Post-transplant cardiovascular, respiratory, neurological, accidents, substance abuse, and non-compliance events were identified using diagnosis codes on Medicare billing claims. Adjusted associations of ME level with post-transplant complications were quantified by multivariate Cox regression. Results The incidence of complications at 3 years post-transplant among those with the highest pre-transplant ME exposure compared to no use included: ventricular arrhythmias, 1.1% vs. 0.2% (p<0.001); cardiac arrest, 4.7% vs. 2.7% (p<0.05); hypotension, 14% vs. 8% (p<0.0001); hypercapnia, 1.6% vs. 0.9% (p<0.05); mental status changes, 5.3% vs. 2.7% (p<0.001); drug abuse/dependence, 7.0% vs. 1.7% (p<0.0001); alcohol abuse, 1.8% vs. 0.6% (p=0.0001); accidents, 0.9% vs. 0.3% (p<0.05); and non-compliance, 3.5% vs. 2.3% (p<0.05). In multivariate analyses, transplant recipients with the highest level of pre-transplant narcotic use had approximately 2-to-4-times the risks of post-transplant ventricular arrhythmias, mental status changes, drug abuse, alcohol abuse, and accidents compared with non-users, and 35% to 45% higher risks of cardiac arrest and hypotension. Conclusion Although associations may reflect underlying conditions or behaviors, high-level prescription narcotic use before kidney transplantation predicts increased risk of clinical complications after transplantation. PMID:25832723

  7. The Comparison of Self-regulation and Affective Control in Methamphetamine and Narcotics Addicts and Non-Addicts

    PubMed Central

    Tayyebi, Kolthoum; Abolghasemi, Abbas; Mahmood Alilu, Majid; Monirpoor, Nader

    2013-01-01

    Background Increased prevalence and widespread use of methamphetamine is the public challenge and worry in the world. It seems that low levels of self-regulation and affective control to carry up probability of psychoactive drugs abuse. Objectives The purpose of the present study is the comparison of self-regulation and affective control in methamphetamine and narcotics addicts and non-addicts. Materials and Methods In this causative-comparative study, 80 addicts (40 methamphetamine addicts and 40 narcotic addicts) who referred to self-reference quitting addictive centers in Miyaneh, Iran, participated in convenience sampling. Then, they matched up with 40 non-addicts according to age, sex, educational level, and marital status. To collect data, we used self-regulation questionnaire and affective control scale. The data was analyzed by multivariate analysis of variance (MANOVA) and LSD test. Results Result shows that there is a significant difference between methamphetamine addicts and narcotics addicts and non-addicts in self-regulation and affective control (P = 0.001). Conclusions This finding indicates that low self-regulation and affective control is a risky factor in psychoactive drugs abuse. PMID:24971258

  8. How anonymous is 'anonymous'? Some suggestions towards a coherent universal coding system for genetic samples.

    PubMed

    Schmidt, Harald; Callier, Shawneequa

    2012-05-01

    So-called 'anonymous' tissue samples are widely used in research. Because they lack externally identifying information, they are viewed as useful in reconciling conflicts between the control, privacy and confidentiality interests of those from whom the samples originated and the public (or commercial) interest in carrying out research, as reflected in 'consent or anonymise' policies. High level guidance documents suggest that withdrawal of consent and samples and the provision of feedback are impossible in the case of anonymous samples. In view of recent developments in science and consumer-driven genomics the authors argue that such statements are misleading and only muddle complex ethical questions about possible entitlements to control over samples. The authors therefore propose that terms such as 'anonymised', 'anonymous' or 'non-identifiable' be removed entirely from documents describing research samples, especially from those aimed at the public. This is necessary as a matter of conceptual clarity and because failure to do so may jeopardise public trust in the governance of large scale databases. As there is wide variation in the taxonomy for tissue samples and no uniform national or international standards, the authors propose that a numeral-based universal coding system be implemented that focuses on specifying incremental levels of identifiability, rather than use terms that imply that the reidentification of research samples and associated actions are categorically impossible.

  9. Development of a portable preconcentrator/ion mobility spectrometer system for the trace detection of narcotics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parmeter, J.E.; Custer, C.A.

    This project was supported by LDRD funding for the development and preliminary testing of a portable narcotics detection system. The system developed combines a commercial trace detector known as an ion mobility spectrometer (IMS) with a preconcentrator originally designed by Department 5848 for the collection of explosives molecules. The detector and preconcentrator were combined along with all necessary accessories onto a push cart, thus yielding a fully portable detection unit. Preliminary testing with both explosives and narcotics molecules shown that the system is operational, and that it can successfully detect drugs as marijuana, methamphetamine (speed), and cocaine based on theirmore » characteristics IMS signatures.« less

  10. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  11. Stationary Anonymous Sequential Games with Undiscounted Rewards.

    PubMed

    Więcek, Piotr; Altman, Eitan

    Stationary anonymous sequential games with undiscounted rewards are a special class of games that combine features from both population games (infinitely many players) with stochastic games. We extend the theory for these games to the cases of total expected reward as well as to the expected average reward. We show that in the anonymous sequential game equilibria correspond to the limits of those of related finite population games as the number of players grows to infinity. We provide examples to illustrate our results.

  12. 31 CFR 91.8 - Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Alcoholic beverages, narcotics, hallucinogenic and dangerous drugs. 91.8 Section 91.8 Money and Finance: Treasury Regulations Relating to Money and Finance REGULATIONS GOVERNING CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.8...

  13. Monitoring anonymous HIV testing in Estonia from 2005 to 2015.

    PubMed

    Rüütel, K; Kallavus, K; Tomera, I

    2018-02-01

    In Estonia, a network of anonymous and free of charge HIV testing sites has been operating since 1988. Services are provided by health care organizations and financed by the National Institute for Health Development from the state budget. The objective of this analysis was to assess anonymous HIV testing in Estonia from 2005 to 2015. We used data collected from the National Institute for Health Development's annual reports, Health Board and Estonian Health Insurance Fund. In Estonia, more than 200 000 HIV-tests are performed annually, and of these approximately 5-6% are within anonymous HIV testing sites. The percentage tested with rapid tests in anonymous testing sites has increased from 15% in 2010 to 53% in 2015. Furthermore, up to 65% of all newly diagnosed HIV-cases have been detected in these sites. The proportion of HIV-positive tests has decreased from 3.8% to 0.5% in anonymous testing sites and from 0.3% to 0.1% in general health care. Simultaneously, the cost of detecting one new HIV case has increased almost six times. This analysis reveals that anonymous HIV testing services are well accepted by the general population as well as vulnerable populations. The positivity rate among those tested in anonymous testing sites remains higher than among all people tested, showing that the sites reach more of those who are at higher risk of HIV. In the light of decreasing positivity rate, more attention should be paid to people with higher HIV risk and increasing access to testing in community based settings. © 2018 British HIV Association.

  14. Connection anonymity analysis in coded-WDM PONs

    NASA Astrophysics Data System (ADS)

    Sue, Chuan-Ching

    2008-04-01

    A coded wavelength division multiplexing passive optical network (WDM PON) is presented for fiber to the home (FTTH) systems to protect against eavesdropping. The proposed scheme applies spectral amplitude coding (SAC) with a unipolar maximal-length sequence (M-sequence) code matrix to generate a specific signature address (coding) and to retrieve its matching address codeword (decoding) by exploiting the cyclic properties inherent in array waveguide grating (AWG) routers. In addition to ensuring the confidentiality of user data, the proposed coded-WDM scheme is also a suitable candidate for the physical layer with connection anonymity. Under the assumption that the eavesdropper applies a photo-detection strategy, it is shown that the coded WDM PON outperforms the conventional TDM PON and WDM PON schemes in terms of a higher degree of connection anonymity. Additionally, the proposed scheme allows the system operator to partition the optical network units (ONUs) into appropriate groups so as to achieve a better degree of anonymity.

  15. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    DTIC Science & Technology

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  16. Onion Routing for Anonymous and Private Internet Connections

    DTIC Science & Technology

    1999-01-28

    Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reedy Paul Syversony January 28, 1999 1 Introduction...Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device...Commerce Workshop , August 1998. [3] D. Chaum . \\Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM , v. 24

  17. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  18. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  19. Academic freedom, public reactions, and anonymity.

    PubMed

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  20. PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments

    DTIC Science & Technology

    2007-01-01

    continued price reduction of location tracking de- vices, location - based services (LBSs) are widely recognized as an important feature of the future computing... location - based services can operate completely anonymously, such as “when I pass a gas station, alert me with the unit price of the gas”. Others can...Anonymous Usage of Location - Based Services Through Spatial and Tempo- ral Cloaking. In Proceedings of the International Con- ference on Mobile

  1. Taxonomy for and Analysis of Anonymous Communications Networks

    DTIC Science & Technology

    2009-03-01

    Privacy QI Quasi-Identifier QoS Quality -of- Service RA Receiver Anonymity RFC Request For Comments RREQ Route Request RREP Route Reply...particular message as a measure. This amounts to the sender specifying a Quality -of- Service (QoS) threshold for anonymity services depending on...Location-Based Services Through Spatial and Temporal Cloaking," Proceedings of the Proceedings of MobiSys 2003: The 1st International Conference on

  2. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  3. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network

    NASA Astrophysics Data System (ADS)

    Zhang, Jia; Duan, Haixin; Liu, Wu; Wu, Jianping

    Compared with traditional static anonymous communication networks, the P2P architecture can provide higher anonymity in communication. However, the P2P architecture also leads to more challenges, such as route, stability, trust and so on. In this paper, we present WindTalker, a P2P-based low-latency anonymous communication network. It is a pure decentralized mix network and can provide low-latency services which help users hide their real identity in communication. In order to ensure stability and reliability, WindTalker imports “seed nodes” to help a peer join in the P2P network and the peer nodes can use gossip-based protocol to exchange active information. Moreover, WindTalker uses layer encryption to ensure the information of relayed messages cannot be leaked. In addition, malicious nodes in the network are the major threat to anonymity of P2P anonymous communication, so WindTalker imports a trust mechanism which can help the P2P network exclude malicious nodes and optimize the strategy of peer discovery, tunnel construction, and relaying etc. in anonymous communications. We deploy peer nodes of WindTalker in our campus network to test reliability and analyze anonymity in theory. The network measurement and simulation analysis shows that WindTalker can provide low-latency and reliable anonymous communication services.

  4. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    PubMed

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  5. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    PubMed

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  6. Standing Up a Narcotic Confirmation Laboratory for the Russian Federation Ministry of Defense Nuclear Personnel Reliability Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LukyanenkoMD, Victor; Eisele, Gerhard R; Coates, Cameron W

    2010-01-01

    Through a cooperative effort between the U. S. Department of Energy and the Russian Federation (RF) Ministry of Defense (MOD) a Personnel Reliability Program (PRP) for the nuclear handlers within the RF MOD has been implemented. A key element in the RF MOD PRP is the detection and confirmation of narcotic use in subject military and civilian personnel. This paper describes the process of narcotics screening and testing in the RF MOD and explains the confirmation process once screening has shown a positive result. Issues of laboratory certification, employee certification, employee training, sample chain-of-custody, and equipment needs will be addressed.

  7. Sperm donor anonymity and compensation: an experiment with American sperm donors

    PubMed Central

    Cohen, Glenn; Coan, Travis; Ottey, Michelle; Boyd, Christina

    2016-01-01

    Abstract Most sperm donation that occurs in the USA proceeds through anonymous donation. While some clinics make the identity of the sperm donor available to a donor-conceived child at age 18 as part of ‘open identification’ or ‘identity release programs,’ no US law requires clinics to do so, and the majority of individuals do not use these programs. By contrast, in many parts of the world, there have been significant legislative initiatives requiring that sperm donor identities be made available to children after a certain age (typically when the child turns 18). One major concern with prohibiting anonymous sperm donation has been that the number of willing sperm donors will decrease leading to shortages, as have been experienced in some of the countries that have prohibited sperm donor anonymity. One possible solution, suggested by prior work, would be to pay current anonymous sperm donors more per donation to continue to donate when their anonymity is removed. Using a unique sample of current anonymous and open identity sperm donors from a large sperm bank in the USA, we test that approach. As far as we know, this is the first attempt to examine what would happen if the USA adopted a prohibition on anonymous sperm donation that used the most ecologically valid population, current sperm donors. We find that 29% of current anonymous sperm donors in the sample would refuse to donate if the law changed such that they were required to put their names in a registry available to donor-conceived children at age 18. When we look at the remaining sperm donors who would be willing to participate, we find that they would demand an additional $60 per donation (using our preferred specification). We also discuss the ramifications for the industry. PMID:28852536

  8. Feigning terminal illness to get narcotics: a cautionary tale for hospices.

    PubMed

    Gonzalez, Faustino; Galante, Mirta

    2012-08-01

    We present the case of a woman who enrolled in the hospice benefit in order to obtain narcotics. We believe this is a cautionary tale for hospices because of our propensity to enroll patients with minimal corroborating information, in order not to delay symptom management. Also we are philosophically predisposed to believe a patient's self-report of pain and other distressing symptoms.

  9. Serratia marcescens Bacteremia: Nosocomial Cluster Following Narcotic Diversion.

    PubMed

    Schuppener, Leah M; Pop-Vicas, Aurora E; Brooks, Erin G; Duster, Megan N; Crnich, Christopher J; Sterkel, Alana K; Webb, Aaron P; Safdar, Nasia

    2017-09-01

    OBJECTIVE To describe the investigation and control of a cluster of Serratia marcescens bacteremia in a 505-bed tertiary-care center. METHODS Cluster cases were defined as all patients with S. marcescens bacteremia between March 2 and April 7, 2014, who were found to have identical or related blood isolates determined by molecular typing with pulsed-field gel electrophoresis. Cases were compared using bivariate analysis with controls admitted at the same time and to the same service as the cases, in a 4:1 ratio. RESULTS In total, 6 patients developed S. marcescens bacteremia within 48 hours after admission within the above period. Of these, 5 patients had identical Serratia isolates determined by molecular typing, and were included in a case-control study. Exposure to the post-anesthesia care unit was a risk factor identified in bivariate analysis. Evidence of tampered opioid-containing syringes on several hospital units was discovered soon after the initial cluster case presented, and a full narcotic diversion investigation was conducted. A nurse working in the post-anesthesia care unit was identified as the employee responsible for the drug diversion and was epidemiologically linked to all 5 patients in the cluster. No further cases were identified once the implicated employee's job was terminated. CONCLUSION Illicit drug use by healthcare workers remains an important mechanism for the development of bloodstream infections in hospitalized patients. Active mechanisms and systems should remain in place to prevent, detect, and control narcotic drug diversions and associated patient harm in the healthcare setting. Infect Control Hosp Epidemiol 2017;38:1027-1031.

  10. Enabling Genomic-Phenomic Association Discovery without Sacrificing Anonymity

    PubMed Central

    Heatherly, Raymond D.; Loukides, Grigorios; Denny, Joshua C.; Haines, Jonathan L.; Roden, Dan M.; Malin, Bradley A.

    2013-01-01

    Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data. PMID:23405076

  11. Should Mitochondrial Donation Be Anonymous?

    PubMed Central

    Appleby, John B

    2018-01-01

    Abstract Currently in the United Kingdom, anyone donating gametes has the status of an open-identity donor. This means that, at the age of 18, persons conceived with gametes donated since April 1, 2005 have a right to access certain pieces of identifying information about their donor. However, in early 2015, the UK Parliament approved new regulations that make mitochondrial donors anonymous. Both mitochondrial donation and gamete donation are similar in the basic sense that they involve the contribution of gamete materials to create future persons. Given this similarity, this paper presumes that both types of donor should be treated the same and made open-identity under the law, unless there is a convincing argument for treating them differently. I argue that none of the existing arguments that have been made so far in favor of mitochondrial donor anonymity are convincing and mitochondrial donors should therefore be treated as open-identity donors under UK law. PMID:29301011

  12. Should Mitochondrial Donation Be Anonymous?

    PubMed

    Appleby, John B

    2018-03-13

    Currently in the United Kingdom, anyone donating gametes has the status of an open-identity donor. This means that, at the age of 18, persons conceived with gametes donated since April 1, 2005 have a right to access certain pieces of identifying information about their donor. However, in early 2015, the UK Parliament approved new regulations that make mitochondrial donors anonymous. Both mitochondrial donation and gamete donation are similar in the basic sense that they involve the contribution of gamete materials to create future persons. Given this similarity, this paper presumes that both types of donor should be treated the same and made open-identity under the law, unless there is a convincing argument for treating them differently. I argue that none of the existing arguments that have been made so far in favor of mitochondrial donor anonymity are convincing and mitochondrial donors should therefore be treated as open-identity donors under UK law.

  13. Dispositional, Ecological and Biological Influences on Adolescent Tranquilizer, Ritalin, and Narcotics Misuse

    ERIC Educational Resources Information Center

    Fleary, Sasha A.; Heffer, Robert W.; McKyer, E. Lisako J.

    2011-01-01

    The primary purpose of this study was to examine the extent to which two of the three sources of risk-taking--dispositional and ecological--in adolescence and demographic variables were related to Ritalin, tranquilizer and narcotics misuse. The secondary aim of this study was to distinguish subgroups of Ritalin, tranquilizer, and narcotics…

  14. Anonymity-preserving Reputation Management System for health sector

    PubMed Central

    Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz

    2018-01-01

    In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267

  15. Using anonymized reflection to teach ethics: a pilot study.

    PubMed

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  16. Effect of minimally invasive technique on return to work and narcotic use following transforaminal lumbar inter-body fusion: a review.

    PubMed

    Parker, Scott L; Lerner, Jason; McGirt, Matthew J

    2012-01-01

    Low back pain is one of the most prevalent and disabling musculoskeletal conditions affecting the working population in the United States. Informed, shared decision making among patients, clinicians, and case managers about treatment options for chronic low back pain-including the role of spinal fusion where medically necessary-can have a meaningful impact on return to work, normal function, and economic outcomes. Minimally invasive techniques for lumbar spinal fusion, including transforaminal lumbar interbody fusion (MIS TLIF) have recently been introduced with the goal of smaller operative wounds, less tissue trauma, and faster postoperative recovery when compared with open fusion. Although similar long-term clinical outcomes have been reported for MIS TLIF and open TLIF, the relative merits with respect to workplace productivity have not been comprehensively investigated. Time to return to work and narcotic independence after MIS TLIF and open TLIF are important parameters that may affect overall workplace productivity, and as such are the focus of this study. This study was performed via a review of the literature. We performed a systematic literature review to identify all published articles that reported on the postoperative outcomes of patients, as assessed by return to work or narcotic independence status or both, following MIS TLIF or open TLIF. A cumulative comparison was made for all included MIS TLIF versus open TLIF surgeries. Seventy-four published studies reported postoperative outcomes following MIS TLIF or open TLIF; only five (6.8%) studies directly described time to return to work or duration of narcotic use postoperatively or both, and were therefore included into the analysis of this review. Four studies in the published literature describe time to return to work following MIS TLIF or open TLIF, and two studies describe time to narcotic independence. Overall, the reviewed literature suggests that MIS TLIF may be associated with an accelerated

  17. Narcotics Abuse among Young People in the Northern Territories: Characteristics and Prevention

    ERIC Educational Resources Information Center

    Anisimova, S. G.

    2012-01-01

    There is a persistent opinion that the spread of narcotics abuse is taking in more and more young people and having an impact on the economic, political, and cultural development of society. Data obtained by sociologists and criminologists make it possible to single out the factors, conditions, and channels of the spread of psychoactive substances…

  18. Anonymous pastoral care for problems pertaining to sexuality.

    PubMed

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed.

  19. Effects of Data Anonymization by Cell Suppression on Descriptive Statistics and Predictive Modeling Performance

    PubMed Central

    Ohno-Machado, Lucila; Vinterbo, Staal; Dreiseitl, Stephan

    2002-01-01

    Protecting individual data in disclosed databases is essential. Data anonymization strategies can produce table ambiguation by suppression of selected cells. Using table ambiguation, different degrees of anonymization can be achieved, depending on the number of individuals that a particular case must become indistinguishable from. This number defines the level of anonymization. Anonymization by cell suppression does not necessarily prevent inferences from being made from the disclosed data. Preventing inferences may be important to preserve confidentiality. We show that anonymized data sets can preserve descriptive characteristics of the data, but might also be used for making inferences on particular individuals, which is a feature that may not be desirable. The degradation of predictive performance is directly proportional to the degree of anonymity. As an example, we report the effect of anonymization on the predictive performance of a model constructed to estimate the probability of disease given clinical findings.

  20. Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance.

    PubMed Central

    Ohno-Machado, L.; Vinterbo, S. A.; Dreiseitl, S.

    2001-01-01

    Protecting individual data in disclosed databases is essential. Data anonymization strategies can produce table ambiguation by suppression of selected cells. Using table ambiguation, different degrees of anonymization can be achieved, depending on the number of individuals that a particular case must become indistinguishable from. This number defines the level of anonymization. Anonymization by cell suppression does not necessarily prevent inferences from being made from the disclosed data. Preventing inferences may be important to preserve confidentiality. We show that anonymized data sets can preserve descriptive characteristics of the data, but might also be used for making inferences on particular individuals, which is a feature that may not be desirable. The degradation of predictive performance is directly proportional to the degree of anonymity. As an example, we report the effect of anonymization on the predictive performance of a model constructed to estimate the probability of disease given clinical findings. PMID:11825239

  1. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    NASA Astrophysics Data System (ADS)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  2. Narcotic addiction, pregnancy, and the newborn.

    PubMed

    Fricker, H S; Segal, S

    1978-04-01

    Between 1954 and 1973, 101 heroin-addicted mothers gave birth to 149 babies at Vancouver General Hospital. Thirty-seven percent of the infants had low birth weights and two thirds were born preterm. Average birth weight was 2,710 gm as compared with an overall average of 3,420 gm for this hospital. Tobacco and alcohol abuse, and poor maternal nutrition probably contributed to the growth retardation. Withdrawal symptoms were observed in 68% of the babies, and this may have been aggravated by multiple drug use, which was prevalent, including alcohol, barbiturates, and "soft drugs." Neonatal mortality rate of 6.7% and a stillbirth rate of 4% resulted in a perinatal mortality rate of 10.7%. Prematurity, respiratory distress syndrome, and other perinatal complications related to an unfavorable social background accounted for most neonatal deaths, but none was attributable directly to narcotic withdrawal.

  3. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    ERIC Educational Resources Information Center

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  4. A sensitive, selective, and portable detector for contraband: The compact integrated narcotics detection instrument

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tuemer, T.O.; Doan, L.; Su, C.W.

    2000-07-01

    A Compact Integrated Narcotics Detection Instrument (CINDI) has been developed at NOVA R and D, Inc., in cooperation with the US Coast Guard. This detector utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. The backscattered neutrons are detected, and the rate is displayed by a microprocessor-controller integrated into CINDI. The operator guides the detector along a suspected area and receives immediate feedback from the state-of-the-art electronics. For user safety, the device incorporates a highly sensitivemore » detection scheme to permit the use of a very weak radioactive source, without compromising detectability. CINDI is capable of detecting narcotics effectively behind panels made of steel, wood, fiberglass, or even lead-lined materials. This makes it useful for inspecting marine vessels, ship bulkheads, automobiles, structure walls, or small sealed containers. Figure 2 shows three views of the CINDI instrument. CINDI responds strongly to hydrogen-rich materials such as narcotics. It has been tested at NOVA, the US Coast Guard, and Brewt Power Systems. The results of the tests show excellent response and specificity to narcotics. CINDI has led to a new technology that shows promise for identifying the concealed contraband. The new technique uses a fusion of two independent but complementary signals for detecting and possibly identifying concealed drugs in a variety of carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage. The carriers will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously to detect and possibly identify the contrabands it has been trained for. A system that can produce three-dimensional images for both signals may also be

  5. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    PubMed

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  6. Calculation of absorption parameters for selected narcotic drugs in the energy range from 1 keV to 100 GeV

    NASA Astrophysics Data System (ADS)

    Akman, Ferdi; Kaçal, Mustafa Recep; Akdemir, Fatma; Araz, Aslı; Turhan, Mehmet Fatih; Durak, Rıdvan

    2017-04-01

    The total mass attenuation coefficients (μ/ρ), total molecular (σt,m), atomic (σt,a) and electronic (σt,e) cross sections, effective atomic numbers (Zeff) and electron density (NE) were computed in the wide energy region from 1 keV to 100 GeV for the selected narcotic drugs such as morphine, heroin, cocaine, ecstasy and cannabis. The changes of μ/ρ, σt,m, σt,a, σt,e, Zeff and NE with photon energy for total photon interaction shows the dominance of different interaction process in different energy regions. The variations of μ/ρ, σt,m, σt,a, σt,e, Zeff and NE depend on the atom number, photon energy and chemical composition of narcotic drugs. Also, these parameters change with number of elements, the range of atomic numbers in narcotic drugs and total molecular weight. These data can be useful in the field of forensic sciences and medical diagnostic.

  7. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    ERIC Educational Resources Information Center

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  8. Community engagement research and dual diagnosis anonymous.

    PubMed

    Roush, Sean; Monica, Corbett; Pavlovich, Danny; Drake, Robert E

    2015-01-01

    Community engagement research is widely discussed but rarely implemented. This article describes the implementation of a community engagement research project on Dual Diagnosis Anonymous, a rapidly spreading peer support program in Oregon for people with co-occurring mental illness and substance use disorders. After three years of discussions, overcoming barriers, and involving several institutions, this grassroots research project has been implemented and is expanding. Active participants in Dual Diagnosis Anonymous inspired and instructed policy makers, professionals, and students. Community engagement research requires frontline participants, community members, and professional collaborators to overcome multiple barriers with persistence and steadfastness. Building trust, collaboration, and structures for community engagement research takes time and a community effort.

  9. Total pancreatectomy with islet cell transplantation vs intrathecal narcotic pump infusion for pain control in chronic pancreatitis.

    PubMed

    Mokadem, Mohamad; Noureddine, Lama; Howard, Thomas; McHenry, Lee; Sherman, Stuart; Fogel, Evan L; Watkins, James L; Lehman, Glen A

    2016-04-28

    To evaluate pain control in chronic pancreatitis patients who underwent total pancreatectomy with islet cell transplantation or intrathecal narcotic pump infusion. We recognized 13 patients who underwent intrathecal narcotic pump (ITNP) infusion and 57 patients who underwent total pancreatectomy with autologous islet cell transplantation (TP + ICT) for chronic pancreatitis (CP) pain control between 1998 and 2008 at Indiana University Hospital. All patients had already failed multiple other modalities for pain control and the decision to proceed with either intervention was made at the discretion of the patients and their treating physicians. All patients were evaluated retrospectively using a questionnaire inquiring about their pain control (using a 0-10 pain scale), daily narcotic dose usage, and hospital admission days for pain control before each intervention and during their last follow-up. All 13 ITNP patients and 30 available TP + ICT patients were evaluated. The mean age was approximately 40 years in both groups. The median duration of pain before intervention was 6 years and 7 years in the ITNP and TP + ICT groups, respectively. The median pain score dropped from 8 to 2.5 (on a scale of 0-10) in both groups on their last follow up. The median daily dose of narcotics also decreased from 393 mg equivalent of morphine sulfate to 8 mg in the ITNP group and from 300 mg to 40 mg in the TP + ICT group. No patient had diabetes mellitus (DM) before either procedure whereas 85% of those who underwent pancreatectomy were insulin dependent on their last evaluation despite ICT. ITNP and TP + ICT are comparable for pain control in patients with CP however with high incidence of DM among those who underwent TP + ICT. Prospective comparative studies and longer follow up are needed to better define treatment outcomes.

  10. Total pancreatectomy with islet cell transplantation vs intrathecal narcotic pump infusion for pain control in chronic pancreatitis

    PubMed Central

    Mokadem, Mohamad; Noureddine, Lama; Howard, Thomas; McHenry, Lee; Sherman, Stuart; Fogel, Evan L; Watkins, James L; Lehman, Glen A

    2016-01-01

    AIM: To evaluate pain control in chronic pancreatitis patients who underwent total pancreatectomy with islet cell transplantation or intrathecal narcotic pump infusion. METHODS: We recognized 13 patients who underwent intrathecal narcotic pump (ITNP) infusion and 57 patients who underwent total pancreatectomy with autologous islet cell transplantation (TP + ICT) for chronic pancreatitis (CP) pain control between 1998 and 2008 at Indiana University Hospital. All patients had already failed multiple other modalities for pain control and the decision to proceed with either intervention was made at the discretion of the patients and their treating physicians. All patients were evaluated retrospectively using a questionnaire inquiring about their pain control (using a 0-10 pain scale), daily narcotic dose usage, and hospital admission days for pain control before each intervention and during their last follow-up. RESULTS: All 13 ITNP patients and 30 available TP + ICT patients were evaluated. The mean age was approximately 40 years in both groups. The median duration of pain before intervention was 6 years and 7 years in the ITNP and TP + ICT groups, respectively. The median pain score dropped from 8 to 2.5 (on a scale of 0-10) in both groups on their last follow up. The median daily dose of narcotics also decreased from 393 mg equivalent of morphine sulfate to 8 mg in the ITNP group and from 300 mg to 40 mg in the TP + ICT group. No patient had diabetes mellitus (DM) before either procedure whereas 85% of those who underwent pancreatectomy were insulin dependent on their last evaluation despite ICT. CONCLUSION: ITNP and TP + ICT are comparable for pain control in patients with CP however with high incidence of DM among those who underwent TP + ICT. Prospective comparative studies and longer follow up are needed to better define treatment outcomes. PMID:27122666

  11. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 16, 2013 Continuation of the National Emergency With Respect to Significant...

  12. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 17, 2012 Continuation of the National Emergency With Respect to Significant...

  13. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 19, 2011 Continuation of the National Emergency With Respect to Significant...

  14. Size matters: How population size influences genotype–phenotype association studies in anonymized data

    PubMed Central

    Denny, Joshua C.; Haines, Jonathan L.; Roden, Dan M.; Malin, Bradley A.

    2014-01-01

    Objective Electronic medical records (EMRs) data is increasingly incorporated into genome-phenome association studies. Investigators hope to share data, but there are concerns it may be “re-identified” through the exploitation of various features, such as combinations of standardized clinical codes. Formal anonymization algorithms (e.g., k-anonymization) can prevent such violations, but prior studies suggest that the size of the population available for anonymization may influence the utility of the resulting data. We systematically investigate this issue using a large-scale biorepository and EMR system through which we evaluate the ability of researchers to learn from anonymized data for genome- phenome association studies under various conditions. Methods We use a k-anonymization strategy to simulate a data protection process (on data sets containing clinical codes) for resources of similar size to those found at nine academic medical institutions within the United States. Following the protection process, we replicate an existing genome-phenome association study and compare the discoveries using the protected data and the original data through the correlation (r2) of the p-values of association significance. Results Our investigation shows that anonymizing an entire dataset with respect to the population from which it is derived yields significantly more utility than small study-specific datasets anonymized unto themselves. When evaluated using the correlation of genome-phenome association strengths on anonymized data versus original data, all nine simulated sites, results from largest-scale anonymizations (population ∼ 100;000) retained better utility to those on smaller sizes (population ∼ 6000—75;000). We observed a general trend of increasing r2 for larger data set sizes: r2 = 0.9481 for small-sized datasets, r2 = 0.9493 for moderately-sized datasets, r2 = 0.9934 for large-sized datasets. Conclusions This research implies that regardless of the

  15. Anonymous broadcasting of classical information with a continuous-variable topological quantum code

    NASA Astrophysics Data System (ADS)

    Menicucci, Nicolas C.; Baragiola, Ben Q.; Demarie, Tommaso F.; Brennen, Gavin K.

    2018-03-01

    Broadcasting information anonymously becomes more difficult as surveillance technology improves, but remarkably, quantum protocols exist that enable provably traceless broadcasting. The difficulty is making scalable entangled resource states that are robust to errors. We propose an anonymous broadcasting protocol that uses a continuous-variable surface-code state that can be produced using current technology. High squeezing enables large transmission bandwidth and strong anonymity, and the topological nature of the state enables local error mitigation.

  16. MCNP Simulation Benchmarks for a Portable Inspection System for Narcotics, Explosives, and Nuclear Material Detection

    NASA Astrophysics Data System (ADS)

    Alfonso, Krystal; Elsalim, Mashal; King, Michael; Strellis, Dan; Gozani, Tsahi

    2013-04-01

    MCNPX simulations have been used to guide the development of a portable inspection system for narcotics, explosives, and special nuclear material (SNM) detection. The system seeks to address these threats to national security by utilizing a high-yield, compact neutron source to actively interrogate the threats and produce characteristic signatures that can then be detected by radiation detectors. The portability of the system enables rapid deployment and proximity to threats concealed in small spaces. Both dD and dT electronic neutron generators (ENG) were used to interrogate ammonium nitrate fuel oil (ANFO) and cocaine hydrochloride, and the detector response of NaI, CsI, and LaBr3 were compared. The effect of tungsten shielding on the neutron flux in the gamma ray detectors was investigated, while carbon, beryllium, and polyethylene ENG moderator materials were optimized by determining the reaction rate density in the threats. In order to benchmark the modeling results, experimental measurements are compared with MCNPX simulations. In addition, the efficiency and die-away time of a portable differential die-away analysis (DDAA) detector using 3He proportional counters for SNM detection has been determined.

  17. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  18. New, high-efficiency ion trap mobility detection system for narcotics and explosives

    NASA Astrophysics Data System (ADS)

    McGann, William J.; Bradley, V.; Borsody, A.; Lepine, S.

    1994-10-01

    A new patented Ion Trap Mobility Spectrometer (ITMS) design is presented. Conventional IMS designs typically operate below 0.1% efficiency. This is due primarily to electric field driven, sample ion discharge on a shutter grid. Since 99.9% of the sample ions generated in the reaction region are lost in this discharge process, the sensitivity of conventional systems is limited. The new design provides greater detection efficiency than conventional designs through the use of an `ion trap' concept. The paper describes the plasma and sample ion dynamics in the reaction region of the new detector and discusses the advantages of utilizing a `field-free' space to generate sample ions with high efficiency. Fast electronic switching is described which is used to perturb the field-free space and pulse the sample ions into the drift region for separation and subsequent detection using pseudo real-time software for analysis and display of the data. Many applications for this new detector are now being considered including the detection of narcotics and explosives. Preliminary ion spectra, reduced mobility data and sensitivity data are presented for fifteen narcotics, including cocaine, THC and LSD are reported.

  19. New high-efficiency ion trap mobility detection system for narcotics and explosives

    NASA Astrophysics Data System (ADS)

    McGann, William J.; Jenkins, Anthony; Ribiero, K.; Napoli, J.

    1994-03-01

    A new patented ion trap mobility spectrometer design is presented. Conventional IMS designs typically operate below 0.1% efficiency. This is due primarily to electrical-field-driven, sample ion discharge on a shutter grid. Since 99.9% of the sample ions generated in the reaction region are lost in this discharge process, the sensitivity of conventional systems is limited. The new design provides greater detection efficiency than conventional designs through the use of an `ion trap' concept. The paper describes the plasma and sample ion dynamics in the reaction region of the new detector and discusses the advantages of utilizing a `field-free' space to generate sample ions with high efficiency. Fast electronic switching is described which is used to perturb the field-free space and pulse the sample ions into the drift region for separation and subsequent detection using pseudo real-time software for analysis and display of the data. Many applications for this new detector are now being considered including the detection of narcotics and explosives. Preliminary ion spectra, reduced mobility data and sensitivity data are presented for fifteen narcotics, including cocaine, THC, and LSD are reported.

  20. Full-sibling embryos created by anonymous gamete donation in unrelated recipients.

    PubMed

    Dicken, Cary L; Zapantis, Athena; Illions, Edward; Pollack, Staci; Lieman, Harry J; Bevilacqua, Kris; Jindal, Sangita K

    2011-09-01

    To report the rare occurrence of full-sibling embryos in unrelated women using independently chosen donor sperm and donor oocytes in two different cycles unintentionally created at our IVF program, and to discuss the concept of disclosure to the patients. Case report. Academic IVF program. Two women independently undergoing donor recipient cycles with anonymous donor oocytes and donor sperm. Both women received oocytes from the same donor several months apart and then by coincidence selected the same anonymous sperm donor to create anonymous full-sibling embryos. Clinical pregnancy after donor-recipient IVF cycle. Both women conceived using the same donor sperm and donor oocytes in independent cycles, resulting in simultaneous pregnancy of full siblings. As providers with the knowledge that anonymous full sibling embryos have been created, we may have an obligation to disclose this information to the patients. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  1. Influence of Religiosity on 12-Step Participation and Treatment Response Among Substance-Dependent Adolescents*

    PubMed Central

    Kelly, John F.; Pagano, Maria E.; Stout, Robert L.; Johnson, Shannon M.

    2011-01-01

    Objective: Religious practices among adults are associated with more 12-step participation which, in turn, is linked to better treatment outcomes. Despite recommendations for adolescents to participate in mutual-help groups, little is known about how religious practices influence youth 12-step engagement and outcomes. This study examined the relationships among lifetime religiosity, during-treatment 12-step participation, and outcomes among adolescents, and tested whether any observed beneficial relation between higher religiosity and outcome could be explained by increased 12-step participation. Method: Adolescents (n = 195; 52% female, ages 14–18) court-referred to a 2-month residential treatment were assessed at intake and discharge. Lifetime religiosity was assessed with the Religious Background and Behaviors Questionnaire; 12-step assessments measured meeting attendance, step work (General Alcoholics Anonymous Tools of Recovery), and Alcoholics Anonymous (AA)/Narcotics Anonymous (NA)-related helping. Substance-related outcomes and psychosocial outcomes were assessed with toxicology screens, the Adolescent–Obsessive Compulsive Drinking Scale, the Children's Global Assessment Scale, and the Narcissistic Personality Inventory. Results: Greater lifetime formal religious practices at intake were associated with increased step work and AA/NA-related helping during treatment, which in turn were linked to improved substance outcomes, global functioning, and reduced narcissistic entitlement. Increased step work mediated the effect of religious practices on increased abstinence, whereas AA/NA-related helping mediated the effect of religiosity on reduced craving and entitlement. Conclusions: Findings extend the evidence for the protective effects of lifetime religious behaviors to an improved treatment response among adolescents and provide preliminary support for the 12-step proposition that helping others in recovery may lead to better outcomes. Youth with low or

  2. Influence of religiosity on 12-step participation and treatment response among substance-dependent adolescents.

    PubMed

    Kelly, John F; Pagano, Maria E; Stout, Robert L; Johnson, Shannon M

    2011-11-01

    Religious practices among adults are associated with more 12-step participation which, in turn, is linked to better treatment outcomes. Despite recommendations for adolescents to participate in mutual-help groups, little is known about how religious practices influence youth 12-step engagement and outcomes. This study examined the relationships among lifetime religiosity, during-treatment 12-step participation, and outcomes among adolescents, and tested whether any observed beneficial relation between higher religiosity and outcome could be explained by increased 12-step participation. Adolescents (n = 195; 52% female, ages 14-18) court-referred to a 2-month residential treatment were assessed at intake and discharge. Lifetime religiosity was assessed with the Religious Background and Behaviors Questionnaire; 12-step assessments measured meeting attendance, step work (General Alcoholics Anonymous Tools of Recovery), and Alcoholics Anonymous (AA)/Narcotics Anonymous (NA)-related helping. Substance-related outcomes and psychosocial outcomes were assessed with toxicology screens, the Adolescent-Obsessive Compulsive Drinking Scale, the Children's Global Assessment Scale, and the Narcissistic Personality Inventory. Greater lifetime formal religious practices at intake were associated with increased step work and AA/NA-related helping during treatment, which in turn were linked to improved substance outcomes, global functioning, and reduced narcissistic entitlement. Increased step work mediated the effect of religious practices on increased abstinence, whereas AA/NA-related helping mediated the effect of religiosity on reduced craving and entitlement. Findings extend the evidence for the protective effects of lifetime religious behaviors to an improved treatment response among adolescents and provide preliminary support for the 12-step proposition that helping others in recovery may lead to better outcomes. Youth with low or no lifetime religious practices may assimilate

  3. Illicit narcotic injection masquerading as acute pulmonary embolism.

    PubMed

    Klochan, Shelley A; Taleb, Mohammed; Hoover, Matthew J; Mauro, Vincent F; Anandan, Vasuki; Willey, James; Cooper, Christopher J

    2013-04-01

    A 23-year-old male presented from a nursing home with hypotension, tachycardia, diaphoresis and electrocardiographic evidence of right ventricular strain that was confirmed by echocardiography. His differential diagnosis included sepsis and pulmonary embolism. A high-resolution computed tomography scan demonstrated no pulmonary emboli but did demonstrate multiple bilateral pulmonary nodules. Upon questioning he admitted to injecting a long-acting narcotic that had been manually macerated, dissolved in saline, and injected through an indwelling intravenous line. Lung biopsy findings were consistent with cellulose-induced perivascular granulomatosis. Cellulose granulomatosis can be seen in patients who inject medications designed for oral use and should be considered in patients who present with acute pulmonary hypertension.

  4. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  5. Privacy, anonymity and subjectivity in genomic research.

    PubMed

    McGonigle, Ian; Shomron, Noam

    2016-01-14

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues.

  6. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    PubMed

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  7. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  8. [Narcotic abuse in Jylland. A study based on narcotics and deaths of addicts examined at the Institute of Forensic Medicine, University of Aarhus during the period 1981-1988. 1. Narcotics].

    PubMed

    Kaa, E

    1990-04-09

    On the basis of analysis of 1,879 samples of narcotics confiscated in Jutland and Funen during the period 1981-1988, the individual types of drugs are described as regards occurrence and quality. Cannabis and heroin were found in the illegal market during the entire period. Amphetamine was rarely observed prior to 1985 but comprised half of the illegal drugs examined in 1988. Cocaine was encountered in only 1% of the samples. Designer drugs were not seen. Heroin occurred relatively most frequently in Aarhus, Odense and Esbjerg while amphetamine and cannabis were found in all parts of Jutland and Funen. The samples of heroin and amphetamine varied greatly as regards strength and the types and quantities of cutting agents. The majority of the samples were adulterated and/or diluted with substances such as caffeine and phenazone and the sugars, glucose and lactose.

  9. Long-term usage of narcotic analgesics by chronic intractable noncancer pain patients in Taiwan from 2003 to 2012.

    PubMed

    Cheng, I-Chen; Chang, Chih-Shiuh; Tsay, Wen-Ing

    2016-09-01

    Chronic pain is a common and important medical problem worldwide. Patients with chronic intractable noncancer pain (CINCP) are treated primarily with narcotics. We analyzed the characteristics of patients with CINCP and the pain prescriptions of Taiwan's physicians. We enrolled 644 patients from 66 hospitals approved by the Taiwan Food and Drug Administration to use long-term narcotics for CINCP between 2003 and 2012. The majority (61.8%) of patients were 40-49-year-old men who had been treated with pethidine more often than with fentanyl in the 20-49 years age group. More than 50% of CINCP patients live in northern Taiwan, and most were treated in the department of pain; the major diagnosis (men 28.9%; women 27.7%) was neuropathy. The most frequently prescribed single analgesic was morphine (52.2%); the most frequently prescribed two-drug combination was morphine plus fentanyl (50.8%). Pethidine, however, was the most frequently prescribed analgesic in the neurology (78.0%) and plastic surgery (50.0%) departments. To decrease malaise and addiction in patients with CINCP, Taiwan's physicians need more education on narcotic analgesics, and greater professional cooperation to develop therapeutic guidelines that will improve pain care for patients with CINCP. Copyright © 2015. Published by Elsevier B.V.

  10. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  11. Involvement in a Drug Subculture and Abstinence Following Treatment Among Puerto Rican Narcotic Addicts.

    ERIC Educational Resources Information Center

    Snarr, Richard W.; Ball, John C.

    The study investigated the life career of a sample of native Puerto Rican narcotic addicts who were treated at the Lexington, Kentucky Public Health Service Hospital. Specifically, it deals with the relationship between the addicts' involvement in a drug subculture and their subsequent drug use and abstinence. The hypothesis presented states that…

  12. Bayesian modeling of consumer behavior in the presence of anonymous visits

    NASA Astrophysics Data System (ADS)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  13. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post

  14. Can anonymous posters on medical forums be reidentified?

    PubMed

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  15. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  16. AN ADDRESS DELIVERED BEFORE SCOPE'S CONFERENCE FOR EDUCATORS ON NARCOTICS AND SMOKING. (TITLE SUPPLIED).

    ERIC Educational Resources Information Center

    RICE, JULIUS T.

    A SHORT HISTORY OF NARCOTICS USAGE IS PRESENTED. THE TERM DRUG DEPENDENCE IS BEING SUBSTITUTED FOR DRUG ADDICTION AND DRUG HABITUATION. THE ADVANTAGES AND DISADVANTAGES OF VARIOUS ANTIDOTES FOR OPIATES ARE DESCRIBED. THE EFFECTS OF LSD AND MARIJUANA ON PHYSICAL AND MENTAL PROCESSES ARE DESCRIBED. THE USE OF LSD FOR MEDICAL PURPOSES IS DISCUSSED.…

  17. De-identification of health records using Anonym: effectiveness and robustness across datasets.

    PubMed

    Zuccon, Guido; Kotzur, Daniel; Nguyen, Anthony; Bergheim, Anton

    2014-07-01

    Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text health records based on conditional random fields classifiers informed by linguistic and lexical features, as well as features extracted by pattern matching techniques. De-identification of personal health information in electronic health records is essential for the sharing and secondary usage of clinical data. De-identification tools that adapt to different sources of clinical data are attractive as they would require minimal intervention to guarantee high effectiveness. The effectiveness and robustness of Anonym are evaluated across multiple datasets, including the widely adopted Integrating Biology and the Bedside (i2b2) dataset, used for evaluation in a de-identification challenge. The datasets used here vary in type of health records, source of data, and their quality, with one of the datasets containing optical character recognition errors. Anonym identifies and removes up to 96.6% of personal health identifiers (recall) with a precision of up to 98.2% on the i2b2 dataset, outperforming the best system proposed in the i2b2 challenge. The effectiveness of Anonym across datasets is found to depend on the amount of information available for training. Findings show that Anonym compares to the best approach from the 2006 i2b2 shared task. It is easy to retrain Anonym with new datasets; if retrained, the system is robust to variations of training size, data type and quality in presence of sufficient training data. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  18. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    PubMed

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  19. Anonymizing and Sharing Medical Text Records

    PubMed Central

    Li, Xiao-Bai; Qin, Jialun

    2017-01-01

    Health information technology has increased accessibility of health and medical data and benefited medical research and healthcare management. However, there are rising concerns about patient privacy in sharing medical and healthcare data. A large amount of these data are in free text form. Existing techniques for privacy-preserving data sharing deal largely with structured data. Current privacy approaches for medical text data focus on detection and removal of patient identifiers from the data, which may be inadequate for protecting privacy or preserving data quality. We propose a new systematic approach to extract, cluster, and anonymize medical text records. Our approach integrates methods developed in both data privacy and health informatics fields. The key novel elements of our approach include a recursive partitioning method to cluster medical text records based on the similarity of the health and medical information and a value-enumeration method to anonymize potentially identifying information in the text data. An experimental study is conducted using real-world medical documents. The results of the experiments demonstrate the effectiveness of the proposed approach. PMID:29569650

  20. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hannum, David W.; Shannon, Gary W.

    This report describes the collaboration between the South Texas Specialized Crimes and Narcotics Task Force (STSCNTF) and Sandia National Laboratories (SNL) in a field test that provided prototype hand-held trace detection technology for use in counter-drug operations. The National Institute of Justice (NIJ)/National Law Enforcement and Corrections Technology Center (NLECTC)/Border Research and Technology Center (BRTC) was contacted by STSCNTF for assistance in obtaining cutting-edge technology. The BRTC created a pilot project for Sandia National Laboratories (SNL) and the STSCNTF for the use of SNL’s Hound, a hand-held sample collection and preconcentration system that, when combined with a commercial chemical detector,more » can be used for the trace detection of illicit drugs and explosives. The STSCNTF operates in an area of high narcotics trafficking where methods of concealment make the detection of narcotics challenging. Sandia National Laboratories’ (SNL) Contraband Detection Department personnel provided the Hound system hardware and operational training. The Hound system combines the GE VaporTracer2, a hand-held commercial chemical detector, with an SNL-developed sample collection and preconcentration system. The South Texas Task force reported a variety of successes, including identification of a major shipment of methamphetamines, the discovery of hidden compartments in vehicles that contained illegal drugs and currency used in drug deals, and the identification of a suspect in a nightclub shooting. The main advantage of the hand-held trace detection unit is its ability to quickly identify the type of chemical (drugs or explosives) without a long lag time for laboratory analysis, which is the most common analysis method for current law enforcement procedures.« less

  1. EFFECT OF HIV PREVENTION AND TREATMENT PROGRAM ON HIV AND HCV TRANSMISSION AND HIV MORTALITY AT AN INDONESIAN NARCOTIC PRISON.

    PubMed

    Nelwan, Erni J; Indrati, Agnes K; Isa, Ahmad; Triani, Nurlita; Alam, Nisaa Nur; Herlan, Maria S; Husen, Wahid; Pohan, Herdiman T; Alisjahbana, Bachti; Meheus, Andre; Van Crevel, Reinout; van der Ven, Andre Jam

    2015-09-01

    Validated data regarding HIV-transmission in prisons in developing countries is scarce. We examined sexual and injecting drug use behavior and HIV and HCV transmission in an Indonesian narcotic prison during the implementation of an HIV prevention and treatment program during 2004-2007 when the Banceuy Narcotic Prison in Indonesia conducted an HIV transmission prevention program to provide 1) HIV education, 2) voluntary HIV testing and counseling, 3) condom supply, 4) prevention of rape and sexual violence, 5) antiretroviral treatment for HIV-positive prisoners and 6) methadone maintenance treatment. During a first survey that was conducted between 2007 and 2009, new prisoners entered Banceuy Narcotics Prison were voluntary tested for HIV and HCV-infection after written informed consent was obtained. Information regarding sexual and injecting risk behavior and physical status were also recorded at admission to the prison. Participants who tested negative for both HIV and HCV during the first survey were included in a second survey conducted during 2008-2011. During both surveys, data on mortality among HIV-seropositive patients were also recorded. All HIV-seropositive participants receive treatment for HIV. HIV/ AIDS-related deaths decreased: 43% in 2006, 18% in 2007, 9% in 2008 and 0% in 2009. No HIV and HCV seroconversion inside Banceuy Narcotic Prison were found after a median of 23 months imprisonment (maximum follow-up: 38 months). Total of 484.8 person-years observation was done. Participants reported HIV transmission risk-behavior in Banceuy Prison during the second survey was low. After implementation of HIV prevention and treatment program, no new HIV or HCV cases were detected and HIV-related mortality decreased.

  2. Fieldale-Collinsville Middle School: Banishing Anonymity

    ERIC Educational Resources Information Center

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  3. Fatal ovarian hyperstimulation syndrome in an anonymous egg donor.

    PubMed

    Pooniya, Shashank; Behera, C; Mridha, A R; Bhardwaj, D N; Millo, Tabin

    2016-12-01

    Ovarian hyperstimulation syndrome is a rare, but potentially life-threatening iatrogenic disorder arising from ovulation induction or ovarian hyperstimulation for assisted reproduction techniques. We report a case of a 26-year-old multiparous woman, an anonymous egg donor, who died a few hours after undergoing a procedure to donate eggs at an in vitro fertilization clinic. Her husband alleged that medical negligence had led to her death. The autopsy confirmed death due to ovarian hyperstimulation syndrome. We know of no previous descriptions of fatal ovarian hyperstimulation syndrome in an anonymous egg donor in medico-legal literature. © The Author(s) 2016.

  4. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    ERIC Educational Resources Information Center

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  5. Subcutaneous narcotic infusions for cancer pain: treatment outcome and guidelines for use.

    PubMed

    Moulin, D E; Johnson, N G; Murray-Parsons, N; Geoghegan, M F; Goodwin, V A; Chester, M A

    1992-03-15

    To provide guidelines for the institution and maintenance of a continuous subcutaneous narcotic infusion program for cancer patients with chronic pain through an analysis of the narcotic requirements and treatment outcomes of patients who underwent such therapy and a comparison of the costs of two commonly used infusion systems. Retrospective study. Tertiary care facilities and patients' homes. Of 481 patients seen in consultation for cancer pain between July 1987 and April 1990, 60 (12%) met the eligibility criteria (i.e., standard medical management had failed, and they had adequate supervision at home). Continuous subcutaneous infusion with hydromorphone hydrochloride or morphine started on an inpatient basis and continued at home whenever possible. Patient selectivity, narcotic dosing requirements, discharge rate, patient preference for analgesic regimen, side effects, complications and cost-effectiveness. The mean initial maintenance infusion dose after dose titration was almost three times higher than the dose required before infusion (hydromorphone or equivalent 6.2 v. 2.1 mg/h). Eighteen patients died, and the remaining 42 were discharged home for a mean of 94.4 (standard deviation 128.3) days (extremes 12 and 741 days). The mean maximum infusion rate was 24.1 mg/h (extremes 0.5 and 180 mg/h). All but one of the patients preferred the infusion system to their previous oral analgesic regimen. Despite major dose escalations nausea and vomiting were well controlled in all cases. Twelve patients (20%) experienced serious systemic toxic effects or complications; six became encephalopathic, which necessitated dose reduction, five had a subcutaneous infection necessitating antibiotic treatment, and one had respiratory depression. The programmable computerized infusion pump was found to be more cost-effective than the disposable infusion device after a break-even point of 8 months. Continuous subcutaneous infusion of opioid drugs with the use of a portable

  6. Between control and hacker activism: the political actions of Anonymous Brasil.

    PubMed

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  7. In Defence of Anonymity: Rejoining the Criticism

    ERIC Educational Resources Information Center

    Kelly, Anthony

    2009-01-01

    This article is a response to the growing criticisms of the British Educational Research Association (BERA) and Economic and Social Research Council (ESRC) ethical guidelines on anonymity and pseudonymity as default positions for participants in qualitative educational research. It discusses and responds to those criticisms under four…

  8. Quantitative structure-toxicity relationship of the aquatic toxicity for various narcotic pollutants using the norm indexes.

    PubMed

    Wang, Qiang; Jia, Qingzhu; Yan, Lihong; Xia, Shuqian; Ma, Peisheng

    2014-08-01

    The aquatic toxicity value of hazardous contaminants plays an important role in the risk assessments of aquatic ecosystems. The following study presents a stable and accurate structure-toxicity relationship model based on the norm indexes for the prediction of toxicity value (log(LC50)) for 190 diverse narcotic pollutants (96 h LC50 data for Poecilia reticulata). Research indicates that this new model is very efficient and provides satisfactory results. The suggested prediction model is evidenced by R(2) (square correlation coefficient) and ARD (average relative difference) values of 0.9376 and 10.45%, respectively, for the training set, and 0.9264 and 13.90% for the testing set. Comparison results with reference models demonstrate that this new method, based on the norm indexes proposed in this work, results in significant improvements, both in accuracy and stability for predicting aquatic toxicity values of narcotic pollutants. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Yahtzee: An Anonymized Group Level Matching Procedure

    PubMed Central

    Jones, Jason J.; Bond, Robert M.; Fariss, Christopher J.; Settle, Jaime E.; Kramer, Adam D. I.; Marlow, Cameron; Fowler, James H.

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being “leaked” or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records. PMID:23441156

  10. Yahtzee: an anonymized group level matching procedure.

    PubMed

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  11. Component analysis of Iranian crack; a newly abused narcotic substance in iran.

    PubMed

    Farhoudian, Ali; Sadeghi, Mandana; Khoddami Vishteh, Hamid Reza; Moazen, Babak; Fekri, Monir; Rahimi Movaghar, Afarin

    2014-01-01

    Iranian crack is a new form of narcotic substance that has found widespread prevalence in Iran in the past years. Crack only nominally resembles crack cocaine as it is widely different in its clinical signs. Thus the present study aims to quantify the chemical combination of this drug. The samples included 18 specimen of Crack collected from different zones of Tehran, Iran. All specimens were in the form of inodorous cream solid powdery substance. TLC and HPLC methods were used to perform semi-quantitative and quantitative analysis of the components, respectively. The TLC analysis showed no cocaine compound in the specimens while they all revealed to contain heroin, codeine, morphine and caffeine. All but two specimens contained thebaine. None of the specimens contained amphetamine, benzodiazepines, tricyclic antidepressants, aspirin, barbiturates, tramadol and buprenorphine. Acetaminophen was found in four specimens. HPLC revealed heroin to be the foundation substance in all specimens and most of them contained a significant amount of acetylcodeine. The present analysis of the chemical combination of Crack showed that this substance is a heroin-based narcotic which is basically different from the cocaine-based crack used in Western countries. Studies like the present one at different time points, especially when abnormal clinical signs are detected, can reveal the chemical combination of the target substance and contribute to the clinical management of its acute or chronic poisoning.

  12. Attribute Utility Motivated k-anonymization of Datasets to Support the Heterogeneous Needs of Biomedical Researchers

    PubMed Central

    Ye, Huimin; Chen, Elizabeth S.

    2011-01-01

    In order to support the increasing need to share electronic health data for research purposes, various methods have been proposed for privacy preservation including k-anonymity. Many k-anonymity models provide the same level of anoymization regardless of practical need, which may decrease the utility of the dataset for a particular research study. In this study, we explore extensions to the k-anonymity algorithm that aim to satisfy the heterogeneous needs of different researchers while preserving privacy as well as utility of the dataset. The proposed algorithm, Attribute Utility Motivated k-anonymization (AUM), involves analyzing the characteristics of attributes and utilizing them to minimize information loss during the anonymization process. Through comparison with two existing algorithms, Mondrian and Incognito, preliminary results indicate that AUM may preserve more information from original datasets thus providing higher quality results with lower distortion. PMID:22195223

  13. Anonymization of Longitudinal Electronic Medical Records

    PubMed Central

    Tamersoy, Acar; Loukides, Grigorios; Nergiz, Mehmet Ercan; Saygin, Yucel; Malin, Bradley

    2013-01-01

    Electronic medical record (EMR) systems have enabled healthcare providers to collect detailed patient information from the primary care domain. At the same time, longitudinal data from EMRs are increasingly combined with biorepositories to generate personalized clinical decision support protocols. Emerging policies encourage investigators to disseminate such data in a deidentified form for reuse and collaboration, but organizations are hesitant to do so because they fear such actions will jeopardize patient privacy. In particular, there are concerns that residual demographic and clinical features could be exploited for reidentification purposes. Various approaches have been developed to anonymize clinical data, but they neglect temporal information and are, thus, insufficient for emerging biomedical research paradigms. This paper proposes a novel approach to share patient-specific longitudinal data that offers robust privacy guarantees, while preserving data utility for many biomedical investigations. Our approach aggregates temporal and diagnostic information using heuristics inspired from sequence alignment and clustering methods. We demonstrate that the proposed approach can generate anonymized data that permit effective biomedical analysis using several patient cohorts derived from the EMR system of the Vanderbilt University Medical Center. PMID:22287248

  14. Guide to Films (16mm) About the Use of Dangerous Drugs, Narcotics, Alcohol and Tobacco.

    ERIC Educational Resources Information Center

    1971

    About 230 films and 60 filmstrips dealing with drugs, narcotics, alcohol, and tobacco are synopsized. Approximately half the listings deal with alcohol, a quarter concern tobacco, and the rest deal with drugs. For each item, the length, year of release, and source where the film of filmstrip may be obtained is listed. The distributors identified…

  15. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    PubMed

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. © The Author 2016. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. Privacy Vulnerability of Published Anonymous Mobility Traces

    DOE PAGES

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; ...

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less

  17. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    PubMed

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  18. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    PubMed Central

    Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-01-01

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861

  19. Utility of Army Design Methodology in U.S. Coast Guard Counter Narcotic Interdiction Strategy

    DTIC Science & Technology

    2017-06-09

    UTILITY OF ARMY DESIGN METHODOLOGY IN U.S. COAST GUARD COUNTER NARCOTIC INTERDICTION STRATEGY A thesis presented to the...Thesis 3. DATES COVERED (From - To) AUG 2016 – JUN 2017 4. TITLE AND SUBTITLE Utility of Army Design Methodology in U.S. Coast Guard Counter...Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This study investigates the utility of using Army Design Methodology (ADM) to

  20. 14 CFR 137.23 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 137.23 Section 137.23 Aeronautics and Space FEDERAL AVIATION... drugs, marihuana, and depressant or stimulant drugs or substances. If the holder of a certificate issued...

  1. 14 CFR 137.23 - Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Carriage of narcotic drugs, marihuana, and depressant or stimulant drugs or substances. 137.23 Section 137.23 Aeronautics and Space FEDERAL AVIATION... drugs, marihuana, and depressant or stimulant drugs or substances. If the holder of a certificate issued...

  2. Anonymizing patient genomic data for public sharing association studies.

    PubMed

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  3. The influence of anonymous peers on prosocial behavior

    PubMed Central

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  4. The influence of anonymous peers on prosocial behavior.

    PubMed

    Park, Soowon; Shin, Jongho

    2017-01-01

    Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students' prosocial behavior were examined. A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates' prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  5. Utility-preserving transaction data anonymization with low information loss.

    PubMed

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  6. Utility-preserving transaction data anonymization with low information loss

    PubMed Central

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-01-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual’s record to their identity. Approaches that anonymize data by eliminating certain values in an individual’s record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers’ utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency. PMID:22563145

  7. Opiate-induced Changes in Brain Adenosine Levels and Narcotic Drug Responses

    PubMed Central

    Wu, Manhong; Sahbaie, Peyman; Zheng, Ming; Lobato, Robert; Boison, Detlev; Clark, J. David; Peltz, Gary

    2012-01-01

    We have very little information about the metabolomic changes that mediate neurobehavioral responses, including addiction. It was possible that opioid-induced metabolomic changes in brain could mediate some of the pharmacodynamic effects of opioids. To investigate this, opiate-induced brain metabolomic responses were profiled using a semi-targeted method in C57BL/6 and 129Sv1 mice, which exhibit extreme differences in their tendency to become opiate dependent. Escalating morphine doses (10–40 mg/kg) administered over a 4-day period selectively induced a two-fold decrease (p<0.00005) in adenosine abundance in the brainstem of C57BL/6 mice, which exhibited symptoms of narcotic drug dependence; but did not decrease adenosine abundance in 129Sv1 mice, which do not exhibit symptoms of dependence. Based on this finding, the effect of adenosine on dependence was investigated in genetically engineered mice with alterations in adenosine tone in the brain and in pharmacologic experiments. Morphine withdrawal behaviors were significantly diminished (P<0.0004) in genetically engineered mice with reduced adenosine tone in the brainstem, and by treatment with an adenosine receptor1 (A1) agonist (2-chloro-N6-cyclopentyladenosine, 0.5 mg/kg) or an A2a receptor (A2a) antagonist (SCH 58261 1 mg/kg). These results indicate that adenosine homeostasis plays a crucial role in narcotic drug responses. Opiate-induced changes in brain adenosine levels may explain many important neurobehavioral features associated with opiate addiction and withdrawal. PMID:23098802

  8. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    PubMed

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  9. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  10. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  11. A globally optimal k-anonymity method for the de-identification of health data.

    PubMed

    El Emam, Khaled; Dankar, Fida Kamal; Issa, Romeo; Jonker, Elizabeth; Amyot, Daniel; Cogo, Elise; Corriveau, Jean-Pierre; Walker, Mark; Chowdhury, Sadrul; Vaillancourt, Regis; Roffey, Tyson; Bottomley, Jim

    2009-01-01

    Explicit patient consent requirements in privacy laws can have a negative impact on health research, leading to selection bias and reduced recruitment. Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified. The authors developed and empirically evaluated a new globally optimal de-identification algorithm that satisfies the k-anonymity criterion and that is suitable for health datasets. Authors compared OLA (Optimal Lattice Anonymization) empirically to three existing k-anonymity algorithms, Datafly, Samarati, and Incognito, on six public, hospital, and registry datasets for different values of k and suppression limits. Measurement Three information loss metrics were used for the comparison: precision, discernability metric, and non-uniform entropy. Each algorithm's performance speed was also evaluated. The Datafly and Samarati algorithms had higher information loss than OLA and Incognito; OLA was consistently faster than Incognito in finding the globally optimal de-identification solution. For the de-identification of health datasets, OLA is an improvement on existing k-anonymity algorithms in terms of information loss and performance.

  12. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  13. Study to investigate the trace levels of contamination on surfaces when narcotic contraband is concealed in a vehicle

    NASA Astrophysics Data System (ADS)

    Wilson, Rod; Brittain, Alan H.

    1997-01-01

    When a vehicle is used to transport narcotic contraband material trace levels of that material can be found on surfaces of the vehicle, people associated with the vehicle and surface they contact. The detection of these trace levels can help to target vehicles associated with the smuggling of the contraband. A study to determine the typical levels of narcotic material that can be detected from these surfaces has been performed by personnel from Graseby, using a variety of drug materials. The size and packaging of the drug materials has been prepared to try to reflect that typically found in smuggling operations. These tests show that for all hard drugs easily detectable traces of drug material can be found on the vehicle, the proxy and secondary surfaces handled by the proxy. For detection of cannabis, the condition of the original material had a great bearing ont he reliability of detection.

  14. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  15. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  16. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    PubMed

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  17. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

    PubMed Central

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-01-01

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417

  18. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    ERIC Educational Resources Information Center

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  19. Attitudes and practice of genetic counselors regarding anonymous testing for BRCA1/2.

    PubMed

    Ader, Tammy; Susswein, Lisa R; Callanan, Nancy P; Evans, James P

    2009-12-01

    Patients and clinicians alike view anonymous testing as a potential way to avoid perceived risks of genetic testing such as insurance and employment discrimination and the potential loss of privacy. To assess their experience with and attitudes towards anonymous testing for BRCA1/2, genetic counselors were invited to complete an internet-based survey via the NSGC Familial Cancer Risk Counseling Special Interest Group (FCRC-SIG) listerv. A majority of the 115 respondents (70%) had received requests from patients for anonymous BRCA1/2 testing at some point in their careers and 43% complied with this request. Most counselors, however, encountered such requests infrequently, 1-5 times per year. Although genetic counselors do not generally encourage anonymous testing and over a third of respondents feel it should never be offered, a substantial subset support its use under specific circumstances. In general, a strong consensus exists among counselors that anonymous testing should not be offered routinely. In light of the current legislative landscape, it is of note that a substantial proportion of respondents (42.7%) cited the threat of life insurance discrimination as a reason for pursuing AT, and fewer cited health insurance (30.0%) or employment discrimination (29.1%) as justifications. Since there exists no federal legislative protections against discrimination by life insurance companies, it makes sense that genetic counselors were more responsive to this issue as opposed to the threat of discrimination in health insurance and employment.

  20. Infrared observations of anonymous IRC sources

    NASA Technical Reports Server (NTRS)

    Strecker, D. W.; Ney, E. P.

    1974-01-01

    Infrared (0.9 to 18 microns) observations of 232 anonymous 2-micron Sky survey (IRC) sources are reported. Most of the objects appear to be late-type stars with little or no long-wave excess. About ten percent exhibit large excesses. Thirty-one of the brightest 11-micron sources have been remeasured to determine variability. These brighter objects appear to fall into two groups; one group resembles NML Tauri, while the other is like NML Cygni.

  1. ARX - A Comprehensive Tool for Anonymizing Biomedical Data

    PubMed Central

    Prasser, Fabian; Kohlmayer, Florian; Lautenschläger, Ronald; Kuhn, Klaus A.

    2014-01-01

    Collaboration and data sharing have become core elements of biomedical research. Especially when sensitive data from distributed sources are linked, privacy threats have to be considered. Statistical disclosure control allows the protection of sensitive data by introducing fuzziness. Reduction of data quality, however, needs to be balanced against gains in protection. Therefore, tools are needed which provide a good overview of the anonymization process to those responsible for data sharing. These tools require graphical interfaces and the use of intuitive and replicable methods. In addition, extensive testing, documentation and openness to reviews by the community are important. Existing publicly available software is limited in functionality, and often active support is lacking. We present ARX, an anonymization tool that i) implements a wide variety of privacy methods in a highly efficient manner, ii) provides an intuitive cross-platform graphical interface, iii) offers a programming interface for integration into other software systems, and iv) is well documented and actively supported. PMID:25954407

  2. Towards Linking Anonymous Authorship in Casual Sexual Encounter Ads

    PubMed Central

    Fries, Jason A.; Segre, Alberto M.; Polgreen, Philip M.

    2013-01-01

    Objective This paper constructs an authorship-linked collection or corpus of anonymous, sex-seeking ads found on the classifieds website Craigslist. This corpus is then used to validate an authorship attribution approach based on identifying near duplicate text in ad clusters, providing insight into how often anonymous individuals post sex-seeking ads and where they meet for encounters. Introduction The increasing use of the Internet to arrange sexual encounters presents challenges to public health agencies formulating STD interventions, particularly in the context of anonymous encounters. These encounters complicate or break traditional interventions. In previous work [1], we examined a corpus of anonymous personal ads seeking sexual encounters from the classifieds website Craigslist and presented a way of linking multiple ads posted across time to a single author. The key observation of our approach is that some ads are simply reposts of older ads, often updated with only minor textual changes. Under the presumption that these ads, when not spam, originate from the same author, we can use efficient near-duplicate detection techniques to cluster ads within some threshold similarity. Linking ads in this way allows us to preserve the anonymity of authors while still extracting useful information on the frequency with which authors post ads, as well as the geographic regions in which they seek encounters. While this process detects many clusters, the lack of a true corpus of authorship-linked ads makes it difficult to validate and tune the parameters of our system. Fortunately, many ad authors provide an obfuscated telephone number in ad text (e.g., 867–5309 becomes 8sixseven5three oh nine) to bypass Craigslist filters, which prohibit including phone numbers in personal ads. By matching phone numbers of this type across all ads, we can create a corpus of ad clusters known to be written by a single author. This authorship corpus can then be used to evaluate and tune

  3. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    PubMed

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  4. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    ERIC Educational Resources Information Center

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  5. Gamete donation in France: the future of the anonymity doctrine.

    PubMed

    Brunet, Laurence; Kunstmann, Jean-Marie

    2013-02-01

    In France, since the approval of the first bioethics laws in 1994, the principle of the anonymity of sperm donors has prevailed. This choice is regularly challenged, namely by children who have been conceived under these conditions and have now reached adulthood. In this paper, we will briefly describe the reasons that led practitioners of assisted reproduction to endorse the anonymity principle in 1994. Secondly, we will elaborate on the reasons why this principle is becoming so controversial today. Finally, we shall examine two possible outcomes of the debate, highlighting their respective legitimacy as well as their consequences, as far as the rights of children, the notion of the family, and medical practice are concerned.

  6. Reduced postoperative pain scores and narcotic use favor per-oral endoscopic myotomy over laparoscopic Heller myotomy.

    PubMed

    Docimo, Salvatore; Mathew, Abraham; Shope, Alexander J; Winder, Joshua S; Haluck, Randy S; Pauli, Eric M

    2017-02-01

    Per-oral endoscopic myotomy (POEM) is a less invasive therapy for achalasia with a shorter hospitalization but with similar short- and long-term outcomes as a laparoscopic Heller myotomy (LHM). Previous literature comparing POEM to LHM has focused primarily on postoperative outcome parameters such as complications, dysphagia scores and gastro-esophageal reflux severity. This study specifically compares postoperative pain following POEM to pain following LHM, the current gold-standard operation. A retrospective review of all patients undergoing POEM or LHM for achalasia was performed from 2006 to 2015. Data collection included demographics, comorbidities, length of stay (LOS) and pain scores (arrival to the recovery room, 1 h postoperative, average first 24 h and upon discharge). Statistical analysis was performed using Student's t test and Chi-square test. Forty-four POEM patients and 122 LHM patients were identified. The average age (52.2 ± 20.75 vs 50.9 ± 17.89 years, p = 0.306) and BMI (28.1 ± 7.62 vs 27.6 ± 7.07 kg/m 2 , p = 0.824) did not differ between the POEM and LHM groups, respectively; however, the American Society of Anesthesiology scores were higher in the POEM patients (2.43 ± 0.62 vs 2.11 ± 0.71, p = 0.011). There were no differences in rates of smoking, diabetes, cardiac disease or pulmonary disease. The average pain scores upon arrival to the recovery room and 1 h postoperatively were lower in the POEM group (2.3 ± 3.014 vs 3.61 ± 3 0.418, p = 0.025 and 2.2 ± 2.579 vs 3.46 ± 3.063, p = 0.034, respectively). There was no difference in the average pain score over the first 24 h (2.7 ± 2.067 vs 3.29 ± 1.980, p = 0.472) or at the time of discharge (1.6 ± 2.420 vs 2.09 ± 2.157, p = 0.0657) between the POEM and LHM groups. After standardizing opioid administration against 10 mg of oral morphine, the POEM group used significantly less narcotics that the LHM group (35.8 vs 101.8 mg, p < 0

  7. Medical document anonymization with a semantic lexicon.

    PubMed Central

    Ruch, P.; Baud, R. H.; Rassinoux, A. M.; Bouillon, P.; Robert, G.

    2000-01-01

    We present an original system for locating and removing personally-identifying information in patient records. In this experiment, anonymization is seen as a particular case of knowledge extraction. We use natural language processing tools provided by the MEDTAG framework: a semantic lexicon specialized in medicine, and a toolkit for word-sense and morpho-syntactic tagging. The system finds 98-99% of all personally-identifying information. PMID:11079980

  8. Recent advances in immunosensor for narcotic drug detection

    PubMed Central

    Gandhi, Sonu; Suman, Pankaj; Kumar, Ashok; Sharma, Prince; Capalash, Neena; Suri, C. Raman

    2015-01-01

    Introduction: Immunosensor for illicit drugs have gained immense interest and have found several applications for drug abuse monitoring. This technology has offered a low cost detection of narcotics; thereby, providing a confirmatory platform to compliment the existing analytical methods. Methods: In this minireview, we define the basic concept of transducer for immunosensor development that utilizes antibodies and low molecular mass hapten (opiate) molecules. Results: This article emphasizes on recent advances in immunoanalytical techniques for monitoring of opiate drugs. Our results demonstrate that high quality antibodies can be used for immunosensor development against target analyte with greater sensitivity, specificity and precision than other available analytical methods. Conclusion: In this review we highlight the fundamentals of different transducer technologies and its applications for immunosensor development currently being developed in our laboratory using rapid screening via immunochromatographic kit, label free optical detection via enzyme, fluorescence, gold nanoparticles and carbon nanotubes based immunosensing for sensitive and specific monitoring of opiates. PMID:26929925

  9. [Evaluation of color perception in individuals addicted to narcotic substances in the Farnsworth-Munsell 100-Hue test].

    PubMed

    Nadolska, Krystyna; Goś, Roman

    2016-12-22

    The aim of the study was to assess color perception in the Farnsworth-Munsell 100-Hue test in individuals addicted to narcotic substances, and to analyze the acquired color vision disorders, depending on the duration of addiction and abstinence. Ninety-five persons were qualified for the study. All the subjects were divided into 3 groups. Group I (drug addicts) comprised 45 individuals addicted to narcotic substances and nicotine. Group II (smokers) consisted of 30 individuals addicted only to nicotine, and group III (abstinents) included 20 individuals free of addictions. In all the study groups anamnesis, survey, standard ophthalmological examination and the Farnsworth-Munsell 100-Hue test were performed. In the Farnsworth-Munsell 100-Hue test the mean values of total error score (TES) for the purposes of the analysis, expressed in the values of square root (√TES), proved to be significantly higher in group I than in the two other groups (p < 0.001). In group I, the √TES values exceeding critical values of age norms occurred significantly more frequently than in groups II (p < 0.01) and III (p < 0.05). A positive correlation between duration of addiction and the √TES values was indicated (ρ = 0.234, p < 0.05). The longer was the period of abstinence, the lower were the √TES values, indicating the improved ability to distinguish between colors. The Farnsworth-Munsell 100-Hue test proved useful in the detection and assessment of acquired dyschromatopsy induced by narcotic substances. The observed disorders appeared to be dependent on the duration of addiction and abstinence. Med Pr 2016;67(6):777-785. This work is available in Open Access model and licensed under a CC BY-NC 3.0 PL license.

  10. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  11. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Kuhn, Klaus A

    2015-12-01

    With the ARX data anonymization tool structured biomedical data can be de-identified using syntactic privacy models, such as k-anonymity. Data is transformed with two methods: (a) generalization of attribute values, followed by (b) suppression of data records. The former method results in data that is well suited for analyses by epidemiologists, while the latter method significantly reduces loss of information. Our tool uses an optimal anonymization algorithm that maximizes output utility according to a given measure. To achieve scalability, existing optimal anonymization algorithms exclude parts of the search space by predicting the outcome of data transformations regarding privacy and utility without explicitly applying them to the input dataset. These optimizations cannot be used if data is transformed with generalization and suppression. As optimal data utility and scalability are important for anonymizing biomedical data, we had to develop a novel method. In this article, we first confirm experimentally that combining generalization with suppression significantly increases data utility. Next, we proof that, within this coding model, the outcome of data transformations regarding privacy and utility cannot be predicted. As a consequence, existing algorithms fail to deliver optimal data utility. We confirm this finding experimentally. The limitation of previous work can be overcome at the cost of increased computational complexity. However, scalability is important for anonymizing data with user feedback. Consequently, we identify properties of datasets that may be predicted in our context and propose a novel and efficient algorithm. Finally, we evaluate our solution with multiple datasets and privacy models. This work presents the first thorough investigation of which properties of datasets can be predicted when data is anonymized with generalization and suppression. Our novel approach adopts existing optimization strategies to our context and combines different

  12. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  13. Recipient screening in IVF: first data from women undergoing anonymous oocyte donation in Dublin.

    PubMed

    Walsh, Anthony P H; Omar, Ahmed B; Marron, Kevin D; Walsh, David J; Salma, Umme; Sills, E Scott

    2011-04-20

    Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  14. Role of Self-help Group in Substance Addiction Recovery

    NASA Astrophysics Data System (ADS)

    Das, Prangya Paramita Priyadarshini

    2012-11-01

    Background: The Narcotics Anonymous (NA)/Alcoholic Anonymous(AA) is based on the philosophy of self-help, where the former addicts and recovering addicts share experiences, provide emotional support and do active monitoring through mentoring. In mentoring, a former addict with longer duration of drug-free life acts as a guide to the newly recovering addict. Objective: The objective was to study the effect of involvement in self help group upon addictís level of depression, functional social support, and anxiety. Method: The size of the sample was 60. 30 addicts were taken from rehabilitation centre and 30 were taken from self-help groups. ANOVA was used to analyze the result. Result: In all the criteria it was found that there exists a significant impact of Self-help group. Conclusion: Self-help group provide clients with a social network of individuals with similar problems and experiences, since most of these individuals may be isolated from society due to the social stigma attached to their addictions. The transition from being help recipients to being helpers enables recovering addicts to build their self-confidence and feelings of being wanted and desired in society, which facilitates their self-confidence and positive self-esteem.

  15. The Efficacy of Non-Anonymous Measures of Bullying

    ERIC Educational Resources Information Center

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  16. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    PubMed Central

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR. PMID:24605060

  17. Experience in the use of hyperspectral data for the detection of vegetation containing narcotic substances

    NASA Astrophysics Data System (ADS)

    Sedelnikov, V. P.; Lukashevich, E. L.; Karpukhina, O. A.

    2014-12-01

    This paper provides the characteristics of an experimental sample of a hyperspectral videospectrometer Sokol-SCP and presents examples of the hyperspectral data received as a result of flight tests. The results of the detection of vegetation containing narcotic substances by spectral attributes using the obtained hyperspectral information are considered. The opportunity for using the hyperspectral data for detection of cannabis and papaver sites, including those in mixed crops with masking vegetation, is confirmed.

  18. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

    NASA Astrophysics Data System (ADS)

    Kisilevich, Slava; Elovici, Yuval; Shapira, Bracha; Rokach, Lior

    k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it difficult to re-identify the individual. Thus k-anonymity works on a set of quasi-identifiers (public sensitive attributes), whose possible availability and linking is anticipated from external dataset, and demands that the released dataset will contain at least k records for every possible quasi-identifier value. Another aspect of k is its capability of maintaining the truthfulness of the released data (unlike other existing methods). This is achieved by generalization, a primary technique in k-anonymity. Generalization consists of generalizing attribute values and substituting them with semantically consistent but less precise values. When the substituted value doesn’t preserve semantic validity the technique is called suppression which is a private case of generalization. We present a hybrid approach called compensation which is based on suppression and swapping for achieving privacy. Since swapping decreases the truthfulness of attribute values there is a tradeoff between level of swapping (information truthfulness) and suppression (information loss) incorporated in our algorithm.

  19. Doctor Anonymous: Creating Contexts for Homosexuality as Mental Illness.

    PubMed

    Glass, Guy Fredrick

    2018-03-01

    In this essay, the author describes how he faced institutionalized homophobia during his psychiatric training, and how he later wrote a play inspired by the life of a gay psychiatrist. Despite Freud's supportive stance, homosexuality aroused the antipathy of American organized psychiatry and psychoanalysis and came to be listed as an illness in the Diagnostic and Statistical Manual (DSM). Dr. John E. Fryer outed himself as "Dr. H Anonymous" at a 1972 meeting of the American Psychiatric Association, and the next year homosexuality was removed from the DSM. The 2014 play Doctor Anonymous offers a fictionalized account of this watershed moment in the history of the gay rights movement. The author discusses his own psychotherapeutic work with gay male patients, including those who had previously been treated with conversion therapy, and explores how the play mirrors his own life experience and the experience of his patients.

  20. 41 CFR 102-74.400 - What is the policy concerning the possession and use of narcotics and other drugs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the policy concerning the possession and use of narcotics and other drugs? 102-74.400 Section 102-74.400 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL...

  1. The Impact of Anonymization for Automated Essay Scoring

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  2. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  3. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    ERIC Educational Resources Information Center

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    PubMed Central

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  5. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.

    PubMed

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-11-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users' network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders' or receivers' identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  6. Who Goes There? Staying Anonymous on the Internet

    ERIC Educational Resources Information Center

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  7. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.

    PubMed

    Zhang, Haitao; Wu, Chenxue; Chen, Zewei; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non

  8. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

    PubMed Central

    Wu, Chenxue; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non

  9. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    PubMed

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  10. Dissent in Numbers: Making Strong Anonymity Scale

    DTIC Science & Technology

    2012-10-01

    40,56,57,59], as an AAAS conference in 1997 concluded: “Anonymous Communication Should Be Re- garded as a Strong Human Right ; In the United States It...Is Also a Constitutional Right ” [56] The Arab Spring underscored the importance of this right , as organizers used pseudonymous Facebook and Twitter...with strong security requirements, might find a few extra seconds per Web page a reasonable price for local-area security. 6 Conclusion This paper has

  11. Comparison of results for morphine urinalyses by radioimmunoassay and thin-layer chromatography in a narcotic clinic setting.

    PubMed

    Kokoski, R J; Jain, M

    1975-03-01

    Radioimmunoassay (RIA) and thin-layer chromatography (TLC) were compared for morphine detection in an actual narcotic clinic setting. A choice of urines from all those screened by TLC allowed a critical comparison as to actual use or non-use of narcotic drugs, rather than a sampling at random in which the question of possible false positives or negatives cannot be conclusively answered. Although RIA is more sensitive than TLC, its advantage is apparent only in those cases where urine specimens are difficult to obtain frequently regularly or where the use of morphine is suspected by the positive identification of quinine in urine that was morphine-negative by TLC. In a selected group of negative and positive specimens chosen without conscious bias, the two methods gave consistently similar results, indicating that the modified TLC method provided a few or no false positives or negatives if the negatives were from those cases that were not positive anytime up to 3-4 days before urine collection. We conclude that RIA can be of significant value as a supplement to a TLC screening program, without sacrificing the many advantages that TLC has to offer.

  12. United States Counter-narcotics Policies towards Burma, and How the Illegal Myanmar Regime is Manipulating Those Policies to Commit Ethnic Genocide

    DTIC Science & Technology

    2006-06-01

    minority, insurgent, Southeast Asia, ASEAN, UN, United Nations, United Nations Security Council, Shan, Karen, Wa, yaa baa, methamphetamine , illicit... Methamphetamines ............................................................................63 B. ILLICT NARCOTIC TRANSPORTATION...129 x THIS PAGE INTENTIONALLY LEFT BLANK xi LIST OF FIGURES Figure 1. British Conquests

  13. Development of a computerized monitoring program to identify narcotic diversion in a pediatric anesthesia practice.

    PubMed

    Brenn, B Randall; Kim, Margaret A; Hilmas, Elora

    2015-08-15

    Development of an operational reporting dashboard designed to correlate data from multiple sources to help detect potential drug diversion by automated dispensing cabinet (ADC) users is described. A commercial business intelligence platform was used to create a dashboard tool for rapid detection of unusual patterns of ADC transactions by anesthesia service providers at a large pediatric hospital. By linking information from the hospital's pharmacy information management system (PIMS) and anesthesia information management system (AIMS) in an associative data model, the "narcotic reconciliation dashboard" can generate various reports to help spot outlier activity associated with ADC dispensing of controlled substances and documentation of medication waste processing. The dashboard's utility was evaluated by "back-testing" the program with historical data on an actual episode of diversion by an anesthesia provider that had not been detected through traditional methods of PIMS and AIMS data monitoring. Dashboard-generated reports on key metrics (e.g., ADC transaction counts, discrepancies in dispensed versus reconciled amounts of narcotics, PIMS-AIMS documentation mismatches) over various time frames during the period of known diversion clearly indicated the diverter's outlier status relative to other authorized ADC users. A dashboard program for correlating ADC transaction data with pharmacy and patient care data may be an effective tool for detecting patterns of ADC use that suggest drug diversion. Copyright © 2015 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  14. Experimental comparisons of face-to-face and anonymous real-time team competition in a networked gaming learning environment.

    PubMed

    Yu, Fu-Yun; Han, Chialing; Chan, Tak-Wai

    2008-08-01

    This study investigates the impact of anonymous, computerized, synchronized team competition on students' motivation, satisfaction, and interpersonal relationships. Sixty-eight fourth-graders participated in this study. A synchronous gaming learning system was developed to have dyads compete against each other in answering multiple-choice questions set in accordance with the school curriculum in two conditions (face-to-face and anonymous). The results showed that students who were exposed to the anonymous team competition condition responded significantly more positively than those in the face-to-face condition in terms of motivation and satisfaction at the 0.050 and 0.056 levels respectively. Although further studies regarding the effects of anonymous interaction in a networked gaming learning environment are imperative, the positive effects detected in this preliminary study indicate that anonymity is a viable feature for mitigating the negative effects that competition may inflict on motivation and satisfaction as reported in traditional face-to-face environments.

  15. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    ERIC Educational Resources Information Center

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  16. Scalable Anonymous Group Communication in the Anytrust Model

    DTIC Science & Technology

    2012-04-10

    Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University...12th KDD, Aug. 2006. [10] D. Chaum . Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), Feb...1981. [11] D. Chaum . The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65–75, Jan. 1988

  17. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  18. A Context-sensitive Approach to Anonymizing Spatial Surveillance Data: Impact on Outbreak Detection

    PubMed Central

    Cassa, Christopher A.; Grannis, Shaun J.; Overhage, J. Marc; Mandl, Kenneth D.

    2006-01-01

    Objective: The use of spatially based methods and algorithms in epidemiology and surveillance presents privacy challenges for researchers and public health agencies. We describe a novel method for anonymizing individuals in public health data sets by transposing their spatial locations through a process informed by the underlying population density. Further, we measure the impact of the skew on detection of spatial clustering as measured by a spatial scanning statistic. Design: Cases were emergency department (ED) visits for respiratory illness. Baseline ED visit data were injected with artificially created clusters ranging in magnitude, shape, and location. The geocoded locations were then transformed using a de-identification algorithm that accounts for the local underlying population density. Measurements: A total of 12,600 separate weeks of case data with artificially created clusters were combined with control data and the impact on detection of spatial clustering identified by a spatial scan statistic was measured. Results: The anonymization algorithm produced an expected skew of cases that resulted in high values of data set k-anonymity. De-identification that moves points an average distance of 0.25 km lowers the spatial cluster detection sensitivity by less than 4% and lowers the detection specificity less than 1%. Conclusion: A population-density–based Gaussian spatial blurring markedly decreases the ability to identify individuals in a data set while only slightly decreasing the performance of a standardly used outbreak detection tool. These findings suggest new approaches to anonymizing data for spatial epidemiology and surveillance. PMID:16357353

  19. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    PubMed Central

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-01-01

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN. PMID:25763649

  20. Using PANDA (Preventing the Abuse of Tobacco, Narcotics, Drugs, and Alcohol) in a Baltimore City Head Start Setting: A Preliminary Study.

    ERIC Educational Resources Information Center

    Belcher, Harolyn M. E.; Lockhart, Paula J.; Perkins-Parks, Susan; McNally, Margaret

    2000-01-01

    Describes an evaluation of a substance abuse prevention curriculum, Preventing the Abuse of Tobacco, Narcotics, Drugs, and Alcohol (PANDA), taught to African American Head Start preschool students, examining changes in children's self-concept following participation. Overall, students demonstrated significantly improved self-concept, and PANDA…

  1. Anonymously Productive and Socially Engaged While Learning at Work

    ERIC Educational Resources Information Center

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  2. A Quantitative Study on Anonymity and Professionalism within an Online Free Open Access Medical Education Community

    PubMed Central

    Gubert, Andrea; Miller, Amanda B; Thoma, Brent; Chan, Teresa

    2016-01-01

    The increasing use of social media to share knowledge in medical education has led to concerns about the professionalism of online medical learners and physicians. However, there is a lack of research on the behavior of professionals within open online discussions. In 2013, the Academic Life in Emergency Medicine website (ALiEM.com) launched a series of moderated online case discussions that provided an opportunity to explore the relationship between anonymity and professionalism. Comments from 12 case discussions conducted over a one-year period were analyzed using modified scales of anonymity and professionalism derived by Kilner and Hoadley. Descriptive statistics and Spearman calculations were conducted for the professionalism score, anonymity score, and level of participation. No correlation was found between professionalism and anonymity scores (rho = -0.004, p = 0.97). However, the number of comments (rho = 0.35, p < 0.01) and number of cases contributed to (rho = 0.26, p < 0.05) correlated positively with clear identification. Our results differed from previous literature, the majority of which found anonymity associated with unprofessionalism. We believe that this may be a result of the fostering of a professional environment through the use of a website with a positive reputation, the modelling of respectful behaviour by the moderators, the norms of the broader online community, and the pre-specified objectives for each discussion.  PMID:28638746

  3. A Quantitative Study on Anonymity and Professionalism within an Online Free Open Access Medical Education Community.

    PubMed

    Dimitri, Daneilla; Gubert, Andrea; Miller, Amanda B; Thoma, Brent; Chan, Teresa

    2016-09-18

    The increasing use of social media to share knowledge in medical education has led to concerns about the professionalism of online medical learners and physicians. However, there is a lack of research on the behavior of professionals within open online discussions. In 2013, the Academic Life in Emergency Medicine website (ALiEM.com) launched a series of moderated online case discussions that provided an opportunity to explore the relationship between anonymity and professionalism. Comments from 12 case discussions conducted over a one-year period were analyzed using modified scales of anonymity and professionalism derived by Kilner and Hoadley. Descriptive statistics and Spearman calculations were conducted for the professionalism score, anonymity score, and level of participation. No correlation was found between professionalism and anonymity scores (rho = -0.004, p = 0.97). However, the number of comments (rho = 0.35, p < 0.01) and number of cases contributed to (rho = 0.26, p < 0.05) correlated positively with clear identification. Our results differed from previous literature, the majority of which found anonymity associated with unprofessionalism. We believe that this may be a result of the fostering of a professional environment through the use of a website with a positive reputation, the modelling of respectful behaviour by the moderators, the norms of the broader online community, and the pre-specified objectives for each discussion.

  4. Comparative effectiveness of minimally invasive versus open transforaminal lumbar interbody fusion: 2-year assessment of narcotic use, return to work, disability, and quality of life.

    PubMed

    Adogwa, Owoicho; Parker, Scott L; Bydon, Ali; Cheng, Joseph; McGirt, Matthew J

    2011-12-01

    Retrospective cohort comparison between minimally invasive (MIS) and open transforaminal lumbar interbody fusion (TLIF). To assess 2 earlier unstudied endpoints (duration of narcotic use and return to work) and long-term pain, disability, and quality of life (QOL) for MIS-TLIF versus open-TLIF. MIS-TLIF for lumbar spondylolithesis theoretically allows for surgical treatment of back and leg pain while minimizing blood loss and tissue injury. Although earlier studies have shown shorter hospital stay and equivocal 6 and 24 month outcomes with MIS-TLIF versus open-TLIF, the effect of MIS techniques on postoperative narcotic use and return to work are poorly understood. Thirty patients undergoing MIS-TLIF (n = 15) or open-TLIF (n = 15) for grade I degenerative spondylolithesis-associated back and leg pain were enrolled. Two-year outcomes were assessed through phone interview and it included pain [visual analog scale (VAS)], low-back disability (Oswestry disability index), EuroQol-5D, occupational disability, and narcotic use. MIS-TLIF versus open-TLIF cohorts were similar at baseline. Median [interquartile range (IQR)] length of hospitalization after surgery was significantly less for MIS-TLIF versus open-TLIF [3 (3 to 3) vs 5.5 (4 to 6) d], P = 0.001. MIS-TLIF versus open-TLIF patients showed similar 2-year improvement in VAS for back pain, VAS for leg pain, Oswestry disability index, and EuroQol-5D scores. Overall, median (IQR) length of postoperative narcotic use was 3.0 (1.4 to 4.6) weeks and significantly shorter for MIS-TLIF versus open-TLIF patients [2.0 (1.0 to 3.0) vs 4.0 (1.4 to 4.6) wk, P = 0.008]. Overall, median (IQR) time to return to work was 13.9 (2.2 to 25.5) weeks and significantly shorter for MIS-TLIF versus open-TLIF patients [8.5 (4.4 to 21.4) vs 17.1 (1.8 to 35.9) wk, P = 0.02]. Both MIS-TLIF and open-TLIF provide long-term improvement in pain, disability, and EuroQol-5D in patients with back and leg pain from grade I degenerative spondylolithesis

  5. [Encryption technique for linkable anonymizing].

    PubMed

    Okamoto, Etsuji

    2004-06-01

    Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However

  6. Oral History Research Ethics: Should Anonymity and Confidentially Issues Be Dealt with on Their Own Merit?

    ERIC Educational Resources Information Center

    Le Roux, C.

    2015-01-01

    A primary principle of ethical codes in research involving people is that of informed consent which ensures participants' right to privacy, confidentiality and anonymity. A blanket application of the principle of anonymity to Oral History (OH) research could well be counterproductive to the purported aims of OH research. The research comprised a…

  7. Ultra-Trace and Vapor Detection of Explosives and Narcotics Finalist for R&D 100 Award

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ewing, Robert

    An instrument more sensitive than a canine’s nose identifies explosives and narcotics vapors in real time and at levels previously undetectable than any other sampling technology. The instrument is one among five PNNL-developed technologies in the running for an R&D 100 Award. Known as VP-IDENT, the tool coupled with a mass spectrometer, is ideal for aviation security, cargo screening, and broader counter-terrorism and national security activities where discovering dangerous substances is of utmost importance. Listen as researcher Robert Ewing explains.

  8. Application of EU tissue and cell directive screening protocols to anonymous oocyte donors in western Ukraine: data from an Irish IVF programme.

    PubMed

    Walsh, A P H; Omar, A B; Collins, G S; Murray, G U; Walsh, D J; Salma, U; Sills, E Scott

    2010-01-01

    Anonymous oocyte donation in the EU proceeds only after rigorous screening designed to ensure gamete safety. If anonymous donor gametes originating from outside EU territory are used by EU patients, donor testing must conform to the same standards as if gamete procurement had occurred in the EU. In Ireland, IVF recipients can be matched to anonymous donors in the Ukraine (a non-EU country). This investigation describes the evolution of anonymous oocyte donor screening methods during this period and associated results. Data were reviewed for all participants in an anonymous donor oocyte IVF programme from 2006 to 2009, when testing consistent with contemporary EU screening requirements was performed on all Ukrainian oocyte donors. HIV and hepatitis tests were aggregated from 314 anonymous oocyte donors and 265 recipients. The results included 5,524 Ukrainian women who were interviewed and 314 of these entered the programme (5.7% accession rate). Mean age of anonymous oocyte donors was 27.9 years; all had achieved at least one delivery. No case of hepatitis or HIV was detected at initial screening or at oocyte procurement. This is the first study of HIV and hepatitis incidence specifically among Ukrainian oocyte donors. We find anonymous oocyte donors to be a low-risk group, despite a high background HIV rate. Following full disclosure of the donation process, most Ukrainian women wishing to volunteer as anonymous oocyte donors do not participate. Current EU screening requirements appear adequate to maintain patient safety in the context of anonymous donor oocyte IVF.

  9. 18. Historic American Buildings Survey. Portion of an anonymous watercolor ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Historic American Buildings Survey. Portion of an anonymous watercolor painting of Fort McHenry bombardment of 1814. Peale Museum, Baltimore. View of southeast bastion and sally port. - Fort McHenry National Monument & Historic Shrine, East Fort Avenue at Whetstone Point, Baltimore, Independent City, MD

  10. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    ERIC Educational Resources Information Center

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  11. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  12. Impact of body mass index on surgical outcomes, narcotics consumption, and hospital costs following anterior cervical discectomy and fusion.

    PubMed

    Narain, Ankur S; Hijji, Fady Y; Haws, Brittany E; Kudaravalli, Krishna T; Yom, Kelly H; Markowitz, Jonathan; Singh, Kern

    2018-02-01

    OBJECTIVE Given the increasing prevalence of obesity, more patients with a high body mass index (BMI) will require surgical treatment for degenerative spinal disease. In previous investigations of lumbar spine pathology, obesity has been associated with worsened postoperative outcomes and increased costs. However, few studies have examined the association between BMI and postoperative outcomes following anterior cervical discectomy and fusion (ACDF) procedures. Thus, the purpose of this study was to compare surgical outcomes, postoperative narcotics consumption, complications, and hospital costs among BMI stratifications for patients who have undergone primary 1- to 2-level ACDF procedures. METHODS The authors retrospectively reviewed a prospectively maintained surgical database of patients who had undergone primary 1- to 2-level ACDF for degenerative spinal pathology between 2008 and 2015. Patients were stratified by BMI as follows: normal weight (< 25.0 kg/m 2 ), overweight (25.0-29.9 kg/m 2 ), obese I (30.0-34.9 kg/m 2 ), or obese II-III (≥ 35.0 kg/m 2 ). Differences in patient demographics and preoperative characteristics were compared across the BMI cohorts using 1-way ANOVA or chi-square analysis. Multivariate linear or Poisson regression with robust error variance was used to determine the presence of an association between BMI category and narcotics utilization, improvement in visual analog scale (VAS) scores, incidence of complications, arthrodesis rates, reoperation rates, and hospital costs. Regression analyses were controlled for preoperative demographic and procedural characteristics. RESULTS Two hundred seventy-seven patients were included in the analysis, of whom 20.9% (n = 58) were normal weight, 37.5% (n = 104) were overweight, 24.9% (n = 69) were obese I, and 16.6% (n = 46) were obese II-III. A higher BMI was associated with an older age (p = 0.049) and increased comorbidity burden (p = 0.001). No differences in sex, smoking status, insurance

  13. Nursing lives in the blogosphere: A thematic analysis of anonymous online nursing narratives.

    PubMed

    Castro, Aimee; Andrews, Gavin

    2018-02-01

    The aim of this study was to explore the work-life narratives of nurses through a thematic analysis of the nursing accounts they post in their publicly accessible, anonymous blogs. Many nurses participate on social media. Blogs have been advocated as a self-reflective tool in nursing practice, yet as far as the authors are aware, no previous studies have explored nurses' individual blogs for their potential to reveal nurses' perceptions of nursing work. The research design was qualitative description. Between May-August 2015, Internet search engines were used to discover lists of nursing blogs recommended by organizations representing nurses' interests. Recommended blogs were purposively sampled. Four anonymous blogs written by nurses from different nursing specialties met the sampling criteria. All 520 of their entries from 2014 were read and copied into NVivo 10, where an inductive coding process was followed. Three major themes arose in these nurses' online discussions of their work lives: they truly care about and value their nursing work, but they are feeling stressed and burnt out and they are using their anonymous blogs to share factors that frustrate them in their nursing work. Three main areas of frustration were revealed: teamwork problems, challenging patients and families, and management issues. Anonymous nursing blogs offer valuable, longitudinal insights into nurses' perceptions of their work lives. Nursing blogs should be further explored for ongoing insights into nurses' experiences of nursing work, as well as nurses' recommendations for addressing issues causing them to feel frustrated in their work environments. © 2017 John Wiley & Sons Ltd.

  14. Ultra-Trace and Vapor Detection of Explosives and Narcotics Finalist for R&D 100 Award

    ScienceCinema

    Ewing, Robert

    2018-06-13

    An instrument more sensitive than a canine’s nose identifies explosives and narcotics vapors in real time and at levels previously undetectable than any other sampling technology. The instrument is one among five PNNL-developed technologies in the running for an R&D 100 Award. Known as VP-IDENT, the tool coupled with a mass spectrometer, is ideal for aviation security, cargo screening, and broader counter-terrorism and national security activities where discovering dangerous substances is of utmost importance. Listen as researcher Robert Ewing explains.

  15. Assessment of types of synthetic cannabinoids in narcotic cases assessed by the Council of Forensic Medicine between 2011-2015, Ankara, Turkey.

    PubMed

    Göl, Ersin; Çok, İsmet

    2017-11-01

    Synthetic cannabinoids mimic the effects of cannabis and are the largest and fastest growing class of newly appearing designer drugs. Reports have revealed that various types of synthetic cannabinoids are mixed with herbal substances. The present study investigated the herbal substance cases involving synthetic cannabinoids in Ankara and nearby cities in Turkey. Data were collected from the reports of synthetic cannabinoids that were analyzed between January 01, 2011 and December 31, 2015 in the Ankara Narcotic Department of the Council of Forensic Medicine at the request of the judicial authorities. In all, 4610 narcotic reports were obtained and reviewed. Among these narcotic reports during the period, 370 reports (8%) were related to synthetic cannabinoids. 28 synthetic cannabinoid compounds could be identified in herbals: 5-F-AB-PINACA, 5-F-AKB-48, 5-F-NNEI, 5-F-PB-22, AB-CHMINACA, AB-FUBINACA, AB-PINACA, ADB-CHMINACA, ADB-FUBINACA, AKB-48, AM-2201, EAM-2201, JWH-018, JWH-022, JWH-031, JWH-122, JWH-201, JWH-210, JWH-250, JWH-251, JWH-307, MAM-2201, NM-2201, PB-22, RCS-4, THJ-2201, UR-144, XLR-11. The amount of herbals was 30.72g, 329.22g, 665.89g, 4844.7g, and 5684.3g in 2011, 2012, 2013, 2014, and 2015, respectively. Generally, herbals contained more than one synthetic cannabinoids. ADB-FUBINACA was the most common synthetic cannabinoid among the herbals determined in this study, which was 3132.43g, excepting multi-synthetic cannabinoid herbals. The amount and diversity of synthetic cannabinoid compounds have increased dramatically between 2011 and 2015. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Narcotics reduction, quality and safety in gynecologic oncology surgery in the first year of enhanced recovery after surgery protocol implementation.

    PubMed

    Bergstrom, Jennifer E; Scott, Marla E; Alimi, Yewande; Yen, Ting-Tai; Hobson, Deborah; Machado, Karime K; Tanner, Edward J; Fader, Amanda N; Temkin, Sarah M; Wethington, Stephanie; Levinson, Kimberly; Sokolinsky, Sam; Lau, Brandyn; Stone, Rebecca L

    2018-06-01

    Enhanced Recovery After Surgery (ERAS) programs are mechanisms for achieving value-based improvements in surgery. This report provides a detailed analysis of the impact of an ERAS program on patient outcomes as well as quality and safety measures during implementation on a gynecologic oncology service at a major academic medical center. A retrospective review of gynecologic oncology patients undergoing elective laparotomy during the implementation phase of an ERAS program (January 2016 through December 2016) was performed. Patient demographics, surgical variables, postoperative outcomes, and adherence to core safety measures, including antimicrobial and venous thromboembolism (VTE) prophylaxis, were compared to a historical patient cohort (January 2015 through December 2015). Statistical analyses were performed using t-tests, Wilcoxon rank sum tests, and Chi squared tests. The inaugural 109 ERAS program participants were compared to a historical patient cohort (n=158). There was no difference in BMI, race, malignancy, or complexity of procedure between cohorts. ERAS patients required less narcotics (70.7 vs 127.4, p=0.007, oral morphine equivalents) and PCA use (32.1% vs. 50.6%, p=0.002). Despite this substantial reduction in narcotics, ERAS patients did not report more pain and in fact reported significantly less pain by postoperative day 3. There were no differences in length of stay (5days), complication rates (13.8% vs. 20.3%, p=0.17) or 30-day readmission rates (9.5 vs 11.9%, p=0.54) between ERAS and historical patients, respectively. Compliance with antimicrobial prophylaxis was 97.2%. However, 33.9% of ERAS patients received substandard preoperative VTE prophylaxis. ERAS program implementation resulted in reductions in narcotic requirements and PCA use without changes in length of stay or readmission rates. Compliance should be diligently audited during the implementation phase of ERAS programs, with special attention to adherence to pre-existing core safety

  17. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    NASA Astrophysics Data System (ADS)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  18. Anonymity in Blended Learning: Who Would You like to Be?

    ERIC Educational Resources Information Center

    Miyazoe, Terumi; Anderson, Terry

    2011-01-01

    This paper examines the learning outcomes associated with implementing discussion forums and blog writings using pseudonyms in blended learning. Although anonymity or masking one's identity has been used as a teaching strategy designed to induce higher writing production and lowering anxiety in face-to-face writing instruction, little research has…

  19. Effect of narcotic pain reliever on pulp tests in women.

    PubMed

    Kardelis, Anthony C; Meinberg, Trudy A; Sulte, Heather R; Gound, Tom G; Marx, David B; Reinhardt, Richard A

    2002-07-01

    The purpose of this study was to determine the effect of one dose of a common narcotic-based pain reliever (Vicodin) on a battery of oral sensitivity tests across time in women. Fifteen Caucasian women randomly were given an oral dose of 10 mg of hydrocodone/1000 mg of acetaminophen or placebo in a double-blind, cross-over design. At baseline (before drug) and after 2, 4, and 8 h each subject was evaluated for sensitivity thresholds with four tests around an experimental tooth: (a) electric pulp tester applied to exposed root; (b) electric pulp tester on adjacent mucosa; (c) increasing probe pressure (grams) on adjacent mucosa; and (d) decreasing cold probe (degrees C) on the exposed root. The outcomes of all tests were not statistically different between drug and placebo treatments at any time point (p > 0.05). These results suggest that a systemic dose of hydrocodone/acetaminophen has little impact on healthy pulp or mucosa sensitivity in women as measured by common diagnostic tests.

  20. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    PubMed

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  1. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  2. Anonymity communication VPN and Tor: a comparative study

    NASA Astrophysics Data System (ADS)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  3. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  4. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  5. Infants of Narcotic Addicted Mothers: Developmental Status, Maternal Care, Home Environments and Interventive Efforts During the First Three Months of Life.

    ERIC Educational Resources Information Center

    Derrick, Sara M.; Hock, Ellen

    This study compared infants born to narcotic addicted mothers with infants born to nonaddicted mothers and described the potential of an intervention program. Infants of five addicted women were matched with infants of five nonaddicted women on the basis of age and socioeconomic class of the mothers and on the basis of gestational ages, birth…

  6. There is no ``I'' in referee: Why referees should be anonymous

    NASA Astrophysics Data System (ADS)

    Ucko, Daniel

    2015-03-01

    From the early days of modern science, it has been recognized that scientific claims must be verified by someone who is not the maker of those claims, and who furthermore has no stake in the matter. In other words, claims need to be evaluated objectively, by the community. The way in which this tends to be done is by peer review conducted by journals. Peer review as currently practiced touches on the themes of trust, where the trust is in institutions and procedures that emerge from expert communities. The practice of peer review is viewed as a citizenly duty of scientists in the scientific community, because all scientists take turns serving either as authors, referees, and editors in the peer review process We lack the resources to have a work evaluated by the entire community, so we substitute with a representative. Yet, in most examples of scientific review, the referee or referees are anonymous. This question is particularly important when the peer review process is brought to bear in order to evaluate matters beyond scientific validity, more ``subjective'' criteria such as relative importance, broadness of interest - criteria that do not appear to have an objective standard of comparison and validation. I will show that the anonymity of referees, far from endangering this trust, actually strengthens it. I will show that this anonymity is crucial in order to maintain any objectivity in scientific peer review, and why authors should not try to unmask the referee. Also at American Physical Society (APS).

  7. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    PubMed

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  8. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    PubMed

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  9. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    ERIC Educational Resources Information Center

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  10. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle

    PubMed Central

    Pagano, Maria E.; Post, Stephen G.; Johnson, Shannon M.

    2012-01-01

    The helper therapy principle (HTP) observes the helper’s health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry. PMID:23525280

  11. Defining ’Anonymity’ in Networked Communication, Version 1

    DTIC Science & Technology

    2011-12-01

    conference that features many current works on anonymity [5]. 7. References [1] D . Chaum , “Security without Identification: Transaction Systems...to make Big Brother Obsolete,” Communications of the ACM 28:10 (1985), pp. 1030-1044. [2] D . Chaum , “The Dining Cryptographers Problem: Unconditional...Sender and Recipient Untraceability,” Journal of Cryptology 1:1 (1988), pp. 65-75. [3] D . Chaum , “Untraceable Electronic Mail, Return Addresses

  12. Use of a Respondent-Generated Personal Code for Matching Anonymous Adolescent Surveys in Longitudinal Studies.

    PubMed

    Ripper, Lisa; Ciaravino, Samantha; Jones, Kelley; Jaime, Maria Catrina D; Miller, Elizabeth

    2017-06-01

    Research on sensitive and private topics relies heavily on self-reported responses. Social desirability bias may reduce the accuracy and reliability of self-reported responses. Anonymous surveys appear to improve the likelihood of honest responses. A challenge with prospective research is maintaining anonymity while linking individual surveys over time. We have tested a secret code method in which participants create their own code based on eight questions that are not expected to change. In an ongoing middle school trial, 95.7% of follow-up surveys are matched to a baseline survey after changing up to two-code variables. The percentage matched improves by allowing up to four changes (99.7%). The use of a secret code as an anonymous identifier for linking baseline and follow-up surveys is feasible for use with adolescents. While developed for violence prevention research, this method may be useful with other sensitive health behavior research. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. Database Design to Ensure Anonymous Study of Medical Errors: A Report from the ASIPS collaborative

    PubMed Central

    Pace, Wilson D.; Staton, Elizabeth W.; Higgins, Gregory S.; Main, Deborah S.; West, David R.; Harris, Daniel M.

    2003-01-01

    Medical error reporting systems are important information sources for designing strategies to improve the safety of health care. Applied Strategies for Improving Patient Safety (ASIPS) is a multi-institutional, practice-based research project that collects and analyzes data on primary care medical errors and develops interventions to reduce error. The voluntary ASIPS Patient Safety Reporting System captures anonymous and confidential reports of medical errors. Confidential reports, which are quickly de-identified, provide better detail than do anonymous reports; however, concerns exist about the confidentiality of those reports should the database be subject to legal discovery or other security breaches. Standard database elements, for example, serial ID numbers, date/time stamps, and backups, could enable an outsider to link an ASIPS report to a specific medical error. The authors present the design and implementation of a database and administrative system that reduce this risk, facilitate research, and maintain near anonymity of the events, practices, and clinicians. PMID:12925548

  14. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  15. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  16. Predictive spatial modeling of narcotic crop growth patterns

    USGS Publications Warehouse

    Waltz, Frederick A.; Moore, D.G.

    1986-01-01

    Spatial models for predicting the geographic distribution of marijuana crops have been developed and are being evaluated for use in law enforcement programs. The models are based on growing condition preferences and on psychological inferences regarding grower behavior. Experiences of local law officials were used to derive the initial model, which was updated and improved as data from crop finds were archived and statistically analyzed. The predictive models are changed as crop locations are moved in response to the pressures of law enforcement. The models use spatial data in a raster geographic information system. The spatial data are derived from the U.S. Geological Survey's US GeoData, standard 7.5-minute topographic quadrangle maps, interpretations of aerial photographs, and thematic maps. Updating of cultural patterns, canopy closure, and other dynamic features is conducted through interpretation of aerial photographs registered to the 7.5-minute quadrangle base. The model is used to numerically weight various data layers that have been processed using spread functions, edge definition, and categorization. The building of the spatial data base, model development, model application, product generation, and use are collectively referred to as the Area Reduction Program (ARP). The goal of ARP is to provide law enforcement officials with tactical maps that show the most likely locations for narcotic crops.

  17. Studies on effective atomic numbers for photon energy absorption and electron density of some narcotic drugs in the energy range 1 keV-20 MeV

    NASA Astrophysics Data System (ADS)

    Gounhalli, Shivraj G.; Shantappa, Anil; Hanagodimath, S. M.

    2013-04-01

    Effective atomic numbers for photon energy absorption ZPEA,eff, photon interaction ZPI,eff and for electron density Nel, have been calculated by a direct method in the photon-energy region from 1 keV to 20 MeV for narcotic drugs, such as Heroin (H), Cocaine (CO), Caffeine (CA), Tetrahydrocannabinol (THC), Cannabinol (CBD), Tetrahydrocannabivarin (THCV). The ZPEA,eff, ZPI,eff and Nel values have been found to change with energy and composition of the narcotic drugs. The energy dependence ZPEA,eff, ZPI,eff and Nel is shown graphically. The maximum difference between the values of ZPEA,eff, and ZPI,eff occurs at 30 keV and the significant difference of 2 to 33% for the energy region 5-100 keV for all drugs. The reason for these differences is discussed.

  18. Quantum anonymous voting with unweighted continuous-variable graph states

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  19. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre.

    PubMed

    Sills, Eric Scott; Mykhaylyshyn, Lyubov O; Dorofeyeva, Ulyana S; Walsh, David J; Salma, Umme; Omar, Ahmed B; Coull, Graham D; David, Ileana A; Brickell, Kathy M; Tsar, Olga M; Walsh, Anthony Ph

    2010-08-11

    This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Among commissioning couples, mean+/-SD female and male age was 41.9 +/- 3.7 and 44.6 +/- 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 +/- 3 yrs (p < 0.001). Infertility duration was >/=3 yrs for couples enrolling in dual gamete donation, and each had >/=2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  20. Griffith Edwards' rigorous sympathy with Alcoholics Anonymous.

    PubMed

    Humphreys, Keith

    2015-07-01

    Griffith Edwards made empirical contributions early in his career to the literature on Alcoholics Anonymous (AA), but the attitude he adopted towards AA and other peer-led mutual help initiatives constitutes an even more important legacy. Unlike many treatment professionals who dismissed the value of AA or were threatened by its non-professional approach, Edwards was consistently respectful of the organization. However, he never became an uncritical booster of AA or overgeneralized what could be learnt from it. Future scholarly and clinical endeavors concerning addiction-related mutual help initiatives will benefit by continuing Edwards' tradition of 'rigorous sympathy'. © 2015 Society for the Study of Addiction.

  1. Detection of Stimulants and Narcotics by Liquid Chromatography-Tandem Mass Spectrometry and Gas Chromatography-Mass Spectrometry for Sports Doping Control.

    PubMed

    Ahrens, Brian D; Kucherova, Yulia; Butch, Anthony W

    2016-01-01

    Sports drug testing laboratories are required to detect several classes of compounds that are prohibited at all times, which include anabolic agents, peptide hormones, growth factors, beta-2 agonists, hormones and metabolic modulators, and diuretics/masking agents. Other classes of compounds such as stimulants, narcotics, cannabinoids, and glucocorticoids are also prohibited, but only when an athlete is in competition. A single class of compounds can contain a large number of prohibited substances and all of the compounds should be detected by the testing procedure. Since there are almost 70 stimulants on the prohibited list it can be a challenge to develop a single screening method that will optimally detect all the compounds. We describe a combined liquid chromatography-tandem mass spectrometry (LC-MS/MS) and gas chromatography-mass spectrometry (GC-MS) testing method for detection of all the stimulants and narcotics on the World Anti-Doping Agency prohibited list. Urine for LC-MS/MS testing does not require sample pretreatment and is a direct dilute and shoot method. Urine samples for the GC-MS method require a liquid-liquid extraction followed by derivatization with trifluoroacetic anhydride.

  2. Adolescent Substance Abuse in Mexico, Puerto Rico and The United States: Effect of Anonymous versus Confidential Survey Formats

    ERIC Educational Resources Information Center

    Latimer, William W.; O'Brien, Megan S.; Vasquez, Marco A.; Medina-Mora, Maria Elena; Rios-Bedoya, Carlos F.; Floyd, Leah J.

    2006-01-01

    Anonymous surveys have been widely used worldwide to describe adolescent substance use yet cannot elucidate causal drug abuse predictors. Studies in the U.S. have generally found that anonymous and confidential surveys yield comparable levels of self-reported substance use, yet the effect of survey format on youth self-report has not been…

  3. Self-disclosure. Reconciling psychoanalytic psychotherapy and alcoholics anonymous philosophy.

    PubMed

    Mallow, A J

    1998-01-01

    Therapists working in the addictions field and practicing from a psychoanalytic psychodynamic framework are often confronted with the patient's need to know, the demand for therapist self-disclosure. Consistent with Alcoholics Anonymous (AA) principles, many patients state that they cannot be helped unless the therapist is revealing of their personal background. This paper discusses the theoretical roots of therapist self-disclosure and the AA philosophy and offers suggestions for how the two might be reconciled.

  4. Anonymity and Motivation in Asynchronous Discussions and L2 Vocabulary Learning

    ERIC Educational Resources Information Center

    Polat, Nihat; Mancilla, Rae; Mahalingappa, Laura

    2013-01-01

    This study investigates L2 attainment in asynchronous online environments, specifically possible relationships among anonymity, L2 motivation, participation in discussions, quality of L2 production, and success in L2 vocabulary learning. It examines, in asynchronous discussions, (a) if participation and (b) motivation contribute to L2 vocabulary…

  5. THE INFLUENCE OF THE SIMULTANEOUS EFFECT OF X-RAY IRRADIATION AND SOME NARCOTICS AND STIMULANTS ON THE MORTALITY OF TADPOLES (in Russian)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Praslicka, M.; Helona, J.; Havelka, J.

    1955-01-01

    Tadpoles of Rana esculenta were selected for experiments to ascertain changes in the action of irradiation produced by certain narcotics and by strychnine. The control tadpoles were irradiated with a dose of 27,500 r, as were also tadpoles in a watery solution of one of the following substances: ether (0.1%), ethanol (2 and 2.5%), chloral hydrate (0.3%), avertine (irradiation in water for 5 mins. in 0.1% solution), strychnine (1: 100,000, of the tadpoles irradiated in the watery solution of narcotic substances is in all cases statistically and significantly prolonged in comparison with that in the case of the tadpoles irradiatedmore » in water. Strychnine in a concentration of 1: 100,000, which produced signs of irritation, produced sensitivity to irradiation; in concentrations of 1: 50,000 and 1: 30,000, which produced inhibition, it had a protective effect, in as far as the tadpoles survived the toxic action of the strychnine. It would appear that irradiation intensifies the toxic action of avertine, ether, chloroform, and scopolamine. (auth)« less

  6. Drug take back in Hawai'i: partnership between the University of Hawai'i Hilo College of Pharmacy and the Narcotics Enforcement Division.

    PubMed

    Ma, Carolyn S; Batz, Forrest; Juarez, Deborah Taira; Ladao, Lani C

    2014-01-01

    Unused/unwanted medications in households and patient care facilities expose vulnerable populations, including children, elders, and pets, to potential harm through inadvertent ingestion, as well as the potential for theft and assault. Hawai'i Administrative Rules prohibit the return of any prescription medications to retail pharmacies after dispensing. The Hawai'i Narcotics Enforcement Division (NED) partnered with the University of Hawai'i at Hilo Daniel K. Inouye College of Pharmacy (CoP) in eleven Drug Take Back events throughout the state. Most participants heard of the events via newspaper and television marketing. The most common methods of medication disposal are via trash or down household drains. Over 8,000 lbs of unused/unwanted medications was collected, identified and logged from 2011 through 2012. The majority of returned drugs were non-controlled substances (90%). Commonly returned medications included prescription cardiac medications such as simvastatin and lisinopril, non-prescription analgesics such as aspirin and ibuprofen, and dietary supplements such as vitamins and iron. Commonly returned controlled substance medications included narcotics such as hydrocodone/acetaminophen combinations and oxycodone, and sedative hypnotics such as zolpidem and lorazepam.

  7. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    PubMed Central

    2010-01-01

    Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated. PMID:20701806

  8. Women's Dependency on Prescription Drugs; Hearing Before the Select Committee on Narcotics Abuse and Control, House of Representatives, Ninety-Sixth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House.

    This record of the Select Committee on Narcotics Abuse and Control contains testimonies addressing the problems facing drug abusing women. The extensive prescribing of legal drugs such as tranquilizers, sedatives, pain killers, and stimulants is examined. The problems of polydrug abuse and alcohol abuse in combination with other drugs are also…

  9. Sanduleak's Star (LMC Anonymous) - Its similarity in the far-ultraviolet with the luminous object Eta Carinae and SN 1987A

    NASA Technical Reports Server (NTRS)

    Michalitsianos, A. G.; Kafatos, M.; Shore, S. N.

    1989-01-01

    Low-resolution IUE SWP spectra of the peculiar object LMC Anonymous (Sanduleak's Star) indicates strong evidence for CNO-processed nebula in the vicinity of the star. The far-UV spectrum of LMC Anonymous closely resembles that of the S Condensation of Eta Carinae. The similarity between LMC Anonymous and the S Condensation is apparent from the absolute intensity of the N V, semiforbidden N IV, and semiforbidden N III emission lines compared with the reduced strength of C IV or semiforbidden C III emission. IUE spectra of the S Condensation and SN 1987A may provide important clues concerning the nature of LMC Anonymous, which indicates departures from normal cosmic abundances of nitrogen relative to carbon that are extreme. This may suggest that carbon envelope burning and dredge-up occurred simultaneously during the helium-burning stage.

  10. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study

    PubMed Central

    Klier, Claudia M; Chryssa, Grylli; Amon, Sabine; Fiala, Christian; Weizmann-Henelius, Ghitta; Pruitt, Sandi L; Putkonen, Hanna

    2013-01-01

    Objectives To assess rates of neonaticide after the implementation of a preventative “anonymous delivery” law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Design Retrospective Study Setting A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. Population All neonaticides reported to the police, 1991-2009. Main outcome measures Neonaticide rates pre- (1991-2001) and post- (2002-2009) anonymous delivery legislation per 100,000 births. Methods The Mann-Whitney U test for two independent samples was used to compare neonaticide rates during the pre-law period to the rates observed after the implementation of the new law for each country. Results On average the rate of police-reported neonaticides was 7.2 per 100.000 births (SD=3.5, median=7.1) in Austria prior to passage of the law and 3.1 per 100.000 births (SD= 2.1; median= 2.6) after passage of the law. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U test p=.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Conclusion Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. PMID:23210536

  11. Anonymity as an Instructional Scaffold in Peer Assessment: Its Effects on Peer Feedback Quality and Evolution in Students' Perceptions about Peer Assessment Skills

    ERIC Educational Resources Information Center

    Rotsaert, Tijs; Panadero, Ernesto; Schellens, Tammy

    2018-01-01

    Although previous research has indicated that providing anonymity is an effective way to create a safe peer assessment setting, continuously ensuring anonymity prevents students from experiencing genuine two-way interactive feedback dialogues. The present study investigated how installing a transitional approach from an anonymous to a…

  12. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies.

    PubMed

    Kushida, Clete A; Nichols, Deborah A; Jadrnicek, Rik; Miller, Ric; Walsh, James K; Griffin, Kara

    2012-07-01

    De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record data. The use of these strategies in multicenter research studies is paramount in importance, given the need to share electronic health record data across multiple environments and institutions while safeguarding patient privacy. Systematic literature search using keywords of de-identify, deidentify, de-identification, deidentification, anonymize, anonymization, data scrubbing, and text scrubbing. Search was conducted up to June 30, 2011 and involved 6 different common literature databases. A total of 1798 prospective citations were identified, and 94 full-text articles met the criteria for review and the corresponding articles were obtained. Search results were supplemented by review of 26 additional full-text articles; a total of 120 full-text articles were reviewed. A final sample of 45 articles met inclusion criteria for review and discussion. Articles were grouped into text, images, and biological sample categories. For text-based strategies, the approaches were segregated into heuristic, lexical, and pattern-based systems versus statistical learning-based systems. For images, approaches that de-identified photographic facial images and magnetic resonance image data were described. For biological samples, approaches that managed the identifiers linked with these samples were discussed, particularly with respect to meeting the anonymization requirements needed for Institutional Review Board exemption under the Common Rule. Current de-identification strategies have their limitations, and statistical learning-based systems have distinct advantages over other approaches for the de-identification of free text. True anonymization is challenging, and further work is needed in the areas of de-identification of datasets and protection of genetic information.

  13. Annual Report for the Year 1983 of the Select Committee on Narcotics Abuse and Control. House of Representatives, Ninety-Eighth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Select Committee on Narcotics Abuse and Control.

    This annual report describes the activities of the House Select Committee on Narcotics Abuse and Control in 1983 and makes recommendations to the House of Representatives to control the worldwide problem of drug abuse and drug trafficking. An initial section of the report describes the jurisdiction, authority, funding, and organization of the…

  14. Does anonymous sperm donation increase the risk for unions between relatives and the incidence of autosomal recessive diseases due to consanguinity?

    PubMed

    Serre, Jean-Louis; Leutenegger, Anne-Louise; Bernheim, Alain; Fellous, Marc; Rouen, Alexandre; Siffroi, Jean-Pierre

    2014-03-01

    In France gamete donation and notably sperm donation are anonymous. It has been claimed that anonymous artificial insemination by donor (AID) could highly contribute to an increase in the level of consanguinity and the incidence of autosomal recessive diseases, due to the unions between offspring of anonymous donors, unaware of their biological kinship, with the special case of unions between half-siblings. The actual incidence of consanguinity due to AID was compared with that resulting from the two other main sources of consanguinity and recessive diseases, i.e. voluntary unions between related individuals or inadvertent unions between the offspring of a common unknown male ancestor (false paternity). From these data, we estimated that expected unions in France between half sibs per year are 0.12 between offspring of sperm donors (1.2 every 10 years) and 0.5 between offspring of common male ancestors through false paternity (5 every 10 years). More generally, the inadvertent unions between false paternity offspring are roughly four times more frequent than those resulting from anonymous AID. We estimated that in the future, when AID has been in practice for several generations, out the 820 000 annual births in France, respectively, 6 and 25 births will be consanguineous through an unknown common ancestor related to anonymous AID and to a false paternity, both of which are negligible when compared with the 1256 children born from first-degree cousins. About 672 children per year are born with a recessive genetic disease due to the panmictic risk and additional affected cases due to consanguinity would be 34.54 for first-cousin offspring, 0.33 for offspring of individuals related due to false paternity and 0.079 for offspring of individuals related due to anonymous AID. Anonymous AID would therefore be responsible for 0.46% of consanguineous births and for 0.01% of recessive diseases. Therefore, the effect of anonymous AID on half-sibling unions, consanguinity and

  15. Sanduleak's Star (LMC Anonymous) - Its similarity in the far-ultraviolet with the luminous object Eta Carinae and SN 1987A

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michalitsianos, A.G.; Kafatos, M.; Shore, S.N.

    1989-06-01

    Low-resolution IUE SWP spectra of the peculiar object LMC Anonymous (Sanduleak's Star) indicates strong evidence for CNO-processed nebula in the vicinity of the star. The far-UV spectrum of LMC Anonymous closely resembles that of the S Condensation of Eta Carinae. The similarity between LMC Anonymous and the S Condensation is apparent from the absolute intensity of the N V, semiforbidden N IV, and semiforbidden N III emission lines compared with the reduced strength of C IV or semiforbidden C III emission. IUE spectra of the S Condensation and SN 1987A may provide important clues concerning the nature of LMC Anonymous,more » which indicates departures from normal cosmic abundances of nitrogen relative to carbon that are extreme. This may suggest that carbon envelope burning and dredge-up occurred simultaneously during the helium-burning stage. 25 refs.« less

  16. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    PubMed Central

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  17. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    PubMed

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  18. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study.

    PubMed

    Klier, C M; Grylli, C; Amon, S; Fiala, C; Weizmann-Henelius, G; Pruitt, S L; Putkonen, H

    2013-03-01

    To assess rates of neonaticide after the implementation of a preventative 'anonymous delivery' law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Retrospective study. A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. All neonaticides reported to the police, 1991-2009. Neonaticide rates before (1991-2001) and after (2002-2009) the introduction of anonymous delivery legislation per 100 000 births. The Mann-Whitney U-test for two independent samples was used to compare neonaticide rates in the period before the new law was introduced with the rates observed after the implementation of the new law for each country. On average the rate of police-reported neonaticides was 7.2 per 100 000 births (SD 3.5, median 7.1) in Austria prior to the new law being passed, and 3.1 per 100 000 births (SD 2.1, median 2.6) after the law was passed. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U-test P = 0.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. © 2012 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2012 RCOG.

  19. Anonymous Partnerships among MSM and Transgender Women (TW) Recently Diagnosed with HIV and other STIs in Lima, Peru: An individual and dyad-level analysis

    PubMed Central

    Perez-Brumer, Amaya G.; Oldenburg, Catherine E.; Segura, Eddy R.; Sanchez, Jorge; Lama, Javier R.; Clark, Jesse L.

    2016-01-01

    Objectives Partner notification (PN) following STI diagnosis is a key strategy for controlling HIV/STI transmission. Anonymous partnerships are an important barrier to PN and often associated with high-risk sexual behaviour. Limited research has examined the profile of MSM and TW who engage in anonymous sex. To better understand anonymous partnership practices in Lima, Peru, we assessed participant- and partnership-level characteristics associated with anonymous sex among a sample of MSM and TW recently diagnosed with HIV/STI. Methods MSM and TW diagnosed with HIV/STI within the past month completed a cross-sectional survey regarding anticipated PN practices. Participants reported sexual partnership types and characteristics of up to 3 of their most recent partners. Using a Poisson generalised estimating equation (GEE) model we assessed participant- and partnership-level characteristics associated with anonymous partnerships. Results Among 395 MSM and TW with HIV/STI, 36.0% reported at least one anonymous sexual partner in the past three months (mean of 8.6 anonymous partners per participant; SD 17.0). Of the 971 partnerships reported, 118 (12.2%) were anonymous and the majority (84.8%) were with male partners, followed by 11.0% with female partners, and 4.2% with transgender/travesti partners. Partner-level characteristics associated with increased likelihood of having an anonymous partner included female (aPR 2.28, 95% CI 1.05 to 4.95, P=0.04) or transgender/travesti (aPR 4.03, 95% CI 1.51 to 10.78, P=0.006) partner gender. Conclusions By assessing both individual- and dyadic-level factors, these results represent an important step in understanding the complexity of partnership interactions and developing alternative partner notification strategies for Latin America. PMID:26912910

  20. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fields, C.A.

    1994-09-01

    This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.

  1. Romantic Relationship Advice from Anonymous Online Helpers: The Peer Support Adolescents Exchange

    ERIC Educational Resources Information Center

    Kim, Jung-Eun; Weinstein, Emily C.; Selman, Robert L.

    2017-01-01

    This empirical study investigates adolescents' responses to peers' personal accounts of romantic relationship difficulties posted to an online forum. We analyze 440 anonymous responses to personal accounts of four romantic relationship issues: controlling partners, break-ups, trust issues, and partner cruelty. Responses were categorized, in order…

  2. A Sensitive, Selective, and Portable Detector for Contraband: The Compact Integrated Narcotics Detection Instrument

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    T. O. Tuemer; L. Doan; C. W. Su

    2000-06-04

    This paper describes the design and operation of a Compact Integrated Narcotics Detection Instrument (CINDI), which utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. CINDI has led to a new technology that shows promise for identifying the concealed contraband. Carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously tomore » detect and possibly identify the contrabands it has been trained for.« less

  3. The effects of anonymity on student ratings of teaching and course quality in a bachelor degree programme.

    PubMed

    Scherer, Theresa; Straub, Jan; Schnyder, Daniel; Schaffner, Noemi

    2013-01-01

    Are there any clear differences between the outcomes of anonymous and personalised student evaluations of teaching quality? During a two-year period students were randomly divided into two separate groups, "anonymous" and "personalised", for end-of-module evaluations. The quality of the module was assessed using a standardised questionnaire. Additionally, students were given the option to add "further comments" if they wanted to highlight specifics. These optional comments were independently assessed by three people, using a five-dimensional rating instrument: positive/negative; differentiated/absolute; naming a person/general; containing an order/neutral; visually accentuated/blank. The database consisted of 615 evaluation forms, of which 306 were completed anonymously. In order to identify whether there were any differences between the anonymous and personalised data, a multivariate variance analysis was performed. Based on the scale, the answers to the questions and the quality of the comments were evaluated. Furthermore, an assessment was made to determine if there were any differences in the number of optional comments between the two groups. No significant differences were identified in the informative quality of data between the anonymous and personalised student evaluations. However, students in the personalised group had a tendency to include more details in their written answers. Personalised evaluations do not generate more biased results in terms of social desirability, as long as the evaluation concept is characterised by a closed-circle process and is transparent. In other words, it is imperative that the outcomes of the evaluation are reported back to the students. Moreover, there has to be an opportunity for students to discuss any further suggestions and/or future desires in an open environment. In this way the students respect and understand that their feedback is being taken seriously; consequently, they feel able to provide a constructive and

  4. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    ERIC Educational Resources Information Center

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  5. Stronger transferability but lower variability in transcriptomic- than in anonymous microsatellites: evidence from Hylid frogs.

    PubMed

    Dufresnes, Christophe; Brelsford, Alan; Béziers, Paul; Perrin, Nicolas

    2014-07-01

    A simple way to quickly optimize microsatellites in nonmodel organisms is to reuse loci available in closely related taxa; however, this approach can be limited by the stochastic and low cross-amplification success experienced in some groups (e.g. amphibians). An efficient alternative is to develop loci from transcriptome sequences. Transcriptomic microsatellites have been found to vary in their levels of cross-species amplification and variability, but this has to date never been tested in amphibians. Here, we compare the patterns of cross-amplification and levels of polymorphism of 18 published anonymous microsatellites isolated from genomic DNA vs. 17 loci derived from a transcriptome, across nine species of tree frogs (Hyla arborea and Hyla cinerea group). We established a clear negative relationship between divergence time and amplification success, which was much steeper for anonymous than transcriptomic markers, with half-lives (time at which 50% of the markers still amplify) of 1.1 and 37 My, respectively. Transcriptomic markers are significantly less polymorphic than anonymous loci, but remain variable across diverged taxa. We conclude that the exploitation of amphibian transcriptomes for developing microsatellites seems an optimal approach for multispecies surveys (e.g. analyses of hybrid zones, comparative linkage mapping), whereas anonymous microsatellites may be more informative for fine-scale analyses of intraspecific variation. Moreover, our results confirm the pattern that microsatellite cross-amplification is greatly variable among amphibians and should be assessed independently within target lineages. Finally, we provide a bank of microsatellites for Palaearctic tree frogs (so far only available for H. arborea), which will be useful for conservation and evolutionary studies in this radiation. © 2013 John Wiley & Sons Ltd.

  6. The experience of childbrith in first-time mothers who received narcotic analgesics during the first stage of labour.

    PubMed

    Jantjes, L; Strümpher, J; Kotzé, W J

    2007-06-01

    This research has focused on the birthing experience of first-time mothers who received the narcotic analgesic combination of Pethidine and Hydroxyzine during the first stage of labour. A qualitative research methodology was used to collect data. Unstructured interviews were held with first-time mothers to obtain accounts of their experience of childbirth. These narrations were audio-taped while the participants were still being cared for in the postnatal ward of the hospital where delivery took place. Nine interviews were conducted with first-time mothers who gave birth normally vaginally after a normal pregnancy and who received a narcotic analgesic in the first stage of labour. The transcribed interviews were analyzed using Tesch's method of descriptive analysis (in Creswell, 1994:115). Four themes with sub-themes emerged from the analysis. The participants reported on the physical experience of labour and described experiencing a lot of pain for which analgesics were given. They also described how these drugs dulled the pain but made them sleepy and unable to cooperate with the midwives. They described their emotional experiences, which included joy and happiness as well as anxiety, anger and despondence. They also reported that they were not sufficiently informed about labour and child-birth. In the last theme they described the methods they used to help them cope with labour including distracting techniques, leaning on a supportive person or praying. Guidelines to help midwives overcome these problems were developed.

  7. Broad spectrum infrared thermal desorption of wipe-based explosive and narcotic samples for trace mass spectrometric detection.

    PubMed

    Forbes, Thomas P; Staymates, Matthew; Sisco, Edward

    2017-08-07

    Wipe collected analytes were thermally desorbed using broad spectrum near infrared heating for mass spectrometric detection. Employing a twin tube filament-based infrared emitter, rapid and efficiently powered thermal desorption and detection of nanogram levels of explosives and narcotics was demonstrated. The infrared thermal desorption (IRTD) platform developed here used multi-mode heating (direct radiation and secondary conduction from substrate and subsequent convection from air) and a temperature ramp to efficiently desorb analytes with vapor pressures across eight orders of magnitude. The wipe substrate experienced heating rates up to (85 ± 2) °C s -1 with a time constant of (3.9 ± 0.2) s for 100% power emission. The detection of trace analytes was also demonstrated from complex mixtures, including plastic-bonded explosives and exogenous narcotics, explosives, and metabolites from collected artificial latent fingerprints. Manipulation of the emission power and duration directly controlled the heating rate and maximum temperature, enabling differential thermal desorption and a level of upstream separation for enhanced specificity. Transitioning from 100% power and 5 s emission duration to 25% power and 30 s emission enabled an order of magnitude increase in the temporal separation (single seconds to tens of seconds) of the desorption of volatile and semi-volatile species within a collected fingerprint. This mode of operation reduced local gas-phase concentrations, reducing matrix effects experienced with high concentration mixtures. IRTD provides a unique platform for the desorption of trace analytes from wipe collections, an area of importance to the security sector, transportation agencies, and customs and border protection.

  8. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    DTIC Science & Technology

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  9. Drug Take Back in Hawai‘i: Partnership Between the University of Hawai‘i Hilo College of Pharmacy and the Narcotics Enforcement Division

    PubMed Central

    Batz, Forrest; Juarez, Deborah Taira; Ladao, Lani C

    2014-01-01

    Unused/unwanted medications in households and patient care facilities expose vulnerable populations, including children, elders, and pets, to potential harm through inadvertent ingestion, as well as the potential for theft and assault. Hawai‘i Administrative Rules prohibit the return of any prescription medications to retail pharmacies after dispensing. The Hawai‘i Narcotics Enforcement Division (NED) partnered with the University of Hawai‘i at Hilo Daniel K. Inouye College of Pharmacy (CoP) in eleven Drug Take Back events throughout the state. Most participants heard of the events via newspaper and television marketing. The most common methods of medication disposal are via trash or down household drains. Over 8,000 lbs of unused/unwanted medications was collected, identified and logged from 2011 through 2012. The majority of returned drugs were non-controlled substances (90%). Commonly returned medications included prescription cardiac medications such as simvastatin and lisinopril, non-prescription analgesics such as aspirin and ibuprofen, and dietary supplements such as vitamins and iron. Commonly returned controlled substance medications included narcotics such as hydrocodone/acetaminophen combinations and oxycodone, and sedative hypnotics such as zolpidem and lorazepam. PMID:24470984

  10. Does Surgical Stabilization of Lateral Compression-type Pelvic Ring Fractures Decrease Patients' Pain, Reduce Narcotic Use, and Improve Mobilization?

    PubMed

    Hagen, Jennifer; Castillo, Renan; Dubina, Andrew; Gaski, Greg; Manson, Theodore T; O'Toole, Robert V

    2016-06-01

    Debate remains over the role of surgical treatment in minimally displaced lateral compression (Young-Burgess, LC, OTA 61-B1/B2) pelvic ring injuries. Lateral compression type 1 (LC1) injuries are defined by an impaction fracture at the sacrum; type 2 (LC2) are defined by a fracture that extends through the posterior iliac wing at the level of the sacroiliac joint. Some believe that operative stabilization of these fractures limits pain and eases mobilization, but to our knowledge there are few controlled studies on the topic. (1) Does operative stabilization of LC1 and LC2 pelvic fractures decrease patients' narcotic use and lower their visual analog scale pain scores? (2) Does stabilization allow patients to mobilize earlier with physical therapy? This retrospective study of LC1 and LC2 fractures evaluated patients treated definitively at one institution from 2007 to 2013. All patients treated surgically, all nonoperative LC2, and all nonoperative LC1 fractures with complete sacral injury were included. In general, LC1 or LC2 fractures with greater than 10 mm of displacement and/or sagittal/axial plane deformity on static radiographs were treated surgically. One hundred fifty-eight patients in the LC1 group (107 [of 697 screened] nonoperative, 51 surgical) and 123 patients in the LC2 group (78 nonoperative, 45 surgical) met inclusion criteria. The surgical and nonoperative groups were matched for fracture type. To account for differences between patients treated surgically and nonoperatively, we used propensity modeling techniques incorporating treatment predictors. Propensity scores demonstrated good overlap and were used as part of multiple variable regression models to account for selection bias between the surgically treated and nonoperative groups. Patient-reported pain scores and narcotic administration were tallied in 24-hour increments during the first 24 hours of hospitalization, at 48 hours after intervention, and in the 24 hours before discharge. Time

  11. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    NASA Astrophysics Data System (ADS)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  12. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    PubMed

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  13. Some Electrophysiological Methods for Studying the Action of Narcotic Agents in Animals, with special reference to Industrial Solvents: A Review

    PubMed Central

    Mikisková, Hana; Mikiska, Aloš

    1968-01-01

    Four electrophysiological methods, two based on stimulation (measurement of spinal reflex excitability and of direct excitability of the cerebral motor cortex) and two based on bioelectric recording (electro-encephalography and electrocardiography), were used in intact guinea-pigs and rabbits for studying the action of narcotic and anaesthetic agents, especially of industrial solvents. The authors' results have been reviewed and compared with those of other investigators in an attempt to work out experimental procedures for routine toxicity testing. PMID:4296739

  14. Reconstructing Spatial Distributions from Anonymized Locations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Horey, James L; Forrest, Stephanie; Groat, Michael

    2012-01-01

    Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstructionmore » algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many real-world scenarios.« less

  15. Demographic characteristics and clinical predictors of patients discharged from university hospital-affiliated pain clinic due to breach in narcotic use contract.

    PubMed

    Chakrabortty, Shushovan; Gupta, Deepak; Rustom, David; Berry, Hussein; Rai, Ajit

    2014-01-01

    The current retrospective study was completed with the aim to identify demographic characteristics and clinical predictors (if any) of the patients discharged from our pain clinic due to breach in narcotic use contract (BNUC). Retrospective patient charts' review and data audit. University hospital-affiliated pain clinic in the United States. All patient charts in our pain clinic for a 2-year period (2011-2012). The patients with BNUC were delineated from the patients who had not been discharged from our pain clinic. Pain characteristics, pain management, and substance abuse status were compared in each patient with BNUC between the time of admission and the time of discharge. The patients with BNUC discharges showed significant variability for the discharging factors among the pain physicians within a single pain clinic model with this variability being dependent on their years of experience and their proactive interventional pain management. The patients with BNUC in our pain clinic setting were primarily middle-aged, obese, unmarried males with nondocumented stable occupational history who were receiving only noninterventional pain management. Substance abuse, doctor shopping, and potential diversion were the top three documented reasons for BNUC discharges. In 2011-2012, our pain clinic discharged 1-in-16 patients due to breach in narcotic use contract.

  16. dCache, towards Federated Identities & Anonymized Delegation

    NASA Astrophysics Data System (ADS)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  17. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    PubMed Central

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  18. [Linking anonymous databases for national and international multicenter epidemiological studies: a cryptographic algorithm].

    PubMed

    Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A

    2009-02-01

    Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.

  19. Development of a database of health insurance claims: standardization of disease classifications and anonymous record linkage.

    PubMed

    Kimura, Shinya; Sato, Toshihiko; Ikeda, Shunya; Noda, Mitsuhiko; Nakayama, Takeo

    2010-01-01

    Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the original data (data set 1: insurance certificate number, name, and sex; data set 2: insurance certificate number, date of birth, and relationship status), we compared the percentage of successful record matches obtained by using data set 1 to generate key codes with the percentage obtained when both data sets were used. The dictionary's automatic conversion of disease names successfully standardized 98.1% of approximately 2 million new receipts entered into the database. The percentage of anonymous matches was higher for the combined data sets (98.0%) than for data set 1 (88.5%). The use of standardized disease classifications and anonymous record linkage substantially contributed to the construction of a large, chronologically organized database of receipts. This database is expected to aid in epidemiologic and health services research using receipt information.

  20. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    PubMed Central

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  1. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data.

    PubMed

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-05-08

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  2. Conducting Anonymous, Incentivized, Online Surveys With Sexual and Gender Minority Adolescents: Lessons Learned From a National Polyvictimization Study.

    PubMed

    Sterzing, Paul R; Gartner, Rachel E; McGeough, Briana L

    2018-03-01

    Sexual and gender minority adolescents represent an understudied and hard-to-reach population who experience higher rates of mental and behavioral health problems in comparison to their cisgender, heterosexual peers. Online surveys and the proliferation of Internet-connected devices among adolescents offer an exciting opportunity for researchers to begin addressing research gaps and past methodological limitations with these hard-to-reach populations. The purpose of this article is to provide guidance to researchers who are designing and implementing anonymous, incentivized, online surveys by examining the following critical domains-(a) recruitment and engagement: means of leveraging social media and videos to recruit and engage a more nationally representative sample; (b) safety and protection: strategies for administering informed consent and protecting participant anonymity and well-being; and (c) data integrity: mechanisms to detect dishonest and repeat responders. To facilitate discussion of these aims, concrete examples are used from SpeakOut-a 3-year, national study funded by the National Institute of Justice that utilized an anonymous, incentivized, online survey with a large sample of sexual and gender minority adolescents ( N = 1,177) to identify the prevalence, incidence, and correlates of polyvictimization. The article concludes with lessons learned from this national study and recommendations for technological innovations and future research that will strengthen the utility of anonymous, incentivized, online surveys to study sexual and gender minority adolescents and other hard-to-reach populations.

  3. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    ERIC Educational Resources Information Center

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  4. Federal Drug Law Enforcement and Interdiction. Hearing before the Select Committee on Narcotics Abuse and Control. House of Representatives, Ninety-Eighth Congress, Second Session, May 22, 1984.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Select Committee on Narcotics Abuse and Control.

    This document contains testimony and prepared statements from the Congressional hearing on federal drug law enforcement. Statements are given from Congressman Claude Pepper, the staff director of the National Narcotics Border Interdiction System (NNBIS), an administrator from the Drug Enforcement Administration (DEA), a commissioner from the…

  5. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  6. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  7. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  8. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  9. A historical review of perceptions of key aspects of spirituality and religion within alcoholics anonymous.

    PubMed

    Feigenbaum, Janice Cooke

    2013-01-01

    This historical research aimed to develop an accurate perception of the role of spirituality and religion within the history of Alcoholics Anonymous. Primary and secondary sources were reviewed. The study identified that Bill W. and Dr. Bob established the format for the support group based on the ideas of William James, which formed the base for the Oxford Groups. Alcoholics Anonymous was clearly viewed as a spiritual group and not a religion. The review also showed that the two founders had each experienced one of the two types of spiritual awakenings that James had addressed. These findings will help nurses clarify their own perceptions of this organization so they may accurately educate individuals who they are encouraging to participate in this program while recovering from an addiction.

  10. Anonymous partnerships among MSM and transgender women (TW) recently diagnosed with HIV and other STIs in Lima, Peru: an individual-level and dyad-level analysis.

    PubMed

    Perez-Brumer, Amaya G; Oldenburg, Catherine E; Segura, Eddy R; Sanchez, Jorge; Lama, Javier R; Clark, Jesse L

    2016-02-24

    Partner notification (PN) following sexually transmitted disease (STI) diagnosis is a key strategy for controlling HIV/STI transmission. Anonymous partnerships are an important barrier to PN and often associated with high-risk sexual behaviour. Limited research has examined the profile of men who have sex with men (MSM) and transgender women (TW) who engage in anonymous sex. To better understand anonymous partnership practices in Lima, Peru, we assessed participant-level and partnership-level characteristics associated with anonymous sex among a sample of MSM and TW recently diagnosed with HIV/STI. MSM and TW diagnosed with HIV/STI within the past month completed a cross-sectional survey regarding anticipated PN practices. Participants reported sexual partnership types and characteristics of up to three of their most recent partners. Using a Poisson generalised estimating equation model, we assessed participant-level and partnership-level characteristics associated with anonymous partnerships. Among 395 MSM and TW with HIV/STI, 36.0% reported at least one anonymous sexual partner in the past 3 months (mean of 8.6 anonymous partners per participant; SD 17.0). Of the 971 partnerships reported, 118 (12.2%) were anonymous and the majority (84.8%) were with male partners, followed by 11.0% with female partners and 4.2% with transgender/travesti partners. Partner-level characteristics associated with increased likelihood of having an anonymous partner included female (adjusted prevalence ratio (aPR) 2.28, 95% CI 1.05 to 4.95, p=0.04) or transgender/travesti (aPR 4.03, 95% CI 1.51 to 10.78, p=0.006) partner gender. By assessing both individual-level and dyadic-level factors, these results represent an important step in understanding the complexity of partnership interactions and developing alternative PN strategies for Latin America. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. One-step estimation of networked population size: Respondent-driven capture-recapture with anonymity.

    PubMed

    Khan, Bilal; Lee, Hsuan-Wei; Fellows, Ian; Dombrowski, Kirk

    2018-01-01

    Size estimation is particularly important for populations whose members experience disproportionate health issues or pose elevated health risks to the ambient social structures in which they are embedded. Efforts to derive size estimates are often frustrated when the population is hidden or hard-to-reach in ways that preclude conventional survey strategies, as is the case when social stigma is associated with group membership or when group members are involved in illegal activities. This paper extends prior research on the problem of network population size estimation, building on established survey/sampling methodologies commonly used with hard-to-reach groups. Three novel one-step, network-based population size estimators are presented, for use in the context of uniform random sampling, respondent-driven sampling, and when networks exhibit significant clustering effects. We give provably sufficient conditions for the consistency of these estimators in large configuration networks. Simulation experiments across a wide range of synthetic network topologies validate the performance of the estimators, which also perform well on a real-world location-based social networking data set with significant clustering. Finally, the proposed schemes are extended to allow them to be used in settings where participant anonymity is required. Systematic experiments show favorable tradeoffs between anonymity guarantees and estimator performance. Taken together, we demonstrate that reasonable population size estimates are derived from anonymous respondent driven samples of 250-750 individuals, within ambient populations of 5,000-40,000. The method thus represents a novel and cost-effective means for health planners and those agencies concerned with health and disease surveillance to estimate the size of hidden populations. We discuss limitations and future work in the concluding section.

  12. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    ERIC Educational Resources Information Center

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  13. Evaluating alcoholics anonymous sponsor attributes using conjoint analysis.

    PubMed

    Stevens, Edward B; Jason, Leonard A

    2015-12-01

    Alcoholics Anonymous (AA) considers sponsorship an important element of the AA program, especially in early recovery. 225 adult individuals who had experience as either a sponsor, sponsee, or both, participated in a hypothetical sponsor ranking exercise where five attributes were varied across three levels. Conjoint analysis was used to compute part-worth utility of the attributes and their levels for experience, knowledge, availability, confidentiality, and goal-setting. Differences in utilities by attribute were found where confidentiality had the greatest overall possible impact on utility and sponsor knowledge had the least. These findings suggest qualitative differences in sponsors may impact their effectiveness. Future research on AA should continue to investigate sponsor influence on an individual's overall recovery trajectory. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    PubMed

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  15. Anonymous or identity-registered sperm donors? A study of Dutch recipients' choices.

    PubMed

    Brewaeys, A; de Bruyn, J K; Louwe, L A; Helmerhorst, F M

    2005-03-01

    The aim of the present study was to gain insight into parents' own donor preferences within a system offering the choice between an anonymous and identity-registered donor. A comparison was made between recipients choosing for an anonymous donor (AD choosers) and those choosing for an identifiable donor (ID choosers) with regard to their sexual orientation, demographic characteristics, disclosure issues and infertility distress. Data from 105 couples (61% heterosexual, 39% lesbian) were registered on a standardized form during implication counselling sessions previous to treatment. Sixty-three per cent of the heterosexual couples and 98% of the lesbian couples had chosen an ID donor. Major differences between ID and AD choosers were identified. Among the ID choosers secrecy towards the child was no option, whereas 83% of the AD choosers did not intend to inform their child. Compared with heterosexual ID choosers, AD choosers were more distressed about their infertility and had a lower educational level. Legislation imposing ID donors appears to be acceptable for the majority of this study population. For a vulnerable group of heterosexual couples, who remained secretive about the use of a donor, adaptation to the new system is not self-evident.

  16. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    PubMed

    Hinton, Daniel P; Higson, Helen

    2017-01-01

    The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674) of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  17. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment

    PubMed Central

    Higson, Helen

    2017-01-01

    The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674) of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences. PMID:28813457

  18. A Variation on the Use of Interactive Anonymous Quizzes in the Chemistry Classroom

    ERIC Educational Resources Information Center

    Wagner, Brian D.

    2009-01-01

    This article describes an interesting variation on the use of interactive anonymous quizzes (IAQs) in the chemistry classroom. In this variation, IAQs are used to introduce new material or topics in a course, as opposed to their traditional use for reviewing previously covered material. Two examples of IAQs used to introduce new topics in a…

  19. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    PubMed

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  20. A Review of the Clinical Manifestations, Pathophysiology and Management of Opioid Bowel Dysfunction and Narcotic Bowel Syndrome

    PubMed Central

    Azizi, Zahra; Javid Anbardan, Sanam; Ebrahimi Daryani, Naser

    2014-01-01

    Opioids are widely used for the treatment of malignant and non-malignant pains. These medications are accompanied by adverse effects, in particular gastrointestinal symptoms known as opioid bowel dysfunction (OBD). The most common symptom of OBD is refractory constipation that is usually stable regardless of the use of laxatives. Narcotic bowel syndrome (NBS) is a subset of OBD described as ambiguous chronic pain aggravated by continual or increased opioid use for pain relief. Pathophysiology of these disorders are not definitely disentangled. Some challenging hypothesis have been posed leading to specific management in order to mitigate the adverse effects. This article is a review of the literature on the prevalence, pathophysiology and management of OBD and NBS. PMID:24829698