Science.gov

Sample records for privacy-preserving context collection

  1. Privacy-Preserving Health Data Collection for Preschool Children

    PubMed Central

    Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  2. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  3. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  4. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    PubMed Central

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  5. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    PubMed

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  6. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  7. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  8. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  9. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  10. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  11. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets. PMID:19709975

  12. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  13. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  14. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data. PMID:23871682

  15. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  16. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records. PMID:26707453

  17. NES++: number system for encryption based privacy preserving speaker verification

    NASA Astrophysics Data System (ADS)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  18. Privacy-preserving microbiome analysis using secure computation

    PubMed Central

    Wagner, Justin; Paulson, Joseph N.; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-01-01

    Motivation: Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual’s collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. Results: To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. Availability and implementation: The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary information: Supplementary data are available at Bioinformatics online. Contact: hcorrada@umiacs.umd.edu PMID:26873931

  19. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  20. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  1. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage

    PubMed Central

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2011-01-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space. PMID:22904698

  2. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  5. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    PubMed Central

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  6. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory. PMID:26587362

  7. A community assessment of privacy preserving techniques for human genomes

    PubMed Central

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques. PMID:25521230

  8. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  9. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection

    NASA Astrophysics Data System (ADS)

    Sakuma, Jun; Wright, Rebecca N.

    Privacy-preserving classification is the task of learning or training a classifier on the union of privately distributed datasets without sharing the datasets. The emphasis of existing studies in privacy-preserving classification has primarily been put on the design of privacy-preserving versions of particular data mining algorithms, However, in classification problems, preprocessing and postprocessing— such as model selection or attribute selection—play a prominent role in achieving higher classification accuracy. In this paper, we show generalization error of classifiers in privacy-preserving classification can be securely evaluated without sharing prediction results. Our main technical contribution is a new generalized Hamming distance protocol that is universally applicable to preprocessing and postprocessing of various privacy-preserving classification problems, such as model selection in support vector machine and attribute selection in naive Bayes classification.

  10. DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing

    PubMed Central

    Li, Haoran; Xiong, Li; Zhang, Lifan; Jiang, Xiaoqian

    2015-01-01

    Differential privacy has recently emerged in private statistical data release as one of the strongest privacy guarantees. Releasing synthetic data that mimic original data with Differential privacy provides a promising way for privacy preserving data sharing and analytics while providing a rigorous privacy guarantee. However, to this date there is no open-source tools that allow users to generate differentially private synthetic data, in particular, for high dimensional and large domain data. Most of the existing techniques that generate differentially private histograms or synthetic data only work well for single dimensional or low-dimensional histograms. They become problematic for high dimensional and large domain data due to increased perturbation error and computation complexity. We propose DPSynthesizer, a toolkit for differentially private data synthesization. The core of DPSynthesizer is DPCopula designed for high-dimensional and large-domain data. DPCopula computes a differentially private copula function from which synthetic data can be sampled. Copula functions are used to describe the dependence between multivariate random vectors and allow us to build the multivariate joint distribution using one-dimensional marginal distributions. DPSynthesizer also implements a set of state-of-the-art methods for building differentially private histograms, suitable for low-dimensional data, from which synthetic data can be generated. We will demonstrate the system using DPCopula as well as other methods with various data sets and show the feasibility, utility, and efficiency of various methods. PMID:26167358

  11. Privacy-preserving GWAS analysis on federated genomic datasets

    PubMed Central

    2015-01-01

    Background The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. Methods We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. Results We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) [1]. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations. PMID:26733045

  12. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  13. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations.

    PubMed

    Simmons, Sean; Sahinalp, Cenk; Berger, Bonnie

    2016-07-01

    The proliferation of large genomic databases offers the potential to perform increasingly larger-scale genome-wide association studies (GWASs). Due to privacy concerns, however, access to these data is limited, greatly reducing their usefulness for research. Here, we introduce a computational framework for performing GWASs that adapts principles of differential privacy-a cryptographic theory that facilitates secure analysis of sensitive data-to both protect private phenotype information (e.g., disease status) and correct for population stratification. This framework enables us to produce privacy-preserving GWAS results based on EIGENSTRAT and linear mixed model (LMM)-based statistics, both of which correct for population stratification. We test our differentially private statistics, PrivSTRAT and PrivLMM, on simulated and real GWAS datasets and find they are able to protect privacy while returning meaningful results. Our framework can be used to securely query private genomic datasets to discover which specific genomic alterations may be associated with a disease, thus increasing the availability of these valuable datasets. PMID:27453444

  14. Infrastructure Aided Privacy Preserving-Authentication in VANETs

    NASA Astrophysics Data System (ADS)

    Chaurasia, Brijesh Kumar; Verma, Shekhar; Tomar, G. S.

    The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

  15. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  16. Privacy-preserving search for chemical compound databases

    PubMed Central

    2015-01-01

    Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650

  17. Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes

    PubMed Central

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N.

    2014-01-01

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. PMID:25390407

  18. Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

    PubMed

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N

    2014-01-01

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. PMID:25390407

  19. Image feature extraction in encrypted domain with privacy-preserving SIFT.

    PubMed

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2012-11-01

    Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications. PMID:22711774

  20. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  1. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang

    In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.

  2. Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes

    NASA Astrophysics Data System (ADS)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.

  3. Privacy-Preserving Data Exploration in Genome-Wide Association Studies

    PubMed Central

    Johnson, Aaron; Shmatikov, Vitaly

    2013-01-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers’ access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy. PMID:26691928

  4. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  5. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    PubMed Central

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  6. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  7. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  8. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy. PMID:26872779

  9. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  10. Privacy preserving protocol for detecting genetic relatives using rare variants

    PubMed Central

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-01-01

    Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. Availability: The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. Contact: fhormoz@cs.ucla.edu or eeskin@cs.ucla.edu Supplementary information: Supplementary data are available at Bioinformatics online PMID:24931985

  11. Privacy-preserving genomic testing in the clinic: a model using HIV treatment

    PubMed Central

    McLaren, Paul J.; Raisaro, Jean Louis; Aouri, Manel; Rotger, Margalida; Ayday, Erman; Bartha, István; Delgado, Maria B.; Vallet, Yannick; Günthard, Huldrych F.; Cavassini, Matthias; Furrer, Hansjakob; Doco-Lecompte, Thanh; Marzolini, Catia; Schmid, Patrick; Di Benedetto, Caroline; Decosterd, Laurent A.; Fellay, Jacques; Hubaux, Jean-Pierre; Telenti, Amalio

    2016-01-01

    Purpose: The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. Genet Med 18 8, 814–822. Methods: We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. Genet Med 18 8, 814–822. Results: A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. Genet Med 18 8, 814–822. Conclusions: The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine. Genet Med 18 8, 814–822. PMID:26765343

  12. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  13. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Thandava Meganathan, Navamani; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  14. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  15. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  16. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation. PMID:27369566

  17. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices. PMID:27610326

  18. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system. PMID:26490148

  19. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  20. A framework for privacy-preserving access to next-generation EHRs.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Tsohou, Aggeliki; Vassilacopoulos, George

    2014-01-01

    Although personalized medicine is optimizing the discovery, development and application of therapeutic advances, its full impact on patient and population healthcare management has yet to be realized. Electronic health Records (EHRs), integrated with data from other sources, such as social care data, Personal Healthcare Record (PHR) data and genetic information, are envisaged as having a pivotal role in realizing this individualized approach to healthcare. Thus, a new generation of EHRs will emerge which, in addition to supporting healthcare professionals in making well-informed clinical decisions, shows potential for novel discovery of associations between disease and genetic, environmental or process measures. However, a broad range of ethical, legal and technical reasons may hinder the realization of future EHRs due to potential security and privacy breaches. This paper presents a HIPAA-compliant framework that enables privacy-preserving access to next-generation EHRs. PMID:25160285

  1. EXpectation Propagation LOgistic REgRession (EXPLORER): Distributed Privacy-Preserving Online Model Learning

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila

    2013-01-01

    We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651

  2. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy. PMID:25000030

  3. An analysis of random projection for changeable and privacy-preserving biometric verification.

    PubMed

    Wang, Yongjin; Plataniotis, Konstantinos N

    2010-10-01

    Changeability and privacy protection are important factors for widespread deployment of biometrics-based verification systems. This paper presents a systematic analysis of a random-projection (RP)-based method for addressing these problems. The employed method transforms biometric data using a random matrix with each entry an independent and identically distributed Gaussian random variable. The similarity- and privacy-preserving properties, as well as the changeability of the biometric information in the transformed domain, are analyzed in detail. Specifically, RP on both high-dimensional image vectors and dimensionality-reduced feature vectors is discussed and compared. A vector translation method is proposed to improve the changeability of the generated templates. The feasibility of the introduced solution is well supported by detailed theoretical analyses. Extensive experimentation on a face-based biometric verification problem shows the effectiveness of the proposed method. PMID:20083458

  4. Privacy of Value-Added Context-Aware Service Cloud

    NASA Astrophysics Data System (ADS)

    Huang, Xin; He, Yin; Hou, Yifan; Li, Lisi; Sun, Lan; Zhang, Sina; Jiang, Yang; Zhang, Tingting

    In the cloud computing era, service provider cloud and context service cloud store all your personal context data. This is a positive aspect for value-added context-aware service cloud as it makes that context information collection are easier than was the case previously. However, this computing environment does add a series of threats in relation to privacy protection. Whoever receives the context information is able to deduce the status of the owners and, generally owners are not happy to share this information. In this paper, we propose a privacy preserved framework which can be utilized by value-added context-aware service cloud. Context data and related services access privileges are determined by context-aware role-based access control (CRAC) extended from role-based access control (RAC). Privacy preserved context service protocol (PPCS) is designed to protect user privacy from exposed context information. Additionally, user network and information diffusion is combined to evaluate the privacy protection effect.

  5. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  6. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  7. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  8. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  9. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  10. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  11. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.

    PubMed

    Liu, Ximeng; Lu, Rongxing; Ma, Jianfeng; Chen, Le; Qin, Baodong

    2016-03-01

    Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data generated everyday, naïve Bayesian classification can be utilized to excavate valuable information to improve a clinical decision support system. Although the clinical decision support system is quite promising, the flourish of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new privacy-preserving patient-centric clinical decision support system, which helps clinician complementary to diagnose the risk of patients' disease in a privacy-preserving way. In the proposed system, the past patients' historical data are stored in cloud and can be used to train the naïve Bayesian classifier without leaking any individual patient medical data, and then the trained classifier can be applied to compute the disease risk for new coming patients and also allow these patients to retrieve the top- k disease names according to their own preferences. Specifically, to protect the privacy of past patients' historical data, a new cryptographic tool called additive homomorphic proxy aggregation scheme is designed. Moreover, to leverage the leakage of naïve Bayesian classifier, we introduce a privacy-preserving top- k disease names retrieval protocol in our system. Detailed privacy analysis ensures that patient's information is private and will not be leaked out during the disease diagnosis phase. In addition, performance evaluation via extensive simulations also demonstrates that our system can efficiently calculate patient's disease risk with high accuracy in a privacy-preserving way. PMID:26960216

  12. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  13. Information Spreading in Context

    NASA Astrophysics Data System (ADS)

    Wang, Dashun; Wen, Zhen; Tong, Hanghang; Lin, Ching-Yung; Song, Chaoming; Barabasi, Albert-Laszlo

    2012-02-01

    Information spreading processes are central to human interactions. Despite recent studies in online domains, little is known about factors that could affect the dissemination of a single piece of information. In this paper, we address this challenge by combining two related but distinct datasets, collected from a large scale privacy-preserving distributed social sensor system. We find that the social and organizational context significantly impacts to whom and how fast people forward information. Yet the structures within spreading processes can be well captured by a simple stochastic branching model, indicating surprising independence of context. Our results build the foundation of future predictive models of information flow and provide significant insights towards design of communication platforms.

  14. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  15. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations. PMID:22407399

  16. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.

    PubMed

    Abbas, Assad; Khan, Samee U

    2014-07-01

    Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted. PMID:25014943

  17. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  18. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  19. Collective Contexts in Conversation: Grounding by Proxy

    ERIC Educational Resources Information Center

    Eshghi, Arash; Healey, Patrick G. T.

    2016-01-01

    Anecdotal evidence suggests that participants in conversation can sometimes act as a coalition. This implies a level of conversational organization in which groups of individuals form a coherent unit. This paper investigates the implications of this phenomenon for psycholinguistic and semantic models of shared context in dialog. We present a…

  20. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  1. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  2. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  3. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality. PMID:15055801

  4. Scalable Privacy-Preserving Data Sharing Methodology for Genome-Wide Association Studies

    PubMed Central

    Yu, Fei; Fienberg, Stephen E.; Slavković, Aleksandra; Uhler, Caroline

    2014-01-01

    The protection of privacy of individual-level information in genome-wide association study (GWAS) databases has been a major concern of researchers following the publication of “an attack” on GWAS data by Homer et al. [1]. Traditional statistical methods for confidentiality and privacy protection of statistical databases do not scale well to deal with GWAS data, especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach that provides a rigorous definition of privacy with meaningful privacy guarantees in the presence of arbitrary external information, although the guarantees may come at a serious price in terms of data utility. Building on such notions, Uhler et al. [2] proposed new methods to release aggregate GWAS data without compromising an individual's privacy. We extend the methods developed in [2] for releasing differentially-private χ2-statistics by allowing for arbitrary number of cases and controls, and for releasing differentially-private allelic test statistics. We also provide a new interpretation by assuming the controls’ data are known, which is a realistic assumption because some GWAS use publicly available data as controls. We assess the performance of the proposed methods through a risk-utility analysis on a real data set consisting of DNA samples collected by the Wellcome Trust Case Control Consortium and compare the methods with the differentially-private release mechanism proposed by Johnson and Shmatikov [3]. PMID:24509073

  5. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  6. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  7. Efficient privacy-preserving string search and an application in genomics

    PubMed Central

    Shimizu, Kana; Nuida, Koji; Rätsch, Gunnar

    2016-01-01

    Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses major social and technological challenges. We consider the case where a user searches for genetic information (e.g. an allele) on a server that stores a large genomic database and aims to receive allele-associated information. The user would like to keep the query and result private and the server the database. Approach: We propose a novel approach that combines efficient string data structures such as the Burrows–Wheeler transform with cryptographic techniques based on additive homomorphic encryption. We assume that the sequence data is searchable in efficient iterative query operations over a large indexed dictionary, for instance, from large genome collections and employing the (positional) Burrows–Wheeler transform. We use a technique called oblivious transfer that is based on additive homomorphic encryption to conceal the sequence query and the genomic region of interest in positional queries. Results: We designed and implemented an efficient algorithm for searching sequences of SNPs in large genome databases. During search, the user can only identify the longest match while the server does not learn which sequence of SNPs the user queried. In an experiment based on 2184 aligned haploid genomes from the 1000 Genomes Project, our algorithm was able to perform typical queries within ≈ 4.6 s and ≈ 10.8 s for client and server side, respectively, on laptop computers. The presented algorithm is at least one order of magnitude faster than an exhaustive baseline algorithm. Availability and implementation: https://github.com/iskana/PBWT-sec and https://github.com/ratschlab/PBWT-sec. Contacts: shimizu-kana@aist.go.jp or Gunnar.Ratsch@ratschlab.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153731

  8. Resilience, Community, and Resilient Communities: Conditioning Contexts and Collective Action

    ERIC Educational Resources Information Center

    Chaskin, Robert J.

    2008-01-01

    This article explores the idea of community as it relates to the concept of resilience. It focuses on community both as context (local environments providing a set of risk and protective factors that have an influence on the well-being of community members) and as collective actors that can exhibit resilience in themselves by organizing and acting…

  9. Distributed Mentoring: Designing Contexts for Collective Support of Teacher Learning

    ERIC Educational Resources Information Center

    Khasnabis, Debi; Reischl, Catherine H.; Stull, Melissa; Boerst, Timothy

    2013-01-01

    There is an alternative to conventional teacher mentorship. The authors describe and analyze a promising model of mentorship where multiple mentees and mentors, each with varying levels of experience, engage collaboratively in the study of teaching practice. They have found that well-designed contexts in which beginning and experienced teachers…

  10. Building Digital Collections in the Algerian Context: Assets and Prospects.

    ERIC Educational Resources Information Center

    Bakelli, Yahia

    2002-01-01

    Analyzes access behavior of Algerian users of information and documentation, focusing on the imbalance between user demand and quality of library access. Topics include Internet connectivity problems; national bibliographic catalogs and databases; creating digital collections to improve access, especially scientific information; and advantages of…

  11. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula. PMID:25500530

  12. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  13. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  14. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  15. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  16. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  17. Perinatal data collection: current practice in the Australian nursing and midwifery healthcare context.

    PubMed

    Craswell, Alison; Moxham, Lorna; Broadbent, Marc

    2013-01-01

    The collection of perinatal data within Queensland, Australia, has traditionally been achieved via a paper form completed by midwives after each birth. Recently, with an increase in the use of e-health systems in healthcare, perinatal data collection has migrated to an online system. It is suggested that this move from paper to an ehealth platform has resulted in improvement to error rates, completion levels, timeliness of data transfer from healthcare institutions to the perinatal data collection and subsequent publication of data items. Worldwide, perinatal data are collected utilising a variety of methods, but essentially data are used for similar purposes: to monitor outcome patterns within obstetrics and midwifery. This paper discusses current practice in relation to perinatal data collection worldwide and within Australia, with a specific focus on Queensland, highlights relevant issues for midwives, and points to the need for further research into the efficient use of an e-health platform for perinatal data collection. PMID:23640918

  18. Collective Capacity Building of Academic Leaders: A University Model of Leadership and Learning in Context

    ERIC Educational Resources Information Center

    Debowski, Shelda; Blake, Vivienne

    2007-01-01

    Academic leaders face particular challenges when they assume formal leadership roles in higher education. For the most part, they have had little prior engagement with the political, economic and strategic context of their institution and limited leadership networks on which to draw. The University of Western Australia has trialled a number of…

  19. Campus Educational Contexts and Civic Participation: Organizational Links to Collective Action

    ERIC Educational Resources Information Center

    Barnhardt, Cassie L.

    2015-01-01

    Proponents of civic engagement extol the virtues of the college experience for enhancing students' capacities for democratic participation, yet few studies have examined the organizational contexts of such actions. This article applies theory regarding social movements in organizations to highlight the relationship between campus curricular…

  20. Performance of the ERTS data collection system in a total system context

    NASA Technical Reports Server (NTRS)

    Paulson, R. W. (Principal Investigator)

    1973-01-01

    The author has identified the following significant results. Approximately 70 percent of the DCP's being installed by Department of the Interior investigators have been successfully operated. These include DCP's operating in Iceland, Central America, Hawaii, and the Continental United States. The Data Collection System specifications are being met for frequency of data collection.

  1. Introducing the notion of social context of collective trauma to ESTSS

    PubMed Central

    Ajduković, Dean

    2013-01-01

    Living amidst war and mass suffering while grasping the opportunity for professional growth, intertwined into my life perspective. Along the years, ESTSS provided a backdrop for my contacts with mental health colleagues from whom I learned, and among whom many became my friends. These rich experiences guided me towards promoting awareness within ESTSS of the importance of social context in which healing of traumatized populations is expected to progress. Each incident of organized violence leaves behind new scores of traumatized individuals and family members, among whom many will need support that may stretch their resources beyond reasonable limits. We need to acknowledge the hindering effects of living in such a social context and that many people that we meet as professionals may carry the burden of unresolved trauma, which should not go by unattended. PMID:23755326

  2. Collective self-esteem: role of social context among Asian-American college students.

    PubMed

    Kim, Eunha; Lee, Donghyuck

    2011-12-01

    The present study explored several layers of individual and contextual variables as related to collective self-esteem among 304 Asian-American college students. The findings suggested that variables, such as immigration generation status and cultural identification, were significantly associated with Private collective self-esteem (personal evaluation of one's ethnic group), while contextual variables, including number of same-ethnicity peers and community ethnic composition, were associated with Public collective self-esteem (judgment of how other people evaluate one's ethnic group). In addition to these variables, age and fluency of heritage language were positively related to Membership esteem (how worthy one feels as a member of one's ethnic group). For the Importance of identity (the importance of ethnic group membership to one's self-concept), cultural identification, number of same-ethnicity peers, and perceived campus climate were statistically significant. The implication of the present findings for future research is discussed. PMID:22420129

  3. Capturing the Friendship Context with a Collective Property: Friendship Group Engagement vs. Disaffection

    ERIC Educational Resources Information Center

    Furrer, Carrie J.

    2010-01-01

    The purpose of this study was to introduce a motivational property of the group, friendship group engagement vs. disaffection, and to examine different composition models for combining individual reports into an indicator of a group-level property. Data were collected from 312 ninth grade students and their teachers. Self-reported friendship group…

  4. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  5. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  6. Taking Environmental Action: The Role of Local Composition, Context, and Collective

    NASA Astrophysics Data System (ADS)

    Wakefield, Sarah E. L.; Elliott, Susan J.; Eyles, John D.; Cole, Donald C.

    2006-01-01

    This article explores individual and community action taken in response to perceived environmental risks by investigating the determinants of environmental action across a range of action types. A conceptual framework is first presented, which provides a foundation for investigating the role of local compositional (i.e., individual characteristics), contextual (i.e., neighborhood environment), and collective (i.e., social networks) factors in environmental action. To test the utility of the conceptual framework, a quantitative survey was administered to a random sample of households (n = 512) in Hamilton, Canada. The results suggest that the predictors of environmental action vary by action type (i.e., personal change, individual civic action, and cooperative civic action), and that factors related to perceived environmental exposure and social capital generally play a stronger, more consistent role in civic environmental action than sociodemographic or neighborhood factors. The results underscore the role of social connection in responses to perceived environmental risks.

  7. Privacy and anonymity challenges when collecting data for public health purposes.

    PubMed

    El Emam, Khaled; Moher, Ester

    2013-03-01

    Two contemporary problems face public health professionals in collecting data from health care providers: the de-identification of geospatial information in a manner that still allows meaningful analysis, and ensuring that provider performance data (e.g., infection or screening rates) is complete and accurate. In this paper, we discuss new methods for de-identifying geographic information that will allow useful de-identified data to be disclosed to public health. In addition, we propose privacy preserving mechanisms that will likely encourage providers to disclose complete and accurate data. However, this must be accompanied by steps to grow trust between the providers and public health. PMID:23590738

  8. Literacies and the Workplace: A Collection of Original Essays. EAE646 Language and Literacies: Contexts and Challenges in the Workplace.

    ERIC Educational Resources Information Center

    Deakin Univ., Victoria (Australia).

    This book is part of the study materials for the distance education course, Language and Literacies: Contexts and Challenges in the Workplace, in the Open Campus Program at Deakin University. It contains five essays about literacies in the workplace. The "Introduction" (Mike Brown) discusses the following topics: literacies in the workplace:…

  9. Navigating the Tides of Change: Revisiting the Notion of Reflexivity in the Context of Social Learning for Transboundary Collective Experimentation

    ERIC Educational Resources Information Center

    Bastrup-Birk, Henriette; Wildemeersch, Danny

    2011-01-01

    Social learning theory in the context of multi-actor engagement tends to relate reflexivity primarily to critical questioning of theories-in-use. We argue that viewing suspensive dialogue and imaginative envisioning as additional stages of reflexivity will serve at least three purposes: prevent over-emphasis on instrumental rationality focusing on…

  10. A Randomized Response Model For Privacy Preserving Smart Metering

    PubMed Central

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  11. Privacy preserving processing of genomic data: A survey.

    PubMed

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods. PMID:26056074

  12. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  13. Realizing privacy preserving genome-wide association studies

    PubMed Central

    Simmons, Sean; Berger, Bonnie

    2016-01-01

    Motivation: As genomics moves into the clinic, there has been much interest in using this medical data for research. At the same time the use of such data raises many privacy concerns. These circumstances have led to the development of various methods to perform genome-wide association studies (GWAS) on patient records while ensuring privacy. In particular, there has been growing interest in applying differentially private techniques to this challenge. Unfortunately, up until now all methods for finding high scoring SNPs in a differentially private manner have had major drawbacks in terms of either accuracy or computational efficiency. Results: Here we overcome these limitations with a substantially modified version of the neighbor distance method for performing differentially private GWAS, and thus are able to produce a more viable mechanism. Specifically, we use input perturbation and an adaptive boundary method to overcome accuracy issues. We also design and implement a convex analysis based algorithm to calculate the neighbor distance for each SNP in constant time, overcoming the major computational bottleneck in the neighbor distance method. It is our hope that methods such as ours will pave the way for more widespread use of patient data in biomedical research. Availability and implementation: A python implementation is available at http://groups.csail.mit.edu/cb/DiffPriv/. Contact: bab@csail.mit.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:26769317

  14. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  15. Medical records. Enhancing privacy, preserving the common good.

    PubMed

    Etzioni, A

    1999-01-01

    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information is maintained and protected. PMID:10321335

  16. Data privacy preservation in telemedicine: the PAIRSE project.

    PubMed

    Nageba, Ebrahim; Defude, Bruno; Morvan, Franck; Ghedira, Chirine; Fayn, Jocelyne

    2011-01-01

    The preservation of medical data privacy and confidentiality is a major challenge in eHealth systems and applications. A technological solution based on advanced information and communication systems architectures is needed in order to retrieve and exchange the patient's data in a secure and reliable manner. In this paper, we introduce the project PAIRSE, Preserving Privacy in Peer to Peer (P2P) environments, which proposes an original web service oriented framework preserving the privacy and confidentiality of shared or exchanged medical data. PMID:21893830

  17. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  18. Collective Efficacy in the School Context: Does It Help Explain Victimization and Bullying among Greek Primary and Secondary School Students?

    ERIC Educational Resources Information Center

    Sapouna, Maria

    2010-01-01

    Collective efficacy, defined as informal social controls that operate under social norms of trust, is an emerging theoretical concept that has been applied to explain violence rates in neighborhoods, affiliation with deviant peers, partner violence, and adolescent delinquency. This study employed a multilevel design to examine the association…

  19. The context of collecting family health history: examining definitions of family and family communication about health among African American women.

    PubMed

    Thompson, Tess; Seo, Joann; Griffith, Julia; Baxter, Melanie; James, Aimee; Kaphingst, Kimberly A

    2015-04-01

    Public health initiatives encourage the public to discuss and record family health history information, which can inform prevention and screening for a variety of conditions. Most research on family health history discussion and collection, however, has predominantly involved White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women-16 with a history of cancer-analyzed participants' definitions of family, family communication about health, and collection of family health history information. Family was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g., biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g., sister) and characteristics of family members (e.g., trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to "own" or "claim" a disease). Few participants reported that anyone in their family kept formal family health history records. Results suggest family health history initiatives should address family tensions and communication patterns that affect discussion and collection of family health history information. PMID:25730634

  20. The Context of Collecting Family Health History: Examining Definitions of Family and Family Communication About Health Among African American Women

    PubMed Central

    THOMPSON, TESS; SEO, JOANN; GRIFFITH, JULIA; BAXTER, MELANIE; JAMES, AIMEE; KAPHINGST, KIMBERLY A.

    2015-01-01

    Public health initiatives encourage the public to discuss and record family health history (FHH) information, which can inform prevention and screening for a variety of conditions. Most research on FHH discussion and collection, however, has involved predominantly White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women, 16 with a history of cancer, analyzed participants’ definitions of family, family communication about health, and collection of FHH information. “Family” was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g. biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g. sister) and characteristics of family members (e.g. trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to “own” or “claim” a disease). Few participants reported that anyone in their family kept formal FHH records. Results suggest FHH initiatives should address family tensions and communication patterns that affect discussion and collection of FHH information. PMID:25730634

  1. Caliper Context Annotation Library

    Energy Science and Technology Software Center (ESTSC)

    2015-09-30

    To understand the performance of parallel programs, developers need to be able to relate performance measurement data with context information, such as the call path / line numbers or iteration numbers where measurements were taken. Caliper provides a generic way to specify and collect multi-dimensional context information across the software stack, and provide ti to third-party measurement tools or write it into a file or database in the form of context streams.

  2. Individual Participation in Collective Action in the Context of a Caribbean Island State: Testing the Effects of Multiple Dimensions of Social Capital

    ERIC Educational Resources Information Center

    Jicha, Karl A.; Thompson, Gretchen H.; Fulkerson, Gregory M.; May, Jonathan E.

    2011-01-01

    This article presents the findings of a case study examining the relationship between social capital and individual participation in collective action on a Caribbean island recovering from devastation inflicted by Hurricanes Ivan and Emily. Using data drawn from 114 residential surveys on the island of Carriacou, Grenada, over the summer of 2006,…

  3. Collective inquiry in the context of school-wide reform: Exploring science curriculum and instruction through team-based professional development

    NASA Astrophysics Data System (ADS)

    Eddy Spicer, David Henning

    Teacher collaboration and joint reflective inquiry have been viewed as central elements of progressive educational reform for more than two decades. More recently, researchers, policy-makers, and practitioners have heralded "blended" or "hybrid" approaches that combine online and on-site environments for collaborative learning as especially promising for "scaling up" instructional improvement. Yet, relatively little is known about how teachers working together navigate organizational and interpersonal constraints to develop and sustain conditions essential to collective inquiry. This in-depth study of meaning making about curriculum and instruction among a group of 11 physics teachers in a public, urban secondary school in the U.S. is an effort to explore collective inquiry as a resource for teacher learning and innovations in teaching practice. Through extended observations, multiple interviews, and close analyses of interaction, the study followed teachers for 7 months as they worked together across 3 settings organized in fundamentally different ways to promote joint inquiry into teaching practice. The explanatory framework of the study rests on the mutually-reinforcing conceptual underpinnings of sociocultural theory and systemic functional linguistics to establish connections between micro-social interactions and macro-social processes. Drawing on systemic functional linguistics, the study explores interpersonal meaning making through close analyses of speech function and speech role in 6 extended sequences of generative interaction. Concepts from activity theory elucidate those features of settings and school that directly impinged on or advanced teachers' collaborative work. Findings run counter to prevailing congenial views of teacher collegiality by identifying ways in which collective inquiry is inherently unstable. That instability makes itself apparent at two levels: (a) the dynamics of authority within the group, and (b) middle-level features of

  4. Open Content in Open Context

    ERIC Educational Resources Information Center

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  5. Collective Enumeration

    PubMed Central

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2012-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a 2-alternative forced-choice task and when in disagreement, they negotiated joint decisions via verbal communication and received feedback about accuracy at the end of each trial. The results showed that two people could collectively count better than either one alone, but not as well as expected by previous models of collective sensory decision making in more basic perceptual domains (e.g., luminance contrast). Moreover, such collective enumeration benefited from prior, noninteractive practice showing that social learning of how to combine shared information about enumeration required substantial individual experience. Finally, the collective context had a positive but transient impact on an individual's enumeration sensitivity. This transient social influence may be explained as a motivational factor arising from the fact that members of a collective must take responsibility for their individual decisions and face the consequences of their judgments. PMID:22889187

  6. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

    PubMed Central

    2015-01-01

    Objective Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results Our solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical. PMID:26732892

  7. MetaSeq: privacy preserving meta-analysis of sequencing-based association studies.

    PubMed

    Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik

    2013-01-01

    Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for metaanalysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source. PMID:23424140

  8. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  9. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency. PMID:26084587

  10. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  11. A Privacy-Preserved Analytical Method for eHealth Database with Minimized Information Loss

    PubMed Central

    Chen, Ya-Ling; Cheng, Bo-Chao; Chen, Hsueh-Lin; Lin, Chia-I; Liao, Guo-Tan; Hou, Bo-Yu; Hsu, Shih-Chun

    2012-01-01

    Digitizing medical information is an emerging trend that employs information and communication technology (ICT) to manage health records, diagnostic reports, and other medical data more effectively, in order to improve the overall quality of medical services. However, medical information is highly confidential and involves private information, even legitimate access to data raises privacy concerns. Medical records provide health information on an as-needed basis for diagnosis and treatment, and the information is also important for medical research and other health management applications. Traditional privacy risk management systems have focused on reducing reidentification risk, and they do not consider information loss. In addition, such systems cannot identify and isolate data that carries high risk of privacy violations. This paper proposes the Hiatus Tailor (HT) system, which ensures low re-identification risk for medical records, while providing more authenticated information to database users and identifying high-risk data in the database for better system management. The experimental results demonstrate that the HT system achieves much lower information loss than traditional risk management methods, with the same risk of re-identification. PMID:22969273

  12. A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking

    NASA Astrophysics Data System (ADS)

    Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes

    We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.

  13. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  14. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS. PMID:25298362

  15. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  16. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  17. METASEQ: PRIVACY PRESERVING META-ANALYSIS OF SEQUENCING-BASED ASSOCIATION STUDIES*

    PubMed Central

    SINGH, ANGAD PAL; ZAFER, SAMREEN; PE’ER, ITSIK

    2013-01-01

    Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for meta-analysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source. PMID:23424140

  18. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. PMID:24768775

  19. Terminal context in context-sensitive grammars.

    NASA Technical Reports Server (NTRS)

    Book, R. V.

    1972-01-01

    Investigation of the conditions whereunder context-sensitive grammars generate context-free languages. The obtained results indicate that, if every noncontext-free rewriting rule of a context-sensitive grammar has as left context a string of terminal symbols and the left context is at least as long as the right context, then the language generated is context-free. Likewise, if every noncontext-free rewriting rule of a context-sensitive grammar has strings of terminal symbols as left and right contexts, then the language generated is also context-free.

  20. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  1. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  2. Possibilistic context identification for SAS imagery

    NASA Astrophysics Data System (ADS)

    Du, Xiaoxiao; Zare, Alina; Cobb, J. T.

    2015-05-01

    This paper proposes a possibilistic context identification approach for synthetic aperture sonar (SAS) imagery. SAS seabed imagery can display a variety of textures that can be used to identify seabed types such as sea grass, sand ripple and hard-packed sand, etc. Target objects in SAS imagery often have varying characteristics and features due to changing environmental context. Therefore, methods that can identify the seabed environment can be used to assist in target classification and detection in an environmentally adaptive or context-dependent approach. In this paper, a possibilistic context identification approach is used to identify the seabed contexts. Alternative methods, such as crisp, fuzzy or probabilistic methods, would force one type of context on every sample in the imagery, ignoring the possibility that the test imagery may include an environmental context that has not yet appeared in the training process. The proposed possibilistic approach has an advantage in that it can both identify known contexts as well as identify when an unknown context has been encountered. Experiments are conducted on a collection of SAS imagery that display a variety of environmental features.

  3. Collection Development.

    ERIC Educational Resources Information Center

    School Libraries in Canada, 2002

    2002-01-01

    Includes 21 articles that discuss collection development in Canadian school libraries. Topics include digital collections in school library media centers; print and electronic library resources; library collections; collaborative projects; print-disabled students; informing administrators of the importance of collection development; censorship;…

  4. Privacy-Preserving Discovery of Topic-Based Events from Social Sensor Signals: An Experimental Study on Twitter

    PubMed Central

    Nguyen, Duc T.; Jung, Jai E.

    2014-01-01

    Social network services (e.g., Twitter and Facebook) can be regarded as social sensors which can capture a number of events in the society. Particularly, in terms of time and space, various smart devices have improved the accessibility to the social network services. In this paper, we present a social software platform to detect a number of meaningful events from information diffusion patterns on such social network services. The most important feature is to process the social sensor signal for understanding social events and to support users to share relevant information along the social links. The platform has been applied to fetch and cluster tweets from Twitter into relevant categories to reveal hot topics. PMID:24955388

  5. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  6. Developing Collections to Empower Learners

    ERIC Educational Resources Information Center

    Kimmel, Sue C.

    2014-01-01

    "Developing Collections to Empower Learners" examines collection development in the context of today's shifts toward digital resources while emphasizing the foundational beliefs of the school library profession. Writer Sue Kimmel includes practical advice about needs assessment, planning, selection, acquisitions, evaluation, and…

  7. Collective neutrino oscillations in supernovae

    SciTech Connect

    Duan, Huaiyu

    2014-06-24

    In a dense neutrino medium neutrinos can experience collective flavor transformation through the neutrino-neutrino forward scattering. In this talk we present some basic features of collective neutrino flavor transformation in the context in core-collapse supernovae. We also give some qualitative arguments for why and when this interesting phenomenon may occur and how it may affect supernova nucleosynthesis.

  8. Contexts as Shared Commitments

    PubMed Central

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are “common ground.” The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  9. Incest in Context.

    ERIC Educational Resources Information Center

    Taubman, Stan

    1984-01-01

    Presents a comprehensive view of the societal, cultural, familial, and personality factors that form the context of people at risk for incest and associated problems. Summarizes the consequences and the causal context of incest and describes an ecosystems approach to intervention. (Author/LLL)

  10. Contexts as Shared Commitments.

    PubMed

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are "common ground." The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  11. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  12. Quantificational logic of context

    SciTech Connect

    Buvac, Sasa

    1996-12-31

    In this paper we extend the Propositional Logic of Context, to the quantificational (predicate calculus) case. This extension is important in the declarative representation of knowledge for two reasons. Firstly, since contexts are objects in the semantics which can be denoted by terms in the language and which can be quantified over, the extension enables us to express arbitrary first-order properties of contexts. Secondly, since the extended language is no longer only propositional, we can express that an arbitrary predicate calculus formula is true in a context. The paper describes the syntax and the semantics of a quantificational language of context, gives a Hilbert style formal system, and outlines a proof of the system`s completeness.

  13. Collecting apparatus

    DOEpatents

    Duncan, Charles P.

    1983-01-01

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air flowing therethrough.

  14. Collections Conservation.

    ERIC Educational Resources Information Center

    DeCandido, Robert

    Collections conservation is an approach to the preservation treatment of books and book-like materials that is conceptualized and organized in terms of large groups of materials. This guide is intended to enable a library to evaluate its current collections conservation activities. The introduction describes collections conservation and gives…

  15. Putting concepts into context.

    PubMed

    Yee, Eiling; Thompson-Schill, Sharon L

    2016-08-01

    At first glance, conceptual representations (e.g., our internal notion of the object "lemon") seem static; we have the impression that there is something that the concept lemon "means" (a sour, yellow, football-shaped citrus fruit) and that this meaning does not vary. Research in semantic memory has traditionally taken this "static" perspective. Consequently, only effects demonstrated across a variety of contexts have typically been considered informative regarding the architecture of the semantic system. In this review, we take the opposite approach: We review instances of context-dependent conceptual activation at many different timescales-from long-term experience, to recent experience, to the current task goals, to the unfolding process of conceptual activation itself-and suggest that the pervasive effects of context across all of these timescales indicate that rather than being static, conceptual representations are constantly changing and are inextricably linked to their contexts. PMID:27282993

  16. Researching Language and Literacy in Social Context.

    ERIC Educational Resources Information Center

    Graddol, David, Ed.; And Others

    A collection of readings addresses issues in empirical investigation of language and literacy in a social context, and provide models useful to researchers undertaking small-scale studies. They include: "Introducing Ethnography" (Martyn Hammersley); "The Relations between Researcher and Researched: Ethics, Advocacy and Empowerment" (D. Cameron,…

  17. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  18. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  19. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  20. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  1. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  2. Culture, context, and behavior.

    PubMed

    Matsumoto, David

    2007-12-01

    In this article I propose a model that posits three major sources of influence on behavior-basic human nature (via universal psychological processes), culture (via social roles), and personality (via individual role identities) and argue that individual behaviors are the products of the interaction between the three. I discuss how culture emerges from the interaction of basic human nature and the ecological contexts in which groups exist, and how social roles are determined by culture-specific psychological meanings attributed to situational contexts. The model further suggests that situational context moderates the relative contributions of the three sources in influencing behavior. I provide examples of apparent contradictory findings in the study of emotion that can be explained by the model proposed. PMID:17995466

  3. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  4. Collecting Rocks.

    ERIC Educational Resources Information Center

    Barker, Rachel M.

    One of a series of general interest publications on science topics, the booklet provides those interested in rock collecting with a nontechnical introduction to the subject. Following a section examining the nature and formation of igneous, sedimentary, and metamorphic rocks, the booklet gives suggestions for starting a rock collection and using…

  5. Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    This chapter discusses litigation touching on collective bargaining issues. The chapter is organized to follow the collective bargaining process, from cases dealing with union organizing to cases involving arbitration. Issues covered also include determination of bargaining units, scope of bargaining, union security, and unfair labor practices in…

  6. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  7. Meaning in Context.

    PubMed

    Gerrig, Richard J

    2015-01-01

    People often encounter language in contexts that provide meanings that go beyond previous experience. For example, people recover metaphorical meanings that displace literal meanings for the same words. For such cases, researchers have addressed the question of whether contextual support allows people to truncate or eliminate consideration of meanings that precede specific contexts. The article reviews 3 domains in which this question has prompted research: recovery of metaphorical meanings, understanding of noun-noun combinations, and assimilation of actions within fantastic narrative worlds. PMID:26255435

  8. Culture collections.

    PubMed

    Smith, David

    2012-01-01

    Culture collections no matter their size, form, or institutional objectives play a role in underpinning microbiology, supplying the resources for study, innovation, and discovery. Their basic roles include providing a mechanism for ex situ conservation of organisms; they are repositories for strains subject to publication, taking in safe, confidential, and patent deposits from researchers. They supply strains for use; therefore, the microorganisms provided must be authentic and preserved well, and any associated information must be valid and sufficient to facilitate the confirmation of their identity and to facilitate their use. The organisms must be collected in compliance with international conventions, international and national legislation and distributed to users indicating clearly the terms and conditions under which they are received and can be used. Collections are harmonizing approaches and characterizing strains to meet user needs. No one single collection can carry out this task alone, and therefore, it is important that output and strategy are coordinated to ensure culture collections deliver the basic resources and services microbiological innovation requires. This chapter describes the types of collection and how they can implement quality management systems and operate to deliver their basic functions. The links to information sources given not only provide support for the practitioners within collections but also provide guidance to users on accessing the huge resource available and how they can help ensure microbiology has the resources and a solid platform for future development. PMID:22569518

  9. Generation and Context Memory

    ERIC Educational Resources Information Center

    Mulligan, Neil W.; Lozito, Jeffrey P.; Rosner, Zachary A.

    2006-01-01

    Generation enhances memory for occurrence but may not enhance other aspects of memory. The present study further delineates the negative generation effect in context memory reported in N. W. Mulligan (2004). First, the negative generation effect occurred for perceptual attributes of the target item (its color and font) but not for extratarget…

  10. Rural as Context.

    ERIC Educational Resources Information Center

    Howley, Craig B.; Howley, Aimee A.

    This essay explains two ways in which "the rural" serves as context. The common way interprets the rural lifeworld as an impediment to certain projects and goals, thus framing "the rural" as a subjugated and diminished reality. The other way is called "the rural circumstance" in order to situate the rural lifeworld as a center of attention, not as…

  11. Contexts of Dance.

    ERIC Educational Resources Information Center

    Sparshott, Francis

    1990-01-01

    Questions who decides what a culturally literate person needs to know and its social implications. Comments on the lack of dance references in E. D. Hirsch's book, "Cultural Literacy." Discusses what a person needs to know about dance. Analyzes dance as art in the context of cultural literacy's requirements. (KM)

  12. Mathematics in Indigenous Contexts

    ERIC Educational Resources Information Center

    Perry, Bob; Howard Peter

    2008-01-01

    From 1999-2005, the Mathematics in Indigenous Contexts (MIC) project was implemented by the Board of Studies, New South Wales (NSW), in conjunction with the NSW Department of Education and Training, and academics from two universities. MIC project members worked with schools and communities at two sites: a primary school in an urban community in…

  13. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  14. Formative Assessment in Context

    ERIC Educational Resources Information Center

    Oxenford-O'Brian, Julie

    2013-01-01

    This dissertation responds to critical gaps in current research on formative assessment practice which could limit successful implementation of this practice within the K-12 classroom context. The study applies a socio cultural perspective of learning to interpret a cross-case analysis of formative assessment practice occurring during one…

  15. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  16. Putting tumours in context

    SciTech Connect

    Bissell, Mina J.; Radisky, Derek

    2001-10-01

    The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumor growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets. Under normal conditions, ORGANS are made up of TISSUES that exchange information with other cell types via cell-cell contact, cytokines and the EXTRACELLULAR MATRIX (ECM). The ECM, which is produced by collaboration between STROMAL fibroblasts and EPITHELIAL cells, provides structural scaffolding for cells, as well as contextual information. The endothelial vasculature provides nutrients and oxygen, and cells of the immune system combat pathogens and remove apoptotic cells. Epithelial cells associate into intact, polarized sheets. These tissues communicate through a complex network of interactions: physically, through direct contact or through the intervening ECM, and biochemically, through both soluble and insoluble signalling molecules. In combination, these interactions provide the information that is necessary to maintain cellular differentiation and to create complex tissue structures. Occasionally, the intercellular signals that define the normal context become disrupted. Alterations in epithelial tissues can lead to movement of epithelial sheets and proliferation - for example, after activation of mesenchymal fibroblasts due to wounding.Normally, these conditions are temporary and reversible, but when inflammation is sustained, an escalating feedback loop ensues.Under persistent inflammatory conditions, continual upregulation of enzymes such as matrix metalloproteinases (MMPs) by stromal fibroblasts can disrupt the ECM, and invading immune cells can overproduce factors that promote abnormal proliferation. As this process progresses

  17. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  18. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  19. Context Oriented Information Integration

    NASA Astrophysics Data System (ADS)

    Mohania, Mukesh; Bhide, Manish; Roy, Prasan; Chakaravarthy, Venkatesan T.; Gupta, Himanshu

    Faced with growing knowledge management needs, enterprises are increasingly realizing the importance of seamlessly integrating critical business information distributed across both structured and unstructured data sources. Academicians have focused on this problem but there still remain a lot of obstacles for its widespread use in practice. One of the key problems is the absence of schema in unstructured text. In this paper we present a new paradigm for integrating information which overcomes this problem - that of Context Oriented Information Integration. The goal is to integrate unstructured data with the structured data present in the enterprise and use the extracted information to generate actionable insights for the enterprise. We present two techniques which enable context oriented information integration and show how they can be used for solving real world problems.

  20. Context based gait recognition

    NASA Astrophysics Data System (ADS)

    Bazazian, Shermin; Gavrilova, Marina

    2012-06-01

    Gait recognition has recently become a popular topic in the field of biometrics. However, the main hurdle is the insufficient recognition rate in the presence of low quality samples. The main focus of this paper is to investigate how the performance of a gait recognition system can be improved using additional information about behavioral patterns of users and the context in which samples have been taken. The obtained results show combining the context information with biometric data improves the performance of the system at a very low cost. The amount of improvement depends on the distinctiveness of the behavioral patterns and the quality of the gait samples. Using the appropriate distinctive behavioral models it is possible to achieve a 100% recognition rate.

  1. Image Acquisition Context

    PubMed Central

    Bidgood, W. Dean; Bray, Bruce; Brown, Nicolas; Mori, Angelo Rossi; Spackman, Kent A.; Golichowski, Alan; Jones, Robert H.; Korman, Louis; Dove, Brent; Hildebrand, Lloyd; Berg, Michael

    1999-01-01

    Objective: To support clinically relevant indexing of biomedical images and image-related information based on the attributes of image acquisition procedures and the judgments (observations) expressed by observers in the process of image interpretation. Design: The authors introduce the notion of “image acquisition context,” the set of attributes that describe image acquisition procedures, and present a standards-based strategy for utilizing the attributes of image acquisition context as indexing and retrieval keys for digital image libraries. Methods: The authors' indexing strategy is based on an interdependent message/terminology architecture that combines the Digital Imaging and Communication in Medicine (DICOM) standard, the SNOMED (Systematized Nomenclature of Human and Veterinary Medicine) vocabulary, and the SNOMED DICOM microglossary. The SNOMED DICOM microglossary provides context-dependent mapping of terminology to DICOM data elements. Results: The capability of embedding standard coded descriptors in DICOM image headers and image-interpretation reports improves the potential for selective retrieval of image-related information. This favorably affects information management in digital libraries. PMID:9925229

  2. User Experience Evaluation in the Mobile Context

    NASA Astrophysics Data System (ADS)

    Obrist, Marianna; Meschtscherjakov, Alexander; Tscheligi, Manfred

    Multimedia services on mobile devices are becoming increasingly popular. Whereas the mobile phone is the most likely platform for mobile TV, PDAs, portable game consoles, and music players are attractive alternatives. Mobile TV consumption on mobile phones allows new kinds of user experiences, but it also puts designers and researchers in front of new challenges. On the one hand, designers have to take these novel experience potentials into account. On the other hand, the right methods to collect user feedback to further improve services for the mobile context have to be applied. In this chapter the importance of user experience research for mobile TV within the mobile context is highlighted. We present how different experience levels can be evaluated taking different mobile context categories into account. In particular, we discuss the Experience Sampling Method (ESM), which seems to be a fruitful approach for investigating user TV experiences.

  3. Blood Collection

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The method that is used for the collection, storage and real-time analysis of blood and other bodily fluids has been licensed to DBCD, Inc. by NASA. The result of this patent licensing agreement has been the development of a commercial product that can provide serum or plasma from whole blood volumes of 20 microliters to 4 milliliters. The device has a fibrous filter with a pore size of less than about 3 microns, and is coated with a mixture of mannitol and plasma fraction protein. The coating causes the cellular fraction to be trapped by the small pores, leaving the cellular fraction intact on the fibrous filter while the acellular fraction passes through the filter for collection in unaltered form from the serum sample collection chamber. The method used by this product is useful to NASA for blood analysis on manned space missions.

  4. Teacher Thinking in Cultural Contexts. SUNY Series, The Social Context of Education.

    ERIC Educational Resources Information Center

    Rios, Francisco A., Ed.

    This collection sheds light on current research on teacher thinking in cultural contexts and identifies promising practices in teacher education that take the most salient contextual variables into account. Teacher cognition as influenced by race, ethnicity, and culture is explored in: (1) "Teacher Thinking in Urban Schools: The Need for a…

  5. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  6. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  7. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  8. Collective Bargaining.

    ERIC Educational Resources Information Center

    Goldschmidt, Steven M.

    This chapter summarizes recent state supreme court and federal court decisions involving collective bargaining for employees of public educational institutions. The cases discussed are generally limited to those decided during 1975 and reported in the General Digest as of March 1976. In his discussion, the author attempts to integrate related…

  9. Collective Bargaining.

    ERIC Educational Resources Information Center

    Goldschmidt, Steven M.

    This chapter deals with the legal process by which employers and employee organizations discuss matters related to employment. The chapter is organized to reflect the initial sequence of events in the collective bargaining process. Cases are reported and analyzed in nine sections: obligation and authority to bargain; unit determination and…

  10. Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    Higher education collective bargaining cases reviewed in this chapter follow the basic sequence of steps in the negotiation process, from issues of the rights of organization and negotiation through scope of bargaining, bargaining conduct, and union security to the ultimate problems of strikes and contract enforcement. Within this common outline,…

  11. Context-dependent hierarchies in pigeons.

    PubMed

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-08-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms "dominance" and "leadership." From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision-based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader-follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  12. Context-dependent hierarchies in pigeons

    PubMed Central

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-01-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms “dominance” and “leadership.” From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision–based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader–follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  13. Collective instabilities

    SciTech Connect

    K.Y. Ng

    2003-08-25

    The lecture covers mainly Sections 2.VIII and 3.VII of the book ''Accelerator Physics'' by S.Y. Lee, plus mode-coupling instabilities and chromaticity-driven head-tail instability. Besides giving more detailed derivation of many equations, simple interpretations of many collective instabilities are included with the intention that the phenomena can be understood more easily without going into too much mathematics. The notations of Lee's book as well as the e{sup jwt} convention are followed.

  14. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology. PMID:26264787

  15. Putting teamwork in context.

    PubMed

    Boaden, N; Leaviss, J

    2000-11-01

    Multidisciplinary teamwork is becoming more important in both the delivery of health care and in the organization and management of that delivery. The first of these has been accepted but traditional professional education has done little to address the challenge it presents to professionals. Recent reforms in the British NHS have made the challenge more urgent. Professionals must work together but in increasingly flexible and innovatory ways. They are also required to play more formal roles in NHS management and policy. Where teamwork has been addressed in professional education it has concentrated on the inter-personal dynamics of working teams. This remains important but to respond effectively to the new challenges curricula and educational practice will have to be clearer about the variety of teams involved and the importance of the context within which teams work. One view is offered as to how that context might be understood in order to map team diversity. Two models are offered to help develop multidisciplinary team learning. One of these deals with key aspects of the organizational setting and the other with factors that affect team processes. It is argued that both should help to facilitate multidisciplinary curriculum development but also suggest learning needs to be met within unidisciplinary professional education. Concentration on team dynamics alone will not deliver the teamwork required in the new NHS. PMID:11107017

  16. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation. PMID:23415996

  17. Correlation, coherence and context

    NASA Astrophysics Data System (ADS)

    Eberly, J. H.

    2016-08-01

    The modern theory of coherence is based on correlation functions. A generic example could be written < {{V}\\ast}≤ft({{t}1}\\right)V≤ft({{t}2}\\right)> , denoting an average of products of the values of a signal V(t) at two specified times. Here we infer that t is a degree of freedom that the signal depends on. Typically, physical variables depend on more than one degree of freedom, and recognition of this has prompted attention to some interesting questions for the correlation functions and the several coherences that can be attributed to the same optical field. We examine some of the questions arising from the standpoint of experimental contexts. Degree of polarizability and degree of entanglement (classical non-separability) can serve as starting points for quantitative assignments.

  18. Collective motion

    NASA Astrophysics Data System (ADS)

    Vicsek, Tamás; Zafeiris, Anna

    2012-08-01

    We review the observations and the basic laws describing the essential aspects of collective motion - being one of the most common and spectacular manifestation of coordinated behavior. Our aim is to provide a balanced discussion of the various facets of this highly multidisciplinary field, including experiments, mathematical methods and models for simulations, so that readers with a variety of background could get both the basics and a broader, more detailed picture of the field. The observations we report on include systems consisting of units ranging from macromolecules through metallic rods and robots to groups of animals and people. Some emphasis is put on models that are simple and realistic enough to reproduce the numerous related observations and are useful for developing concepts for a better understanding of the complexity of systems consisting of many simultaneously moving entities. As such, these models allow the establishing of a few fundamental principles of flocking. In particular, it is demonstrated, that in spite of considerable differences, a number of deep analogies exist between equilibrium statistical physics systems and those made of self-propelled (in most cases living) units. In both cases only a few well defined macroscopic/collective states occur and the transitions between these states follow a similar scenario, involving discontinuity and algebraic divergences.

  19. The Challenging Academic Development (CAD) Collective

    ERIC Educational Resources Information Center

    Peseta, Tai

    2005-01-01

    This article discusses the Challenging Academic Development (CAD) Collective and describes how it came out of a symposium called "Liminality, identity, and hybridity: On the promise of new conceptual frameworks for theorising academic/faculty development." The CAD Collective is and represents a space where people can open up their contexts and…

  20. Context-specific control and context selection in conflict tasks.

    PubMed

    Schouppe, Nathalie; Ridderinkhof, K Richard; Verguts, Tom; Notebaert, Wim

    2014-02-01

    This study investigated whether participants prefer contexts with relatively little cognitive conflict and whether this preference is related to context-specific control. A conflict selection task was administered in which participants had to choose between two categories that contained different levels of conflict. One category was associated with 80% congruent Stroop trials and 20% incongruent Stroop trials, while the other category was associated with only 20% congruent Stroop trials and 80% incongruent Stroop trials. As predicted, participants selected the low-conflict category more frequently, indicating that participants avoid contexts with high-conflict likelihood. Furthermore, we predicted a correlation between this preference for the low-conflict category and the control implementation associated with the categories (i.e., context-specific proportion congruency effect, CSPC effect). Results however did not show such a correlation, thereby failing to support a relationship between context control and context selection. PMID:24384400

  1. Cell nucleus in context

    SciTech Connect

    Lelievre, Sophie A.; Bissell, Mina J.; Pujuguet, Philippe

    1999-11-11

    The molecular pathways that participate in regulation of gene expression are being progressively unraveled. Extracellular signals, including the binding of extracellular matrix and soluble molecules to cell membrane receptors, activate specific signal transducers that convey information inside the cell and can alter gene products. Some of these transducers when translocated to the cell nucleus may bind to transcription complexes and thereby modify the transcriptional activity of specific genes. However, the basic molecules involved in the regulation of gene expression are found in many different cell and tissue types; thus the mechanisms underlying tissue-specific gene expression are still obscure. In this review, we focus on the study of signals that are conveyed to the nucleus. We propose that the way in which extracellular signals are integrated may account for tissue-specific gene expression. We argue that the integration of signals depends on the structural organization of cells ( i.e., extracellular matrix, cell membrane, cytoskeleton, nucleus) which a particular cell type within a tissue. Putting the nuclei in context allows us to envision gene expression as being regulated not only by the communication between the extracellular environment and the nucleus, but also by the influence of organized assemblies of cells on extracellular-nuclear communications.

  2. Distributed Control with Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.; Wheeler, Kevin R.; Tumer, Kagan

    1998-01-01

    We consider systems of interacting reinforcement learning (RL) algorithms that do not work at cross purposes , in that their collective behavior maximizes a global utility function. We call such systems COllective INtelligences (COINs). We present the theory of designing COINs. Then we present experiments validating that theory in the context of two distributed control problems: We show that COINs perform near-optimally in a difficult variant of Arthur's bar problem [Arthur] (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance in the master-slave problem.

  3. Disagreeing in context

    PubMed Central

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  4. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk Context Scale.…

  5. Non-context-free grammars generating context-free languages

    NASA Technical Reports Server (NTRS)

    Baker, B. S.

    1974-01-01

    If G is a grammar such that in each non-context-free rule of G, the right side contains a string of terminals longer than any terminal string appearing between two nonterminals in the left side, then the language generated by G is context free. Six previous results follow as corollaries of this theorem.

  6. The Context Oriented Training Method.

    ERIC Educational Resources Information Center

    Cavrini, Andrea

    The Context Oriented Training (COT) method is introduced and explored in this paper. COT is a means of improving the training process, beginning with the observation and analysis of current corporate experiences in the field. The learning context lies between the development of professional competencies in training and the operational side in the…

  7. School Context, Gender, and Delinquency.

    ERIC Educational Resources Information Center

    Fiqueira-McDonough, Josefina

    1986-01-01

    Two high schools serving the same community are compared in order to examine how control/strain variables predict delinquency in two contexts. The school context characterized by a broader definition of success, more specialized discipline, and predictable supervision was found to have lower levels of delinquency for both genders. (Author/LMO)

  8. Popular Culture, Methods, and Context.

    ERIC Educational Resources Information Center

    Harmer, Jeremy

    2003-01-01

    Responds to an earlier article that argues that the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. Suggests that it is time to replace CLT as the central paradigm in language teaching with a context approach. (Author/VWL)

  9. Putting the Context into Learning

    ERIC Educational Resources Information Center

    Edwards, Richard; Miller, Kate

    2007-01-01

    The article explores the conceptualization of learning and context from a number of perspectives and some of the theoretical and methodological issues raised when context is no longer considered as a container, but as a relational effect. It provides an introduction for the articles that follow, insofar as they take up lines of flight from the…

  10. Teaching Psychology: The Political Context

    ERIC Educational Resources Information Center

    Newland, John

    2008-01-01

    In this commentary, the author raises two critical aspects not adequately addressed in John Radford's (2008) wide ranging article on the teaching of psychology in higher education. The first aspect is the relevance of boundaries. The second aspect is the political context(s). These two issues, though artificially dissociated for current purposes,…

  11. Context-Enabled Business Intelligence

    SciTech Connect

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  12. The neighborhood context of well-being.

    PubMed

    Sampson, Robert J

    2003-01-01

    Health-related problems are strongly associated with the social characteristics of communities and neighborhoods. We need to treat community contexts as important units of analysis in their own right, which in turn calls for new measurement strategies as well as theoretical frameworks that do not simply treat the neighborhood as a "trait" of the individual. Recent findings from the Project on Human Development in Chicago Neighborhoods support this thesis. Two major themes merit special attention: (1) the importance of collective efficacy for understanding health disparities in the modern city; and (2) the salience of spatial dynamics that go beyond the confines of local neighborhoods. Further efforts to explain the causes of variation in collective processes associated with healthy communities may provide innovative opportunities for preventive intervention. PMID:14563074

  13. 77 FR 20686 - 60-Day Notice of Proposed Information Collections: Two DDTC Brokering Collections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... comment on December 19, 2011 (see 76 FR 78578). On that occasion, public comment was sought in the context... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE 60-Day Notice of Proposed Information Collections: Two DDTC Brokering Collections ACTION: Notice of request...

  14. Context representations, context functions, and the parahippocampal–hippocampal system

    PubMed Central

    Rudy, Jerry W.

    2009-01-01

    Psychologists and neurobiologists have a long-standing interest in understanding how the context surrounding the events of our lives is represented and how it influences our behavior. The hippocampal formation emerged very early as a major contributor to how context is represented and functions. There is a large literature examining its contribution that on the surface reveals an array of conflicting outcomes and controversy. This review reveals that these conflicts can be resolved by building Nadel and Willner's dual-process theory of context representations. Two general conclusions emerge: (1) There are two neural systems that can support context representations and functions—a neocortical system composed primarily of perirhinal and postrhinal cortices and a hippocampal system that includes perirhinal, postrhinal, entorhinal cortices, and the hippocampal formation. (2) These two systems are not equivalent—some context representations and functions are uniquely supported by the hippocampal system. These conclusions are discussed in the context of canonical ideas about the special properties of the hippocampal system that enable it to make unique contributions to memory. PMID:19794181

  15. Context-driven automated target detection in 3D data

    NASA Astrophysics Data System (ADS)

    West, Karen F.; Webb, Brian N.; Lersch, James R.; Pothier, Steven; Triscari, Joseph M.; Iverson, A. E.

    2004-09-01

    This paper summarizes a system, and its component algorithms, for context-driven target vehicle detection in 3-D data that was developed under the Defense Advanced Research Projects Agency (DARPA) Exploitation of 3-D Data (E3D) Program. In order to determine the power of shape and geometry for the extraction of context objects and the detection of targets, our algorithm research and development concentrated on the geometric aspects of the problem and did not utilize intensity information. Processing begins with extraction of context information and initial target detection at reduced resolution, followed by a detailed, full-resolution analysis of candidate targets. Our reduced-resolution processing includes a probabilistic procedure for finding the ground that is effective even in rough terrain; a hierarchical, graph-based approach for the extraction of context objects and potential vehicle hide sites; and a target detection process that is driven by context-object and hide-site locations. Full-resolution processing includes statistical false alarm reduction and decoy mitigation. When results are available from previously collected data, we also perform object-level change detection, which affects the probabilities that objects are context objects or targets. Results are presented for both synthetic and collected LADAR data.

  16. Workforce Competitiveness Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program…

  17. Program Management Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Program Management Collection, which covers the topics of Assessment, Learning Disabilities, and Program Improvement. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program Management,…

  18. Schooling Closer to Home: Desegregation Policy and Neighborhood Contexts

    ERIC Educational Resources Information Center

    Goldring, Ellen; Cohen-Vogel, Lora; Smrekar, Claire; Taylor, Cynthia

    2006-01-01

    This article uses census data, information collected by health and police departments, and GIS mapping software to analyze the neighborhood contexts surrounding schools in one Southern school district. When courts lifted Nashville's desegregation order in 1999, the district agreed to implement a new student assignment plan geared toward…

  19. The Social Context of Young Children's Peer Victimization

    ERIC Educational Resources Information Center

    Hanish, Laura D.; Ryan, Patti; Martin, Carol Lynn; Fabes, Richard A.

    2005-01-01

    The goal of this study was to investigate differences in the social context of peer victimization for preschoolers and kindergarteners. Data were collected from 168 children. For preschoolers, neither social acceptance nor friendships were significantly related to peer victimization. Instead, playing with peers and exposure to aggressive peers…

  20. Social Context in School: Its Relation to Adolescents' Depressive Mood

    ERIC Educational Resources Information Center

    Boulard, Aurore; Quertemont, Etienne; Gauthier, Jean-Marie; Born, Michel

    2012-01-01

    This study examined the impact of various school-related factors on adolescents' depressive mood, including prosocial behavior, verbal aggression, and relationships with teachers. The data used in this study were collected in the context of a larger survey on victimization in secondary schools from the French Community of Belgium. Participants…

  1. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  2. Interactional Renegotiations of Educational Discourses in Recreational Learning Contexts

    ERIC Educational Resources Information Center

    Madsen, Lian Malai

    2011-01-01

    In this paper I focus on sequences of interaction among youth where the participants engage in classroom related activities (such as spelling, discussion of essays, etc.). My paper is based on interactional and ethnographic data collected among youth in two different leisure contexts. I discuss how the participants by employment of various…

  3. Collective Bargaining in Higher Education. The State of the Art.

    ERIC Educational Resources Information Center

    Julius, Daniel J., Ed.

    American higher education collective bargaining is addressed in 21 essays by administrators and academicians who are actively engaged in the process. Titles and authors are as follows: "The Context of Collective Bargaining in American Colleges and Universities" (Kenneth P. Mortimer); "Collective Bargaining in the Multi-Campus System" (Richard E.…

  4. Special Collections, Primary Resources, and Information Literacy Pedagogy

    ERIC Educational Resources Information Center

    Hubbard, Melissa A.; Lotts, Megan

    2013-01-01

    This article reports on collaboration between an information literacy (IL) instructor and a special collections librarian to create a hands-on special collections experience for entry-level IL students within the context of a credit-bearing class. Data collected during this experience found that exposing students to these materials can increase…

  5. Context Switch Effects and Context Experience in Rats' Conditioned Taste Aversion

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Callejas-Aguilera, Jose E.; Rosas, Juan M.

    2012-01-01

    Context specificity of rats' conditioned taste aversion as a function of context experience was assessed in two experiments. Rats received a single pairing between a flavor X and a LiCl injection in a distinctive context (context A) being subsequently tested either in the same context or in a different but equally familiar context (context B).…

  6. Conceptions of Assessment When the Teaching Context and Learner Population Matter: Compulsory School versus Non-Compulsory Adult Education Contexts

    ERIC Educational Resources Information Center

    Remesal, Ana; Brown, Gavin T. L.

    2015-01-01

    This paper presents results of a study on teachers' conceptions of assessment carried out on a sample of 493 teachers of Spanish as foreign language from all over the world. At the moment of data collection, the participants were members of an international online teacher community and were teaching at different professional contexts: basic…

  7. Context-enhanced video understanding

    NASA Astrophysics Data System (ADS)

    Jaimes, Alejandro; Naphade, Milind R.; Nock, Harriet; Smith, John R.; Tseng, Belle L.

    2003-01-01

    Many recent efforts have been made to automatically index multimedia content with the aim of bridging the semantic gap between syntax and semantics. In this paper, we propose a novel framework to automatically index video using context for video understanding. First we discuss the notion of context and how it relates to video understanding. Then we present the framework we are constructing, which is modeled as an expert system that uses a rule-based engine, domain knowledge, visual detectors (for objects and scenes), and different data sources available with the video (metadata, text from automatic speech recognition, etc.). We also describe our approach to align text from speech recognition and video segments, and present experiments using a simple implementation of our framework. Our experiments show that context can be used to improve the performance of visual detectors.

  8. Estimating changing contexts in schizophrenia.

    PubMed

    Kaplan, Claire M; Saha, Debjani; Molina, Juan L; Hockeimer, William D; Postell, Elizabeth M; Apud, Jose A; Weinberger, Daniel R; Tan, Hao Yang

    2016-07-01

    SEE STEPHAN ET AL DOI101093/AWW120 FOR A SCIENTIFIC COMMENTARY ON THIS WORK: Real world information is often abstract, dynamic and imprecise. Deciding if changes represent random fluctuations, or alterations in underlying contexts involve challenging probability estimations. Dysfunction may contribute to erroneous beliefs, such as delusions. Here we examined brain function during inferences about context change from noisy information. We examined cortical-subcortical circuitry engaging anterior and dorsolateral prefrontal cortex, and midbrain. We hypothesized that schizophrenia-related deficits in prefrontal function might overestimate context change probabilities, and that this more chaotic worldview may subsequently gain familiarity and be over-reinforced, with implications for delusions. We then examined these opposing information processing biases against less expected versus familiar information patterns in relation to genetic risk for schizophrenia in unaffected siblings. In one experiment, 17 patients with schizophrenia and 24 normal control subjects were presented in 3 T magnetic resonance imaging with numerical information varying noisily about a context integer, which occasionally shifted up or down. Subjects were to indicate when the inferred numerical context had changed. We fitted Bayesian models to estimate probabilities associated with change inferences. Dynamic causal models examined cortical-subcortical circuitry interactions at context change inference, and at subsequent reduced uncertainty. In a second experiment, genetic risk for schizophrenia associated with similar cortical-subcortical findings were explored in an independent sample of 36 normal control subjects and 35 unaffected siblings during processing of intuitive number sequences along the number line, or during the inverse, less familiar, sequence. In the first experiment, reduced Bayesian models fitting subject behaviour suggest that patients with schizophrenia overestimated context

  9. 78 FR 67847 - Debt Collection (Regulation F)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-12

    ... application in the context of debt collection. Trade Regulation Rule: Credit Practices, 49 FR 7740 (Mar. 1..., 50 FR 16696 (Apr. 29, 1985) (Board); Consumer Protections; Unfair or Deceptive Credit Practices, 50 FR 19325 (May 8, 1985) (FHLBB); Federal Credit Union; Prohibited Lending Practices, 52 FR 35060...

  10. Proximate Sources of Collective Teacher Efficacy

    ERIC Educational Resources Information Center

    Adams, Curt M.; Forsyth, Patrick B.

    2006-01-01

    Purpose: Recent scholarship has augmented Bandura's theory underlying efficacy formation by pointing to more proximate sources of efficacy information involved in forming collective teacher efficacy. These proximate sources of efficacy information theoretically shape a teacher's perception of the teaching context, operationalizing the difficulty…

  11. Student Loan Programs: Management and Collection.

    ERIC Educational Resources Information Center

    Dorian, James C.; Ward, Diane M.

    This guide to undergraduate and graduate student loan programs focuses primarily on program administration and management in the context of student loan repayment and collection. By incorporating regulatory requirements with practical suggestions on managing student loan programs, the book provides a framework and a guide for those who are…

  12. Collections Management, Collections Maintenance, and Conservation.

    ERIC Educational Resources Information Center

    American Association of Museums, Washington, DC.

    This national survey of the state of the nation's museum collections investigates collection care policies and practices, conservation issues, and private sector and federal support for museum needs. It consists of two major projects and four additional information gathering projects. The Museum Collection Survey is designed to examine all major…

  13. The social context of well-being.

    PubMed

    Helliwell, John F; Putnam, Robert D

    2004-09-29

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health. PMID:15347534

  14. Migration of cells in a social context.

    PubMed

    Vedel, Søren; Tay, Savaş; Johnston, Darius M; Bruus, Henrik; Quake, Stephen R

    2013-01-01

    In multicellular organisms and complex ecosystems, cells migrate in a social context. Whereas this is essential for the basic processes of life, the influence of neighboring cells on the individual remains poorly understood. Previous work on isolated cells has observed a stereotypical migratory behavior characterized by short-time directional persistence with long-time random movement. We discovered a much richer dynamic in the social context, with significant variations in directionality, displacement, and speed, which are all modulated by local cell density. We developed a mathematical model based on the experimentally identified "cellular traffic rules" and basic physics that revealed that these emergent behaviors are caused by the interplay of single-cell properties and intercellular interactions, the latter being dominated by a pseudopod formation bias mediated by secreted chemicals and pseudopod collapse following collisions. The model demonstrates how aspects of complex biology can be explained by simple rules of physics and constitutes a rapid test bed for future studies of collective migration of individual cells. PMID:23251032

  15. Loneliness in Chinese children across contexts.

    PubMed

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-10-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban groups had lower scores on loneliness than did children in 1992 and 1998 urban groups, suggesting that as urban China became a more modernized, self-oriented society, children tended to report lower levels of loneliness. Consistent with this trend, urban children reported lower levels of loneliness than did their rural counterparts in recent years. The analysis of associations between social functioning and loneliness revealed that across groups, sociability was negatively associated with loneliness, and aggression was positively associated with loneliness. The association between shyness and loneliness differed among the groups; it was negative in the 1992 urban group, positive in the 2002 and 2005 urban groups, and nonsignificant in the 1998 urban and 2007 rural groups. The different associations suggest that whether shy children feel lonely might depend on context. PMID:25181650

  16. Classification of Tumor Histology via Morphometric Context.

    PubMed

    Chang, Hang; Borowsky, Alexander; Spellman, Paul; Parvin, Bahram

    2013-06-23

    Image-based classification of tissue histology, in terms of different components (e.g., normal signature, categories of aberrant signatures), provides a series of indices for tumor composition. Subsequently, aggregation of these indices in each whole slide image (WSI) from a large cohort can provide predictive models of clinical outcome. However, the performance of the existing techniques is hindered as a result of large technical and biological variations that are always present in a large cohort. In this paper, we propose two algorithms for classification of tissue histology based on robust representations of morphometric context, which are built upon nuclear level morphometric features at various locations and scales within the spatial pyramid matching (SPM) framework. These methods have been evaluated on two distinct datasets of different tumor types collected from The Cancer Genome Atlas (TCGA), and the experimental results indicate that our methods are (i) extensible to different tumor types; (ii) robust in the presence of wide technical and biological variations; (iii) invariant to different nuclear segmentation strategies; and (iv) scalable with varying training sample size. In addition, our experiments suggest that enforcing sparsity, during the construction of morphometric context, further improves the performance of the system. PMID:24319324

  17. Suicide prevention in the genetic counseling context.

    PubMed

    Peters, J A

    1994-09-01

    Utilizing a case report, this paper explores psychosocial aspects of suicidal intent in a woman seeking prenatal diagnosis. Using knowledge and practice of appropriate assessment, referral, and intervention procedures, the therapy team of genetic counselor and psychotherapist facilitated successful identification and management of this potentially suicidal client. The main counseling goals for the genetic counselor are to assess the situation adequately, decrease the immediate danger, and, with supervision and/or consultation, stabilize the seriously suicidal person until that individual can be triaged to mental health or medical professionals for treatment. The prevalence of suicide issues in genetic counseling contexts is unknown and reports mentioning suicidal ideation unusual in the genetic counseling literature. Is this reported case a rarity among genetic counseling referrals? Systematically collected information on the prevalence and resolution of suicidal issues in genetic counseling contexts would be helpful for those setting curricula for genetic counseling training programs, standards for professional certification exams, and policy and procedures manuals for clinical units. PMID:24234007

  18. Evangelization in the American Context.

    ERIC Educational Resources Information Center

    Burrell, David B., Ed.; Kane, Franzita, Ed.

    Proceedings of a symposium held at the University of Notre Dame, January 11-13, 1976 are presented. Subjects of discussion included: partoral issues for the church today; Christian scholars and the work of the church; the role of a Catholic university or college in advancing evangelization in the American context; relation between the American…

  19. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  20. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  1. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  2. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  3. The Quest for Historical Context.

    ERIC Educational Resources Information Center

    Aronson, Marc

    2000-01-01

    Explains how the author put a young adult book on Sir Walter Raleigh into the proper historical context. Describes reading other authors about the Elizabethan period and discovering the passions that motivated explorers, and suggests further reading on Sir Walter Raleigh and this period in history. (LRW)

  4. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  5. Understanding Career Choices in Context.

    ERIC Educational Resources Information Center

    Minor, Carole W.; Vermeulen, Mary E.; Coy, Doris Rhea

    Over several years, challenges have been made to traditional theories of career choice. One of these challenges has been to consider the contexts in which individuals live and how this can influence career choices. The purpose of this model is to create a framework to explain the influences on career choices over the lifespan. The term "career…

  6. Contexts of Social Studies Education.

    ERIC Educational Resources Information Center

    Lunstrum, John P.

    1990-01-01

    Examines the "Handbook of Research on Social Studies Teaching and Learning's" section on context effect. Reviews influences that shape social studies, including research, student groups, family environment, mass media (especially television), testing, curriculum mandates, and local-to-national community pressures. (CH)

  7. Contexts of Music Classroom Management.

    ERIC Educational Resources Information Center

    Russell, Joan

    2000-01-01

    Presents a case study that focuses on the classroom management strategies of a music specialist teacher during a music lesson analyzing the structure, content, and pace of teaching as contextual factors. Explores the teacher's lesson in terms of individual, institutional, and cultural contexts and argues that the subject matter (music) is a…

  8. Houston, 2001: Context and Legacy

    ERIC Educational Resources Information Center

    Fouad, Nadya A.; McPherson, Robert H.; Gerstein, Larry; Blustein, David L.; Elman, Nancy; Helledy, Kristin Ihle; Metz, A. J.

    2004-01-01

    This article presents an overview of the Houston 2001 National Counseling Psychology Conference. The authors discuss the context for the 4th National Counseling Psychology Conference, document the process of decision making about the conference, and examine the content of the conference. The authors also examine a unique feature of the conference,…

  9. Creativity in a Cultural Context.

    ERIC Educational Resources Information Center

    Irwin, Rita L.; Reynolds, J. Karen

    1992-01-01

    Interviews with 20 Ojibwa artists and teachers in isolated and urban Ontario communities suggest that creative expression is tied to and defined by social, cultural, ethical, and historical contexts. Conditions necessary for fostering creativity include time; materials; and an atmosphere of cooperation, psychological safety, and psychological…

  10. Towards Context Sensitive Information Inference.

    ERIC Educational Resources Information Center

    Song, D.; Bruza, P. D.

    2003-01-01

    Discusses information inference from a psychologistic stance and proposes an information inference mechanism that makes inferences via computations of information flow through an approximation of a conceptual space. Highlights include cognitive economics of information processing; context sensitivity; and query models for information retrieval.…