Science.gov

Sample records for anonymizing weighted social

  1. Social distance and anonymity modulate fairness consideration: An ERP study

    PubMed Central

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  2. Anonymously Productive and Socially Engaged While Learning at Work

    ERIC Educational Resources Information Center

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  3. Skeleton of weighted social network

    NASA Astrophysics Data System (ADS)

    Zhang, X.; Zhu, J.

    2013-03-01

    In the literature of social networks, understanding topological structure is an important scientific issue. In this paper, we construct a network from mobile phone call records and use the cumulative number of calls as a measure of the weight of a social tie. We extract skeletons from the weighted social network on the basis of the weights of ties, and we study their properties. We find that strong ties can support the skeleton in the network by studying the percolation characters. We explore the centrality of w-skeletons based on the correlation between some centrality measures and the skeleton index w of a vertex, and we find that the average centrality of a w-skeleton increases as w increases. We also study the cumulative degree distribution of the successive w-skeletons and find that as w increases, the w-skeleton tends to become more self-similar. Furthermore, fractal characteristics appear in higher w-skeletons. We also explore the global information diffusion efficiency of w-skeletons using simulations, from which we can see that the ties in the high w-skeletons play important roles in information diffusion. Identifying such a simple structure of a w-skeleton is a step forward toward understanding and representing the topological structure of weighted social networks.

  4. Multilayer weighted social network model

    NASA Astrophysics Data System (ADS)

    Murase, Yohsuke; Török, János; Jo, Hang-Hyun; Kaski, Kimmo; Kertész, János

    2014-11-01

    Recent empirical studies using large-scale data sets have validated the Granovetter hypothesis on the structure of the society in that there are strongly wired communities connected by weak ties. However, as interaction between individuals takes place in diverse contexts, these communities turn out to be overlapping. This implies that the society has a multilayered structure, where the layers represent the different contexts. To model this structure we begin with a single-layer weighted social network (WSN) model showing the Granovetterian structure. We find that when merging such WSN models, a sufficient amount of interlayer correlation is needed to maintain the relationship between topology and link weights, while these correlations destroy the enhancement in the community overlap due to multiple layers. To resolve this, we devise a geographic multilayer WSN model, where the indirect interlayer correlations due to the geographic constraints of individuals enhance the overlaps between the communities and, at the same time, the Granovetterian structure is preserved.

  5. Against anonymity.

    PubMed

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540

  6. Against anonymity.

    PubMed

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  7. To name or not to name? An overview of the social and ethical issues raised by removing anonymity from sperm donors.

    PubMed

    Burr, Jennifer A

    2010-11-01

    The aim of this paper is to focus on the ethical issues raised by the removal of anonymity from sperm donors. The increasing currency of a 'right to genetic truth' is clearly visible in the drive to revise the legislation on donor anonymity in Western and European countries. The ethical debate is polarized between the 'right to privacy' of the donor or parent and the 'right to know' of the prospective child. However, it is evident that religious, social and cultural attitudes have an overarching impact on attitudes towards sperm donation generally and anonymity specifically. In Asian countries, the social and cultural heritage is hugely diverse and different from those of the West. This review considers the research exploring the complexity of ethical issues informing this debate, and argues that parent's decisions to reveal donor insemination origins to their children are highly complex and relate to a range of social and cultural attitudes that have not been addressed within the policy to remove anonymity from sperm donors.

  8. The bid to lose weight: impact of social media on weight perceptions, weight control and diabetes.

    PubMed

    Das, Leah; Mohan, Ranjini; Makaya, Tafadzwa

    2014-01-01

    Over the last decade the internet has come to permeate every aspect of our lives. With huge leaps in accessibility of the internet via mobile personal devices such as smart cellular phones and tablets, individuals are connected to the internet virtually all the time. It is no surprise therefore that social media now dominates the lives of many people within society. The authors take a look at how social media is influencing diabetes with particular focus on weight perception, weight management and eating behaviours. The authors explore the concept of how the advertising of Size 0 models and photo-shopping of images which are easily available on line and via social media is causing an increase in the number of young people with distorted body images. This has led to an increased number of people resorting to sometimes drastic weight loss programmes. We focus on the bid for 'low-fat' consumption and highlight how this could actually be leading to an increased risk for developing diabetes or worsening the complications of diabetes. We also discuss the increase of eating disorder in diabetes related to this distorted body image.

  9. Associations between Adolescents' Weight and Maladjustment Differ with Deviation from Weight Norms in Social Contexts

    ERIC Educational Resources Information Center

    Sutter, Carolyn; Nishina, Adrienne; Witkow, Melissa R.; Bellmore, Amy

    2016-01-01

    Background: In line with the reflected self-appraisal hypothesis, previous research finds associations between weight and maladjustment are strongest when there is a mismatch between individuals' weight and the weight norm of their social contexts. However, research has not considered associations in more proximal social contexts. We examined…

  10. Teammates and social influence affect weight loss outcomes in a team-based weight loss competition

    PubMed Central

    Leahey, Tricia M.; Kumar, Rajiv; Weinberg, Brad M.; Wing, Rena R.

    2013-01-01

    Team-based Internet interventions are increasing in popularity as a way of promoting weight loss in large numbers of individuals. Given that social networks influence health behavior change, this study investigated the effects of teammates and social influence on individual weight loss during a team-based weight loss competition. Shape Up Rhode Island 2009 was a 12-week online program open to adult residents of Rhode Island. Participants joined with a team and competed with other teams on weight loss and/or physical activity. OW/OB individuals (N=3,330; 76%female; age=46.1±10.8; BMI=31.2±5.3kg/m2), representing 987 teams, completed the weight loss program. Multilevel modeling was used to examine whether weight loss clustered among teammates and whether percentage of teammates in the weight loss division and reported teammate influence on weight loss were associated with individual weight outcomes. OW/OB completers reported losing 4.2±3.4% of initial body weight. Weight loss was similar among teammates (ICC=.10, p<.001). Moreover, having a greater percentage of teammates in the weight loss division and reporting higher social influence for weight loss were associated with greater percent weight loss (p’s≤.002). Similarly, achieving a clinically significant (5%) weight loss tended to cluster within teams (ICC=0.09;p<.001) and having more teammates in the weight loss division and higher social influence for weight loss were associated with increased likelihood of achieving a 5% weight loss (OR=1.06; OR=1.20, respectively). These results suggest that teammates affect weight loss outcomes during a team-based intervention. Harnessing and maximizing teammate influence for weight loss may enhance weight losses in large-scale team-based weight loss programs. PMID:22310234

  11. An Anonymity Revocation Technology for Anonymous Communication

    NASA Astrophysics Data System (ADS)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  12. Quantum anonymous voting with anonymity check

    NASA Astrophysics Data System (ADS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-02-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  13. True Anonymity Without Mixes

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail message have been used in the Internet for several years by senders of e-mail messages who do not wish to disclose their identity. Unfortunately, the degree of anonymity provided by this paradigm is limited and fragile. First, the messages sent are not truly anonymous but pseudo-anonymous since one of the mixes, at least, always knows the sender's identity. Secondly, the strength of the system to protect the sender's identity depends on the ability and the willingness of the mixes to keep the secret. If the mixes fail, the sender/'s anonymity is reduced to pieces. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet where the anonymous message is sent from a PDA which uses dynamically assigned temporary, non-personal, random IP and MAC addresses. Anonymous E-cash is used to pay for the service.

  14. [Anonymity and gamete donation].

    PubMed

    Bujan, L; Le Lannou, D; Kunstmann, J-M

    2012-08-01

    In France the gamete donation is based on the major principles: anonymity, no payment, solidarity and this mode of procreation can be used only if a medical indication is present in recipient couples. In prerequisite and during the revision of the law of bioethics, a wide debate took place about the anonymity of gamete donation. The objectives of this article is to review the concept of the anonymity and its links with the questions of the origin, the secret of the modalities of the conception and the mourning of the fertility, children, donors and the recipient couples waiting for gamete donation. The international situation is also addressed. The contribution of the CECOS, the centers which practice the sperm and the egg donations is highlighted. The anonymity cannot be discussed without addressing all these links and the complexity of this particular mode of conception. To date, the French society has maintained the anonymity in the new law of bioethics. PMID:23141592

  15. Positioning of Weight Bias: Moving towards Social Justice

    PubMed Central

    Alberga, Angela S.; Kassan, Anusha; Sesma-Vazquez, Monica

    2016-01-01

    Weight bias is a form of stigma with detrimental effects on the health and wellness of individuals with large bodies. Researchers from various disciplines have recognized weight bias as an important topic for public health and for professional practice. To date, researchers from various areas have approached weight bias from independent perspectives and from differing theoretical orientations. In this paper, we examined the similarities and differences between three perspectives (i.e., weight-centric, non-weight-centric (health-centric), and health at every size) used to understand weight bias and approach weight bias research with regard to (a) language about people with large bodies, (b) theoretical position, (c) identified consequences of weight bias, and (d) identified influences on weight-based social inequity. We suggest that, despite differences, each perspective acknowledges the negative influences that position weight as being within individual control and the negative consequences of weight bias. We call for recognition and discussion of weight bias as a social justice issue in order to change the discourse and professional practices extended towards individuals with large bodies. We advocate for an emphasis on social justice as a uniting framework for interdisciplinary research on weight bias. PMID:27747099

  16. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  17. Children's judgements and emotions about social exclusion based on weight.

    PubMed

    Nguyen, Christine; Malti, Tina

    2014-09-01

    This study examined children's judgements and emotions associated with weight-based social exclusion using an ethnically diverse sample of one hundred and seventeen 9- and 13-year-old children. Children were interviewed about three scenarios depicting weight-based exclusion in athletic, academic, and social contexts. Children's judgements of exclusion, emotions attributed to the excluder and excluded targets, and justifications for judgements and emotions were examined. Overall, children judged weight-based exclusion to be wrong for moral reasons. However, they viewed weight-based exclusion in athletic contexts as less wrong compared with academic contexts, and they used more social-conventional reasoning to justify judgements and emotions attributed to excluders in athletic contexts compared with academic and social contexts. Children also expected excluded targets to feel negative emotions, whereas a range of positive and negative emotions was attributed to excluders. In addition, older children were more accepting of weight-based exclusion in athletic contexts than in academic and social contexts. We discuss the results in relation to the development of children's understanding of, and emotions associated with, exclusion based on weight.

  18. Social embeddedness in an online weight management programme is linked to greater weight loss

    PubMed Central

    Poncela-Casasnovas, Julia; Spring, Bonnie; McClary, Daniel; Moller, Arlen C.; Mukogo, Rufaro; Pellegrini, Christine A.; Coons, Michael J.; Davidson, Miriam; Mukherjee, Satyam; Nunes Amaral, Luis A.

    2015-01-01

    The obesity epidemic is heightening chronic disease risk globally. Online weight management (OWM) communities could potentially promote weight loss among large numbers of people at low cost. Because little is known about the impact of these online communities, we examined the relationship between individual and social network variables, and weight loss in a large, international OWM programme. We studied the online activity and weight change of 22 419 members of an OWM system during a six-month period, focusing especially on the 2033 members with at least one friend within the community. Using Heckman's sample-selection procedure to account for potential selection bias and data censoring, we found that initial body mass index, adherence to self-monitoring and social networking were significantly correlated with weight loss. Remarkably, greater embeddedness in the network was the variable with the highest statistical significance in our model for weight loss. Average per cent weight loss at six months increased in a graded manner from 4.1% for non-networked members, to 5.2% for those with a few (two to nine) friends, to 6.8% for those connected to the giant component of the network, to 8.3% for those with high social embeddedness. Social networking within an OWM community, and particularly when highly embedded, may offer a potent, scalable way to curb the obesity epidemic and other disorders that could benefit from behavioural changes. PMID:25631561

  19. Social embeddedness in an online weight management programme is linked to greater weight loss.

    PubMed

    Poncela-Casasnovas, Julia; Spring, Bonnie; McClary, Daniel; Moller, Arlen C; Mukogo, Rufaro; Pellegrini, Christine A; Coons, Michael J; Davidson, Miriam; Mukherjee, Satyam; Nunes Amaral, Luis A

    2015-03-01

    The obesity epidemic is heightening chronic disease risk globally. Online weight management (OWM) communities could potentially promote weight loss among large numbers of people at low cost. Because little is known about the impact of these online communities, we examined the relationship between individual and social network variables, and weight loss in a large, international OWM programme. We studied the online activity and weight change of 22,419 members of an OWM system during a six-month period, focusing especially on the 2033 members with at least one friend within the community. Using Heckman's sample-selection procedure to account for potential selection bias and data censoring, we found that initial body mass index, adherence to self-monitoring and social networking were significantly correlated with weight loss. Remarkably, greater embeddedness in the network was the variable with the highest statistical significance in our model for weight loss. Average per cent weight loss at six months increased in a graded manner from 4.1% for non-networked members, to 5.2% for those with a few (two to nine) friends, to 6.8% for those connected to the giant component of the network, to 8.3% for those with high social embeddedness. Social networking within an OWM community, and particularly when highly embedded, may offer a potent, scalable way to curb the obesity epidemic and other disorders that could benefit from behavioural changes.

  20. Social embeddedness in an online weight management programme is linked to greater weight loss.

    PubMed

    Poncela-Casasnovas, Julia; Spring, Bonnie; McClary, Daniel; Moller, Arlen C; Mukogo, Rufaro; Pellegrini, Christine A; Coons, Michael J; Davidson, Miriam; Mukherjee, Satyam; Nunes Amaral, Luis A

    2015-03-01

    The obesity epidemic is heightening chronic disease risk globally. Online weight management (OWM) communities could potentially promote weight loss among large numbers of people at low cost. Because little is known about the impact of these online communities, we examined the relationship between individual and social network variables, and weight loss in a large, international OWM programme. We studied the online activity and weight change of 22,419 members of an OWM system during a six-month period, focusing especially on the 2033 members with at least one friend within the community. Using Heckman's sample-selection procedure to account for potential selection bias and data censoring, we found that initial body mass index, adherence to self-monitoring and social networking were significantly correlated with weight loss. Remarkably, greater embeddedness in the network was the variable with the highest statistical significance in our model for weight loss. Average per cent weight loss at six months increased in a graded manner from 4.1% for non-networked members, to 5.2% for those with a few (two to nine) friends, to 6.8% for those connected to the giant component of the network, to 8.3% for those with high social embeddedness. Social networking within an OWM community, and particularly when highly embedded, may offer a potent, scalable way to curb the obesity epidemic and other disorders that could benefit from behavioural changes. PMID:25631561

  1. The role of social support in weight loss maintenance: results from the MedWeight study.

    PubMed

    Karfopoulou, Eleni; Anastasiou, Costas A; Avgeraki, Evangelia; Kosmidis, Mary H; Yannakoulia, Mary

    2016-06-01

    The role of social support in weight management is not fully understood, as more support has been linked to both favorable and unfavorable outcomes. We examined social support in relation to weight loss maintenance, comparing between maintainers and regainers of weight loss. The MedWeight study is a Greek registry of people who have intentionally lost ≥10 % of their weight and are either maintaining this loss for over a year (maintainers), or have regained weight (regainers). Demographics and lifestyle habits questionnaires are completed online. Dietary assessment is carried out by two telephone 24 h recalls. Perceived social support was assessed by validated scales examining support from family and friends regarding healthy eating and exercise. 289 maintainers and 122 regainers participated. Regainers received more support compared to maintainers. However, maintainers reported receiving compliments and active participation, whereas regainers receiving verbal instructions and encouragements. Maintainers who received diet support displayed improved dietary intakes, such as lower energy intake; regainers' diet was unaffected by support. Positive, rather than instructive, support appears beneficial in weight loss maintenance.

  2. Altruism and anonymity: A behavioral analysis.

    PubMed

    Locey, Matthew L; Rachlin, Howard

    2015-09-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting - the rate at which increases in social distance decrease value to the participant - was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  3. Altruism and anonymity: A behavioral analysis.

    PubMed

    Locey, Matthew L; Rachlin, Howard

    2015-09-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting - the rate at which increases in social distance decrease value to the participant - was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation.

  4. Altruism and Anonymity: A Behavioral Analysis

    PubMed Central

    Locey, Matthew L.; Rachlin, Howard

    2015-01-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting – the rate at which increases in social distance decrease value to the participant – was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  5. Social Dynamics of a University Weight Room: A Microethnography.

    ERIC Educational Resources Information Center

    Ittenbach, Richard F.; Chissom, Brad S.

    The purpose of this investigation was to describe and explain the social dynamics of America's second most popular recreational sport, weight lifting, as performed on a university campus. Data were collected and analyzed using the participant observation approach to grounded theory research. Several hypotheses evolved from this analysis: (1) it is…

  6. Narcotics Anonymous: Understanding the "Bridge of Recovery."

    ERIC Educational Resources Information Center

    Ronel, Natti

    1998-01-01

    Narcotics Anonymous (NA) is investigated as a subculture of recovery bridging the drug subculture and the prevailing culture. A phenomenological study of NA in Israel is reported. Innovation, cultural conflict, the value of recovery and its norms, supporting social mechanisms, limitations of the program, and intercultural attributes are…

  7. Relationships among Subjective Social Status, Weight Perception, Weight Control Behaviors, and Weight Status in Adolescents: Findings from the 2009 Korea Youth Risk Behaviors Web-Based Survey

    ERIC Educational Resources Information Center

    Ha, Yeongmi; Choi, Eunsook; Seo, Yeongmi; Kim, Tae-gu

    2013-01-01

    Background: This study identified relationships among subjective social status (SSS), weight perception, weight control behaviors, and weight status in Korean adolescents using nationally representative data collected from the 2009 Korea Youth Risk Behaviors Web-Based Survey. Methods: Data from 67,185 students aged 12-18 years were analyzed.…

  8. The influence of social power on weight perception.

    PubMed

    Lee, Eun Hee; Schnall, Simone

    2014-08-01

    Three studies explored whether social power affects the perception of physical properties of objects, testing the hypothesis that the powerless find objects to be heavier than the powerful do. Correlational findings from Study 1 revealed that people with a low personal sense of power perceived loaded boxes to be heavier than people with a high personal sense of power perceived them to be. In Study 2, experimentally manipulated power indicated that participants in the powerless condition judged the boxes to be heavier than did participants in the powerful condition. Study 3 further indicated that lacking power actively influences weight perception relative to a neutral control condition, whereas having power does not. Although much research on embodied perception has shown that various physiological and psychosocial resources influence visual perception of the physical environment, this is the first demonstration suggesting that power, a psychosocial construct that relates to the control of resources, changes the perception of physical properties of objects.

  9. Privacy, anonymity and subjectivity in genomic research.

    PubMed

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729

  10. Privacy, anonymity and subjectivity in genomic research.

    PubMed

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues.

  11. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  12. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  13. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  14. Your Health Buddies Matter: Preferential Selection and Social Influence on Weight Management in an Online Health Social Network.

    PubMed

    Meng, Jingbo

    2016-12-01

    A growing number of online social networks are designed with the intention to promote health by providing virtual space wherein individuals can seek and share information and support with similar others. Research has shown that real-world social networks have a significant influence on one's health behavior and outcomes. However, there is a dearth of studies on how individuals form social networks in virtual space and whether such online social networks exert any impact on individuals' health outcomes. Built on the Multi-Theoretical Multilevel (MTML) framework and drawing from literature on social influence, this study examined the mechanisms underlying the formation of an online health social network and empirically tested social influence on individual health outcomes through the network. Situated in a weight management social networking site, the study tracked a health buddy network of 709 users and their weight management activities and outcomes for 4 months. Actor-based modeling was used to test the joint dynamics of preferential selection and social influence among health buddies. The results showed that baseline, inbreeding, and health status homophily significantly predicted preferential selection of health buddies in the weight management social networking site, whereas self-interest in seeking experiential health information did not. The study also found peer influence of online health buddy networks on individual weight outcomes, such that an individual's odds of losing weight increased if, on average, the individual's health buddies were losing weight. PMID:27055008

  15. A qualitative investigation of obese women's experiences of effective and ineffective social support for weight management.

    PubMed

    Zwickert, K; Rieger, E

    2014-10-01

    An obese individual's social context influences the extent to which they engage in weight control behaviors. Although the available literature acknowledges the importance of social support for weight management, detailed analyses of obese individuals' experiences of social support for weight loss and/or weight loss maintenance have not been undertaken. Using a qualitative approach, this study presents 22 Australian obese women's perspectives of the availability and effectiveness of social support for weight control. Three superordinate categories, namely, ineffective support, effective support and personal barriers to accessing support, and 12 subcategories were identified. Participants reported minimal access to quality support for weight management, while also suggesting ways in which obese women themselves may hamper significant others' provision of effective support. The results support the investigation of interventions designed to enhance the skills of significant others in assisting obese individuals with weight management.

  16. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  17. Reconstructing Spatial Distributions from Anonymized Locations

    SciTech Connect

    Horey, James L; Forrest, Stephanie; Groat, Michael

    2012-01-01

    Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many real-world scenarios.

  18. Repeated Measures in Case Studies Relating Social Competence and Weight Loss in Two Obese Adolescents

    ERIC Educational Resources Information Center

    Meyer, Sonia Beatriz; Barbosa, Debora Regina

    2007-01-01

    In individual behavior therapy two clients were evaluated using behavior categories created by the therapist. Both clients were observed to improve in terms of social competence. One demonstrated a significant inverse correlation between improvement of social competence and weight loss during treatment (16 sessions) and lost weight. The other…

  19. Repeated Measures in Case Studies Relating Social Competence and Weight Loss in Two Obese Adolescents

    ERIC Educational Resources Information Center

    Meyer, Sonia Beatriz; Barbosa, Debora Regina

    2009-01-01

    In individual behavior therapy two clients were evaluated using behavior categories created by the therapist. Both clients were observed to improve in terms of social competence. One demonstrated a significant inverse correlation between improvement of social competence and weight loss during treatment (16 sessions) and lost weight. The other…

  20. The relationship of weight loss, locus of control, and social support.

    PubMed

    Gierszewski, S A

    1983-01-01

    This study investigated the relationship between weight loss, locus of control, and social support. It was hypothesized that internals would be more successful in weight reduction than externals/powerful others or externals/chance; that participants with higher social-support scores would be more successful in weight reduction than participants with lower social support scores; and that social support would contribute more to success in weight reduction in externals/powerful others than in internals or externals/chance. Subjects were 46 female employees of a large life insurance company who had participated in a nutrition and weight control program. They were studied six months later to assess weight change, locus of control (specifically, using a multidimensional health locus of control scale and a modified weight locus of control scale) and social support (using an investigator-developed scale). Study findings did not support the hypotheses. Rather, a significant negative relationship was found between social support and weight reduction in the case of internals. Possible explanations for the findings were discussed, along with recommendations for practice and further research. For example, it was suggested that it may be most desirable for those attempting weight loss to be sufficiently internal that they believe they are capable of bringing their weight under control, yet sufficiently external that they are amenable to the advice of health professionals. PMID:6549843

  1. Sizing up Peers: Adolescent Girls' Weight Control and Social Comparison in the School Context

    ERIC Educational Resources Information Center

    Mueller, Anna S.; Pearson, Jennifer; Muller, Chandra; Frank, Kenneth; Turner, Alyn

    2010-01-01

    Using the National Longitudinal Study of Adolescent Health and multi-level modeling, we examine the role of social comparison with schoolmates in adolescent girls' weight control. Specifically, we focus on how girls' own weight control is influenced by the body sizes and weight-control behaviors of their schoolmates. Our findings suggest that…

  2. Nonresident Father Involvement, Social Class, and Adolescent Weight

    ERIC Educational Resources Information Center

    Menning, Chadwick L.; Stewart, Susan D.

    2008-01-01

    Body weight issues disproportionately affect children with nonresident fathers. Using data from the National Longitudinal Study of Adolescent Health, the authors investigate the relationship between nonresident father involvement and adolescent weight, specifically adolescents' risk of being underweight, overweight, and obese. The results show…

  3. Weight Loss Attitudes and Social Forces in Urban Poor Black and White Women

    PubMed Central

    Keith, NiCole R.; Hemmerlein, Kimberly A.; Clark, Daniel O.

    2015-01-01

    Objective To explore differences between Blacks and Whites in perceived influences on weight-related behaviors among obese urban poor women. Methods Participants (N = 27) received physician referrals to a weight loss program located in Federally Qualified Health Centers and either never attended or stopped attending. We conducted in-depth, in home interviews using a script informed by focus groups, pilot discussions, and the theory of planned behavior (TPB) to learn about participants’ weight loss attitudes, social forces and perceived behavioral control. Results White women reported having more social support and social pressure for weight management activities. Black women reported eating for positive reasons whereas white women associated eating with negative emotions. Conclusion Social networks and emotions may be critical factors in weight management and lifestyle program participation. PMID:25290595

  4. Revocable Anonymous Access to the Internet?

    ERIC Educational Resources Information Center

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  5. Yahtzee: An Anonymized Group Level Matching Procedure

    PubMed Central

    Jones, Jason J.; Bond, Robert M.; Fariss, Christopher J.; Settle, Jaime E.; Kramer, Adam D. I.; Marlow, Cameron; Fowler, James H.

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being “leaked” or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records. PMID:23441156

  6. Social engagement in adolescence moderates the association between weight status and body image.

    PubMed

    Caccavale, Laura J; Farhat, Tilda; Iannotti, Ronald J

    2012-03-01

    This study examined whether the association between adolescent weight status and body image varies by social engagement. A nationally representative sample of 6909 students in grades 6-10 completed the 2006 HBSC survey. Separate linear regressions for boys and girls, controlling for age, race/ethnicity and socioeconomic status, were conducted with an interaction term (weight status×social engagement). Adolescents' overweight/obese status was related to body dissatisfaction. Social engagement moderated the relationship between weight status and body image for girls but not for boys. Overweight/obese boys had more body dissatisfaction compared to their normal/underweight peers, regardless of their social engagement. However, overweight/obese girls with more social engagement were more likely to have body satisfaction compared to overweight/obese girls with less social engagement. Encouraging adolescent girls to develop healthy relationships with peers may prevent them from developing body dissatisfaction.

  7. Social engagement in adolescence moderates the association between weight status and body image.

    PubMed

    Caccavale, Laura J; Farhat, Tilda; Iannotti, Ronald J

    2012-03-01

    This study examined whether the association between adolescent weight status and body image varies by social engagement. A nationally representative sample of 6909 students in grades 6-10 completed the 2006 HBSC survey. Separate linear regressions for boys and girls, controlling for age, race/ethnicity and socioeconomic status, were conducted with an interaction term (weight status×social engagement). Adolescents' overweight/obese status was related to body dissatisfaction. Social engagement moderated the relationship between weight status and body image for girls but not for boys. Overweight/obese boys had more body dissatisfaction compared to their normal/underweight peers, regardless of their social engagement. However, overweight/obese girls with more social engagement were more likely to have body satisfaction compared to overweight/obese girls with less social engagement. Encouraging adolescent girls to develop healthy relationships with peers may prevent them from developing body dissatisfaction. PMID:22325852

  8. Evolutionary Games in Multi-Agent Systems of Weighted Social Networks

    NASA Astrophysics Data System (ADS)

    Du, Wen-Bo; Cao, Xian-Bin; Zheng, Hao-Ran; Zhou, Hong; Hu, Mao-Bin

    Much empirical evidence has shown realistic networks are weighted. Compared with those on unweighted networks, the dynamics on weighted network often exhibit distinctly different phenomena. In this paper, we investigate the evolutionary game dynamics (prisoner's dilemma game and snowdrift game) on a weighted social network consisted of rational agents and focus on the evolution of cooperation in the system. Simulation results show that the cooperation level is strongly affected by the weighted nature of the network. Moreover, the variation of time series has also been investigated. Our work may be helpful in understanding the cooperative behavior in the social systems.

  9. Information Processing Versus Social Cognitive Mediators of Weight Loss in a Podcast-Delivered Health Intervention

    PubMed Central

    Ko, Linda K.; Turner-McGrievy, Gabrielle; Campbell, Marci K.

    2016-01-01

    Podcasting is an emerging technology, and previous interventions have shown promising results using theory-based podcast for weight loss among overweight and obese individuals. This study investigated whether constructs of social cognitive theory and information processing theories (IPTs) mediate the effect of a podcast intervention on weight loss among overweight individuals. Data are from Pounds off Digitally, a study testing the efficacy of two weight loss podcast interventions (control podcast and theory-based podcast). Path models were constructed (n = 66). The IPTs—elaboration likelihood model, information control theory, and cognitive load theory—mediated the effect of a theory-based podcast on weight loss. The intervention was significantly associated with all IPTs. Information control theory and cognitive load theory were related to elaboration, and elaboration was associated with weight loss. Social cognitive theory constructs did not mediate weight loss. Future podcast interventions grounded in theory may be effective in promoting weight loss. PMID:24082027

  10. Information processing versus social cognitive mediators of weight loss in a podcast-delivered health intervention.

    PubMed

    Ko, Linda K; Turner-McGrievy, Gabrielle M; Campbell, Marci K

    2014-04-01

    Podcasting is an emerging technology, and previous interventions have shown promising results using theory-based podcast for weight loss among overweight and obese individuals. This study investigated whether constructs of social cognitive theory and information processing theories (IPTs) mediate the effect of a podcast intervention on weight loss among overweight individuals. Data are from Pounds off Digitally, a study testing the efficacy of two weight loss podcast interventions (control podcast and theory-based podcast). Path models were constructed (n = 66). The IPTs, elaboration likelihood model, information control theory, and cognitive load theory mediated the effect of a theory-based podcast on weight loss. The intervention was significantly associated with all IPTs. Information control theory and cognitive load theory were related to elaboration, and elaboration was associated with weight loss. Social cognitive theory constructs did not mediate weight loss. Future podcast interventions grounded in theory may be effective in promoting weight loss.

  11. The intergenerational correlation in weight: How genetic resemblance reveals the social role of families*

    PubMed Central

    Martin, Molly A.

    2009-01-01

    According to behavioral genetics research, the intergenerational correlation in weight derives solely from shared genetic predispositions, but complete genetic determinism contradicts the scientific consensus that social and behavioral change underlies the modern obesity epidemic. To address this conundrum, this article utilizes sibling data from the National Longitudinal Study of Adolescent Health and extends structural equation sibling models to incorporate siblings’ genetic relationships to explore the role of families’ social characteristics for adolescent weight. The article is the first to demonstrate that the association between parents’ obesity and adolescent weight is both social and genetic. Furthermore, by incorporating genetic information, the shared and social origins of the correlation between inactivity and weight are better revealed. PMID:19569401

  12. Protecting Privacy Using k-Anonymity

    PubMed Central

    El Emam, Khaled; Dankar, Fida Kamal

    2008-01-01

    Objective There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Design Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Measurement Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. Results For one of the re-identification scenarios, k-Anonymity consistently over-anonymizes data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions to the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. Conclusion Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity. PMID:18579830

  13. The interplay between gender, race and weight status: self perceptions and social consequences.

    PubMed

    Fletcher, Jason M

    2014-07-01

    This paper uses data from nearly 15,000 young adult respondents to the Add Health survey to examine racial and gender differences in the perceptions and social rewards to weight. The data include information on several typically unmeasured domains: self-perceptions of ideal weight, attractiveness ratings, and measured weight information, along with ties to a series of adult outcomes. Results show important gender and racial differences in ideal weight as well as differences for both self-perceived attractiveness and interviewer rated attractiveness. Findings also suggest the existence of large differences in socio-cultural rewards and sanctions for weight status. Black respondents, particularly women, appear to receive lower "obesity penalties" in both their self-perceived and interviewer accessed attractiveness ratings than other groups. These findings suggest the need to consider new classes of policies directed at shifting relative social benefits and consequences to weight status.

  14. Anonymous and non-anonymous oocyte donation preliminary results.

    PubMed

    Junca, A M; Cohen, J; Mandelbaum, J; Alnot, M O; Debache, C; Plachot, M; Pez, J P

    1988-01-01

    During the past year, we have developed an oocyte donation programme in 10 patients with complete absence of endogenous ovarian function (premature ovarian failure in seven cases, castration in two cases and Turner's syndrome in one case). In cases of anonymous donation, donors were volunteers devoid of any major genetical risk who were included in our IVF programme and who consented to donate one oocyte when at least seven oocytes were recovered, and two oocytes when at least 11 oocytes were recovered, to a recipient couple. As far as possible, morphological characteristics of both couples were paired. In cases of non-anonymous donation, donors were 'affective' donors, having at least one child. The resulting embryos after IVF of donated oocytes were either replaced directly in recipient women which required synchronization of the donor's and recipient's cycles, or cryopreserved and then thawed, usually at day 16 of recipient's artificial cycle, i.e. 2 days after introduction of the progestational compound. On the 10 patients entering this oocyte donation programme (20 cycles), 13 transfers were carried out resulting in four clinical pregnancies in three patients with premature ovarian failure and one with Turner's syndrome (20% pregnancy per cycle and 31% per transfer). Despite the small numbers, these good results prompted us to develop this protocol. PMID:3350933

  15. A review of Alcoholics Anonymous/ Narcotics Anonymous programs for teens.

    PubMed

    Sussman, Steve

    2010-03-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/ NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed. PMID:20164105

  16. Information Processing Versus Social Cognitive Mediators of Weight Loss in a Podcast-Delivered Health Intervention

    ERIC Educational Resources Information Center

    Ko, Linda K.; Turner-McGrievy, Gabrielle M.; Campbell, Marci K.

    2014-01-01

    Podcasting is an emerging technology, and previous interventions have shown promising results using theory-based podcast for weight loss among overweight and obese individuals. This study investigated whether constructs of social cognitive theory and information processing theories (IPTs) mediate the effect of a podcast intervention on weight loss…

  17. Social Stress Increases Cortisol and Hampers Attention in Adolescents with Excess Weight

    PubMed Central

    Verdejo-Garcia, Antonio; Moreno-Padilla, Maria; Garcia-Rios, M. Carmen; Lopez-Torrecillas, Francisca; Delgado-Rico, Elena; Schmidt-Rio-Valle, Jacqueline; Fernandez-Serrano, Maria J.

    2015-01-01

    Objective To experimentally examine if adolescents with excess weight are more sensitive to social stress and hence more sensitive to harmful effects of stress in cognition. Design and Methods We conducted an experimental study in 84 adolescents aged 12 to 18 years old classified in two groups based on age adjusted Body Mass Index percentile: Normal weight (n=42) and Excess weight (n=42). Both groups were exposed to social stress as induced by the virtual reality version of the Trier Social Stress Task --participants were requested to give a public speech about positive and negative aspects of their personalities in front of a virtual audience. The outcome measures were salivary cortisol levels and performance in cognitive tests before and after the social stressor. Cognitive tests included the CANTAB Rapid Visual Processing Test (measuring attention response latency and discriminability) and the Iowa Gambling Task (measuring decision-making). Results Adolescents with excess weight compared to healthy weight controls displayed increased cortisol response and less improvement of attentional performance after the social stressor. Decision-making performance decreased after the social stressor in both groups. Conclusion Adolescents who are overweight or obese have increased sensitivity to social stress, which detrimentally impacts attentional skills. PMID:25898204

  18. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  19. Associations between body weight and depression, social phobia, insomnia, and self-esteem among Taiwanese adolescents.

    PubMed

    Lee, Jia-In; Yen, Cheng-Fang

    2014-12-01

    The aims of this cross-sectional study were to examine the associations between body weight and mental health indicators including depression, social phobia, insomnia, and self-esteem among Taiwanese adolescents in Grades 7-12. The body mass index (BMI) of 5254 adolescents was calculated based on self-reported weight and height measurements. Body weight status was determined by the age- and gender-specific International Obesity Task Force reference tables. By using participants of average weight as the reference group, the association between body weight status (underweight, overweight, and obesity) and mental health indicators (depression, social phobia, insomnia, and self-esteem) were examined by using multiple regression analysis. The possible moderating effects of sociodemographic characteristics on the association were also examined. After controlling for the effects of sociodemographic characteristics, both overweight (p < 0.05) and obese adolescents (p < 0.001) had a lower level of self-esteem than did those of average weight; however, no significant differences in depression, social phobia, or insomnia were found between those who were overweight/obese and those of average weight. No significant differences in the four mental health indicators were found between those who were underweight and those of average weight. Sociodemographic characteristics had no moderating effect on the association between body weight and mental health indicators. In conclusion, mental health and school professionals must take the association between overweight/obesity and self-esteem into consideration when approaching the issue of mental health among adolescents.

  20. Using Boolean reasoning to anonymize databases.

    PubMed

    Ohrn, A; Ohno-Machado, L

    1999-03-01

    This paper investigates how Boolean reasoning can be used to make the records in a database anonymous. In a medical setting, this is of particular interest due to privacy issues and to prevent the possible misuse of confidential information. As electronic medical records and medical data repositories get more common and widespread, the issue of making sensitive data anonymous becomes increasingly important. A theoretically well-founded algorithm is proposed that via cell suppression can be used to make a database anonymous before releasing or sharing it to the outside world. The degree of anonymity can be tailored according to the specific needs of the recipient, and according to the amount of trust we place in the recipient. Furthermore, the required measure of anonymity can be specified as far down as to the individual objects in the database. The algorithm can also be used for anonymization relative to a particular piece of information, effectively blocking deterministic inferences about sensitive database fields.

  1. Dysfunctional involvement of emotion and reward brain regions on social decision making in excess weight adolescents.

    PubMed

    Verdejo-García, Antonio; Verdejo-Román, Juan; Rio-Valle, Jacqueline S; Lacomba, Juan A; Lagos, Francisco M; Soriano-Mas, Carles

    2015-01-01

    Obese adolescents suffer negative social experiences, but no studies have examined whether obesity is associated with dysfunction of the social brain or whether social brain abnormalities relate to disadvantageous traits and social decisions. We aimed at mapping functional activation differences in the brain circuitry of social decision making in adolescents with excess versus normal weight, and at examining whether these separate patterns correlate with reward/punishment sensitivity, disordered eating features, and behavioral decisions. In this fMRI study, 80 adolescents aged 12 to 18 years old were classified in two groups based on age adjusted body mass index (BMI) percentiles: normal weight (n = 44, BMI percentiles 5th-84th) and excess weight (n = 36, BMI percentile ≥ 85th). Participants were scanned while performing a social decision-making task (ultimatum game) in which they chose to "accept" or "reject" offers to split monetary stakes made by another peer. Offers varied in fairness (Fair vs. Unfair) but in all cases "accepting" meant both players win the money, whereas "rejecting" meant both lose it. We showed that adolescents with excess weight compared to controls display significantly decreased activation of anterior insula, anterior cingulate, and midbrain during decisions about Unfair versus Fair offers. Moreover, excess weight subjects show lower sensitivity to reward and more maturity fears, which correlate with insula activation. Indeed, blunted insula activation accounted for the relationship between maturity fears and acceptance of unfair offers. Excess weight adolescents have diminished activation of brain regions essential for affective tracking of social decision making, which accounts for the association between maturity fears and social decisions. PMID:25168709

  2. Workplace Social and Organizational Environments and Healthy-Weight Behaviors

    PubMed Central

    Tabak, Rachel G.; Hipp, J. Aaron; Marx, Christine M.; Brownson, Ross C.

    2015-01-01

    Background The workplace is an important setting for health promotion including nutrition and physical activity behaviors to prevent obesity. This paper explores the relationship between workplace social environment and cultural factors and diet and physical activity (PA) behaviors and obesity among employees. Methods Between 2012 and 2013, telephone interviews were conducted with participants residing in four Missouri metropolitan areas. Questions included demographic characteristics, workplace socio/organizational factors related to activity and diet, and individual diet and PA behaviors, and obesity. Multivariate logistic regression was used to examine associations between the workplace socio/organizational environment and nutrition, PA, and obesity. Results There were differences in reported health behaviors and socio/organizational environment by gender, race, age, income, and worksite size. For example, agreement with the statement the ‘company values my health’ was highest among Whites, older employees, and higher income workers. As worksite size increased, the frequency of reporting seeing co-workers doing several types of healthy behaviors (eat fruits and vegetables, doing PA, and doing PA on breaks at work) increased. In adjusted analyses, employees agreeing the company values my health were more likely to engage in higher PA levels (aOR=1.54, 95% CI: 1.09-2.16) and less likely to be obese (aOR=0.73, 95% CI: 0.54-0.98). Seeing co-workers eating fruits and vegetables was associated with increased reporting of eating at least one vegetable per day (aOR=1.43, 95% CI: 1.06-1.91) and seeing co-workers being active was associated with higher PA levels (aOR 1.56, 95% CI: 1.19-2.05). Conclusions This research suggests that social/organizational characteristics of the workplace environment, particularly feeling the company values the workers’ health and to seeing co-workers engaging in healthy behaviors, may be related to nutrition and PA behaviors and

  3. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    PubMed

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity.

  4. Social support, perceptions of attractiveness, weight, and the CPI in socially anxious males and females.

    PubMed

    Haemmerlie, F M; Montgomery, R L; Melchers, J

    1988-05-01

    To see how socially anxious people function in a number of domains, Watson and Friend's (1969) Social Avoidance and Distress Scale (SAD) was administered to 101 undergraduates along with the California Personality Inventory (CPI) and the Psychosocial Support Inventory (PSI), a measure of social support. Additionally, a perceived attractiveness measure and various measures related to being overweight were taken. SAD scores correlated significantly in a negative direction with 13 of the 18 CPI scales, and those with high SAD scores had poorer social support networks. High SAD scores also were related to the perception of being overweight, but not to perceived physical attractiveness or to actually being overweight. Gender differences showed that females had more intimate social interactions and that socially anxious females relied more on their family for social support than did other people. Overall, the results suggested that the socially anxious person may have deficits in a variety of personal and interpersonal domains.

  5. The determinants of misreporting weight and height: The role of social norms.

    PubMed

    Gil, Joan; Mora, Toni

    2011-01-01

    Given the lack of availability of measured anthropometric data for the whole of Spain, this paper combines data from the 2006 Catalan Health and Health Examination Surveys to compute the size of weight and height self-reporting biases. The underlying determinants of these biases are then analyzed, placing special emphasis on the role played by social norms. Our findings show that social norms regarding "ideal" weight (proxied by the average weight of a reference group based on gender and age) tend to affect the self-reporting weight (relative) bias. This finding suggests that the more satisfied individuals feel with their own body image the less prone they are to under-report their weight, although this effect is contingent upon the definition of social norms and the correction of endogeneity. However, we found no evidence of a similar impact caused by the social norms governing height. The relationship found between the measured and self-reported anthropometric data was applied to the Spanish National Health Survey (NHS) so as to correct the self-reported information contained in it. After correcting for self-reporting errors, both the BMI and the prevalence of obesity were found to be significantly underestimated, with instances of misreporting being more prevalent among women.

  6. Anonymity in Classroom Voting and Debating

    ERIC Educational Resources Information Center

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  7. Self-tallying quantum anonymous voting

    NASA Astrophysics Data System (ADS)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  8. Legal Issues in Anonymity and Pseudonymity.

    ERIC Educational Resources Information Center

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  9. School-Based Obesity Policy, Social Capital, and Gender Differences in Weight Control Behaviors

    PubMed Central

    Thomas, Breanca

    2013-01-01

    Objectives. We examined the associations among school-based obesity policies, social capital, and adolescents’ self-reported weight control behaviors, focusing on how the collective roles of community and adopted policies affect gender groups differently. Methods. We estimated state-level ecologic models using 1-way random effects seemingly unrelated regressions derived from panel data for 43 states from 1991 to 2009, which we obtained from the Centers for Disease Control and Prevention’s Youth Risk Behavior Surveillance System. We used multiplicative interaction terms to assess how social capital moderates the effects of school-based obesity policies. Results. School-based obesity policies in active communities were mixed in improving weight control behaviors. They increased both healthy and unhealthy weight control behaviors among boys but did not increase healthy weight control behaviors among girls. Conclusions. Social capital is an important contextual factor that conditions policy effectiveness in large contexts. Heterogeneous behavioral responses are associated with both school-based obesity policies and social capital. Building social capital and developing policy programs to balance outcomes for both gender groups may be challenging in managing childhood obesity. PMID:23597368

  10. Varying social media post types differentially impacts engagement in a behavioral weight loss intervention.

    PubMed

    Hales, Sarah B; Davidson, Charis; Turner-McGrievy, Gabrielle M

    2014-12-01

    The purpose of this study was to examine whether different types of posts differentially affect participant engagement and if engagement with social media enhances weight loss. Data are a subanalysis from a randomized weight loss study with a 4-month follow-up support period via private Facebook groups and monthly meetings. Counselors posted five different post types/week based on social cognitive theory (weight-related, recipes, nutrition information, poll votes, or requests for suggestions). Types of participant engagement (likes, comments/poll votes, and views) were assessed. Poll votes were the most engaging (mean number of votes or comments/poll 14.6 ± 3.4, P < 0.01) followed by suggestions (9.1 ± 2.7 posts, P < 0.01) and weight-related posts (7.4 ± 3.1 posts, P < 0.01). Engagement with Facebook was significantly associated with weight loss during the 4-month maintenance period (B = -0.09, P = 0.04). The findings provide evidence for ways to provide social support during weight loss interventions using remote methodology.

  11. Varying social media post types differentially impacts engagement in a behavioral weight loss intervention.

    PubMed

    Hales, Sarah B; Davidson, Charis; Turner-McGrievy, Gabrielle M

    2014-12-01

    The purpose of this study was to examine whether different types of posts differentially affect participant engagement and if engagement with social media enhances weight loss. Data are a subanalysis from a randomized weight loss study with a 4-month follow-up support period via private Facebook groups and monthly meetings. Counselors posted five different post types/week based on social cognitive theory (weight-related, recipes, nutrition information, poll votes, or requests for suggestions). Types of participant engagement (likes, comments/poll votes, and views) were assessed. Poll votes were the most engaging (mean number of votes or comments/poll 14.6 ± 3.4, P < 0.01) followed by suggestions (9.1 ± 2.7 posts, P < 0.01) and weight-related posts (7.4 ± 3.1 posts, P < 0.01). Engagement with Facebook was significantly associated with weight loss during the 4-month maintenance period (B = -0.09, P = 0.04). The findings provide evidence for ways to provide social support during weight loss interventions using remote methodology. PMID:25584084

  12. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    PubMed

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731

  13. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    PubMed

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  14. Teacher and Friend Social Support: Association with Body Weight in African-American Adolescent Females.

    PubMed

    Stanford, Jevetta; Khubchandani, Jagdish; Webb, Fern J; Lee, Jenny; Doldren, Michelle; Rathore, Mobeen

    2015-09-01

    The purpose of this study was to examine the direct and indirect ecological influences of teacher and friend social support on body weight and diet behaviors in African-American adolescent females. Using a quantitative, cross-sectional research design, a convenience sample of 182 urban African-American adolescent females (12-17 years old) completed a 39-item questionnaire. The questionnaire assessed perceived teacher social support, friend social support, nutrition self-efficacy, and diet behaviors (with internal reliability values of scale items: alpha = 0.74, 0.81, 0.77, and 0.69 respectively). Anthropometric assessments were conducted to measure height and weight to compute BMI. Majority of the participants were in middle or early high school (65 %) and were overweight or obese (57.7 %). Both teacher social support and friend social support demonstrated a positive, indirect influence on child weight status through nutrition self-efficacy and diet behaviors following two different and specific paths of influence. Diet behaviors, in turn, demonstrated a positive, direct effect on child weight status. In the structural model, teacher social support had the greatest effect on diet behaviors, demonstrating a direct, positive influence on diet behaviors (B = 0.421, p < 0.05), but its direct effect on nutrition self-efficacy was not significant. Friend social support demonstrated a positive, direct effect on nutrition self-efficacy (B = 0.227, p < 0.05), but its direct effect on diet behaviors was not statistically significant. The study's findings call for actively addressing the childhood obesity epidemic in the school environment by implementing health behavior change strategies at various social and ecological environmental levels.

  15. The effect of very low birth weight and social risk on neurocognitive abilities at school age.

    PubMed

    Hack, M; Breslau, N; Aram, D; Weissman, B; Klein, N; Borawski-Clark, E

    1992-12-01

    We tested the hypothesis that very low birth weight (VLBW < 1.5 kg) children would have significantly poorer neurocognitive abilities at school age than would normal birth weight full-term age mates, that differences would persist after control for neurologic impairment and social risk, and that VLBW would interact with social risk. Two hundred forty-nine VLBW children and a randomly selected sample of 363 normal birth weight age mates born 1977 through 1979 were tested at 8 years. A neurologic examination and tests of intelligence, language, speech, reading, mathematics, spelling, visual and fine motor abilities, and behavior were performed. Twenty-four (10%) VLBW had a major neurologic abnormality compared with none of the controls. VLBW had significantly poorer scores on all tests, with the exception of speech and the total behavior score. These differences persisted among VLBW children without major neurologic abnormality, with the exception of social competence, reading, and spelling. Even normal IQ, neurologically normal VLBW had significantly poorer scores than did controls in expressive language, memory, visuomotor, and fine motor function, and measures of hyperactivity. When social risk was controlled in multiple regression analyses, VLBW still had an adverse effect on all outcome measures with the exception of speech. Social risk was, however, the major determinant of outcome. We found an interaction between VLBW and social risk only in verbal IQ and in the opposite direction than hypothesized.

  16. Social Network Characteristics Associated with Weight Loss among Black and Hispanic Adults with Overweight and Obesity

    PubMed Central

    Winston, Ginger; Phillips, Erica G.; Wethington, Elaine; Devine, Carol; Wells, Martin; Peterson, Janey C.; Hippolyte, Jessica; Ramos, Rosio; Martinez, Guillerma; Eldridge, Johanna; Charlson, Mary

    2015-01-01

    Objective To examine social network member characteristics associated with weight loss. Methods Cross-sectional examination of egocentric network data from 245 Black and Hispanic adults with BMI ≥ 25 kg/m2 enrolled in a small change weight loss study. The relationship between weight loss at 12 months and characteristics of helpful and harmful network members (relationship, contact frequency, living proximity and body size) were examined. Results There were 2,571 network members identified. Mean weight loss was -4.8 (±11.3) lbs. among participants with network help and no harm with eating goals vs. +3.4 (±7.8) lbs. among participants with network harm alone. In a multivariable regression model, greater weight loss was associated with help from a child with eating goals (p=.0002) and coworker help with physical activity (p=.01). Weight gain was associated with having network members with obesity living in the home (p=.048) and increased network size (p=.002). Conclusions There was greater weight loss among participants with support from children and coworkers. Weight gain was associated with harmful network behaviors and having network members with obesity in the home. Incorporating child and co-worker support, and evaluating network harm and the body size of network members should be considered in future weight loss interventions. PMID:26179578

  17. Feasibility of enlisting social network members to promote weight loss among Latinas.

    PubMed

    Marquez, Becky; Wing, Rena R

    2013-05-01

    Shaping network members into sources of support for healthy eating and exercise behaviors may be an effective strategy to enhance obesity treatment outcomes. This pilot study examined the feasibility and preliminary efficacy of a behavioral weight loss intervention adapted for Latinas with a social network component. Twenty-seven Latinas (43.0±10.2 years and body mass index 36.9±5.7) participated in a 24-week randomized controlled intervention study. Participants attended group-based treatment either individually (Individual Lifestyle Group [ILG]) or with a weight loss partner selected from their existing network (Partner Lifestyle Group [PLG]). Repeated measures analysis of variance was conducted to compare ILG and PLG participants on changes in weight or psychosocial variables. Participants in both intervention groups attended 70% of treatment sessions; 96% and 100% completed assessment at post-treatment (12 weeks) and follow-up (24 weeks), respectively. Significant weight loss (P<0.01) was achieved at post-treatment (ILG -4.7±4.2 kg and PLG -4.3±4.4 kg) and follow-up (ILG -5.0±6.4 kg and PLG -4.7±5.0 kg), with nearly 50% of participants losing at least 5% of initial body weight. Both groups also experienced increased self-efficacy for weight loss (P<0.01), self-efficacy for exercise (P=0.02), and family social support for exercise habits (P=0.01). There were no significant differences between groups. Results from this study suggest a behavioral weight loss intervention for Latinas is feasible, but there is less support for the efficacy of weight loss partners.

  18. Anon-Pass: Practical Anonymous Subscriptions.

    PubMed

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  19. The influence of body weight on social network ties among adolescents.

    PubMed

    Ali, Mir M; Amialchuk, Aliaksandr; Rizzo, John A

    2012-01-01

    Evidence of negative stereotypes, prejudice and discrimination towards obese individuals has been widely documented. However, the effect of a larger body size on social network ties or friendship formations is less well understood. In this paper, we explore the extent to which higher body weight results in social marginalization of adolescents. Using data from a nationally representative sample of adolescents, we estimate endogeneity-corrected models including school-level fixed effects that account for bi-directionality and unobserved confounders to ascertain the effect of body weight on social network ties. We find that obese adolescents have fewer friends and are less socially integrated than their non-obese counterparts. We also find that such penalties in friendship networks are present among whites but not African-Americans or Hispanics, with the largest effect among white females. These results are robust to common environmental influences at the school-level and to controls for preferences, risk attitudes, low self-esteem and objective measures of physical attractiveness.

  20. The socially weighted encoding of spoken words: a dual-route approach to speech perception

    PubMed Central

    Sumner, Meghan; Kim, Seung Kyung; King, Ed; McGowan, Kevin B.

    2014-01-01

    Spoken words are highly variable. A single word may never be uttered the same way twice. As listeners, we regularly encounter speakers of different ages, genders, and accents, increasing the amount of variation we face. How listeners understand spoken words as quickly and adeptly as they do despite this variation remains an issue central to linguistic theory. We propose that learned acoustic patterns are mapped simultaneously to linguistic representations and to social representations. In doing so, we illuminate a paradox that results in the literature from, we argue, the focus on representations and the peripheral treatment of word-level phonetic variation. We consider phonetic variation more fully and highlight a growing body of work that is problematic for current theory: words with different pronunciation variants are recognized equally well in immediate processing tasks, while an atypical, infrequent, but socially idealized form is remembered better in the long-term. We suggest that the perception of spoken words is socially weighted, resulting in sparse, but high-resolution clusters of socially idealized episodes that are robust in immediate processing and are more strongly encoded, predicting memory inequality. Our proposal includes a dual-route approach to speech perception in which listeners map acoustic patterns in speech to linguistic and social representations in tandem. This approach makes novel predictions about the extraction of information from the speech signal, and provides a framework with which we can ask new questions. We propose that language comprehension, broadly, results from the integration of both linguistic and social information. PMID:24550851

  1. Anon-Pass: Practical Anonymous Subscriptions

    PubMed Central

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  2. Good intentions gone awry? Effects of weight-related social control on health and well-being.

    PubMed

    Brunson, Julie A; Overup, Camilla S; Nguyen, Mai-Ly; Novak, Sarah A; Smith, C Veronica

    2014-01-01

    A negative body image has been associated with a variety of negative health and well-being outcomes. Social pressures from others, in the form of weight-related social control, may serve to exacerbate this effect, especially for college-aged women. Undergraduate students (N=399) completed a variety of questionnaires assessing weight-related social control, well-being, and diet and exercise behaviors. The results suggest that weight is associated with a variety of negative health and well-being outcomes and particularly for women, weight-related social control is also associated with these negative effects. In addition, men of higher body mass indexes (BMIs) or higher self-perceived weight did not experience negative health and well-being outcomes to the same degree that overweight women did. Parents in particular seem to instigate weight-related social control to change students' diet and exercise behaviors. These results help clarify the effects of weight-related social control in a college population, where weight may be especially important. PMID:24051225

  3. Academic freedom, public reactions, and anonymity.

    PubMed

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims.

  4. Diet quality, social determinants and weight status in 12-year-old Puerto Rican children

    PubMed Central

    Torres, Roxana; Santos, Elvia; Orraca, Luis; Elias, Augusto; Palacios, Cristina

    2014-01-01

    Diet quality may be influenced by social determinants and weight status. This has not been studied in Puerto Rico (PR); therefore, this cross-sectional study examined if diet quality, assessed by the Healthy Eating Index-2005 (HEI-2005), differs by social determinants (gender, school type and region) and weight status in children in PR. As part of an “island-wide” study to evaluate oral health in 1,550 12-year-old children, dietary intake was assessed in a representative subset (n=796) using a 24-hr diet recall. Diet quality was evaluated from the diet recall results using the HEI-2005. Overall mean HEI-2005 score was 40.9, out of a total maximum score of 100. Girls had significantly higher scores for whole fruit, total vegetables, whole grains, and sodium but lower scores for total grains and milk compared to boys (p<0.05). Children from public schools had higher scores for total fruit, whole fruit, dark-green and orange vegetables and legumes, but lower scores for whole grains and milk compared to those from private schools (p<0.05). Children from the Central Mountains had higher scores for the dark-green and orange vegetables and legumes and whole fruit compared to the other regions (p<0.05). Overweight children had significantly higher scores for total vegetables and milk but lower scores for total fruit and sodium as compared to non-overweight children (p<0.01). In conclusion, some components of diet quality were associated with the social determinants studied and with weight status in this sample. Overall diet quality needs improvement in PR children so that it is better aligned with dietary recommendations. PMID:24656710

  5. Mental health, quality of life and social relations in young adults born with low birth weight

    PubMed Central

    2012-01-01

    Background Being born with low birth weight may have an impact on different aspects of mental health, psychosocial functioning and well-being; however results from studies in young adulthood have so far yielded mixed findings. The aim of this study was to assess the long-term impact in young adulthood on self-reported mental health, health-related quality of life, self-esteem and social relations by investigating differences between two low birth weight groups and a control group. Methods In a follow-up at 20 years of age, 43 preterm VLBW (birth weight ≤ 1500 g), 55 term SGA (birth weight < 10th percentile) and 74 control subjects completed the Adult Self-Report (ASR) of the Achenbach System of Empirically Based Assessment, the Adult Autism Spectrum Quotient (AQ), the Short Form 36 Health Survey, the Self-Perception Profile for Adolescents-Revised, and the Wechsler Adult Intelligent Scale III assessment. Results The VLBW and SGA groups reported significantly more mental health problems than controls. The VLBW group predominantly had internalizing problems, and the non-significant association with ASR Total score was reduced by the Intelligence Quotient (IQ). The SGA group had increased scores on both internalizing and externalizing problems, and the association with ASR Total score remained significant after adjusting for IQ in this group. Both low birth weight groups reported less interaction with friends and lower quality of life related to mental health domains than controls. Self-esteem scores were lower than in the control group for athletic competence (VLBW) and social acceptance (SGA). Conclusion Our findings suggest that self-reported mental health and well-being in young adulthood may be adversely affected by low birth weight, irrespective of whether this is the result of premature birth or being born SGA at term. PMID:23216805

  6. "Dear Professor: I Hate You"--Anonymous

    ERIC Educational Resources Information Center

    Bartlett, Thomas

    2009-01-01

    Flip through a stack of anonymous student evaluations of professors and the mild comments, even the compliments, tend to blend together. But often, hidden among them, is a dagger. Then there are the out-and-out insults. Students' comments can be more than simply mean. Sometimes student comments aren't cruel, just weird. In this article, some…

  7. Anonymization server system for DICOM images

    NASA Astrophysics Data System (ADS)

    Suzuki, H.; Amano, M.; Kubo, M.; Kawata, Y.; Niki, N.; Nishitani, H.

    2007-03-01

    We have developed an anonymization system for DICOM images. It requires consent from the patient to use the DICOM images for research or education. However, providing the DICOM image to the other facilities is not safe because it contains a lot of personal data. Our system is a server that provides anonymization service of DICOM images for users in the facility. The distinctive features of the system are, input interface, flexible anonymization policy, and automatic body part identification. In the first feature, we can use the anonymization service on the existing DICOM workstations. In the second feature, we can select a best policy fitting for the Protection of personal data that is ruled by each medical facility. In the third feature, we can identify the body parts that are included in the input image set, even if the set lacks the body part tag in DICOM header. We installed the system for the first time to a hospital in December 2005. Currently, the system is working in other four facilities. In this paper we describe the system and how it works.

  8. Use of social networking sites and perception and intentions regarding body weight among adolescents

    PubMed Central

    Sampasa‐Kanyinga, H.; Hamilton, H. A.

    2016-01-01

    Summary Objective Social networking sites (SNSs) not only offer users an opportunity to link with others but also allow individuals to compare themselves with other users. However, the link between the use of SNSs and the dissatisfaction with body weight is largely unknown. We investigated the associations between the use of SNSs and the perception of body weight and related behaviours among adolescent men and women. Methods The study sample consisted of 4,468 (48.5% women) 11–19‐year‐old Canadian students in grades 7 to 12 who participated in the 2013 Ontario Student Drug Use and Health Survey. Results Overall, 54.6% of students reported using SNSs for 2 h or less per day, 28.0% reported using them for more than 2 h d−1 and 17.4% reported infrequent or no use of SNSs (reference category). After adjustment for covariates, results showed that adolescent women who use SNSs for more than 2 h d−1 had greater odds of dissatisfaction with body weight (odds ratio = 2.02; 95% confidence interval [CI]: 1.30–3.16). More specifically, they were more likely to perceive themselves as overweight (relative risk ratio [RRR] = 2.20; 95% CI: 1.34−3.60) compared with those who reported infrequent or no use of SNSs. Conversely, men who use SNSs for 2 h or less per day presented a lower risk for perceiving themselves as overweight (RRR = 0.68; 95% CI: 0.47−0.98) but not those who use SNSs for more than 2 h d−1. Women who use SNSs for more than 2 h d−1 reported a greater likelihood of trying to lose weight (RRR = 2.52; 95% CI: 1.62−3.90). Conclusions Our results showed that heavy use of SNSs is associated with dissatisfaction with body weight in adolescent women. PMID:27812377

  9. DietBet: A Web-Based Program that Uses Social Gaming and Financial Incentives to Promote Weight Loss

    PubMed Central

    Rosen, Jamie

    2014-01-01

    Background Web-based commercial weight loss programs are increasing in popularity. Despite their significant public health potential, there is limited research on the effectiveness of such programs. Objective The objective of our study was to examine weight losses produced by DietBet and explore whether baseline and engagement variables predict weight outcomes. Methods DietBet is a social gaming website that uses financial incentives and social influence to promote weight loss. Players bet money and join a game. All players have 4 weeks to lose 4% of their initial body weight. At enrollment, players can choose to share their participation on Facebook. During the game, players interact with one another and report their weight loss on the DietBet platform. At week 4, all players within each game who lose at least 4% of initial body weight are declared winners and split the pool of money bet at the start of the game. Official weigh-in procedures are used to verify weights at the start of the game and at the end. Results From December 2012 to July 2013, 39,387 players (84.04% female, 33,101/39,387; mean weight 87.8kg, SD 22.6kg) competed in 1934 games. The average amount bet was US $27 (SD US $22). A total of 65.63% (25,849/39,387) provided a verified weight at the end of the 4-week competition. The average intention-to-treat weight loss was 2.6% (SD 2.3%). Winners (n=17,171) won an average of US $59 (SD US $35) and lost 4.9% (SD 1.0%) of initial body weight, with 30.68% (5268/17,171) losing 5% or more of their initial weight. Betting more money at game entry, sharing on Facebook, completing more weigh-ins, and having more social interactions during the game predicted greater weight loss and greater likelihood of winning (Ps<.001). In addition, weight loss clustered within games (P<.001), suggesting that players influenced each others’ weight outcomes. Conclusions DietBet, a social gaming website, reached nearly 40,000 individuals in just 7 months and produced

  10. Cognition, behavior and social competence of preterm low birth weight children at school age

    PubMed Central

    Fan, Rachel Gick; Portuguez, Mirna Wetters; Nunes, Magda Lahorgue

    2013-01-01

    OBJECTIVE: The aim of this study was to assess the cognitive and behavioral development of preterm and low birth weight newborns living in a disadvantageous socioeconomic environment at school age. METHODS: This cross-sectional study included children aged 6-7 from a historical birth cohort of preterm (gestational age <37 weeks) and low birth weight (<2,500 g) infants. The Wechsler Intelligence Scale for Children III (WISC-III) was administered by a psychologist while the parents completed the Child Behavior Checklist. The results were compared to the test's reference. The perinatal information and follow-up data were collected from the hospital files. The demographic data were collected from the parents. The current performance was compared with the results from the Denver II and Bayley II tests, which were administered during the first years of life. RESULTS: The total intelligence quotient varied from 70 to 140 (mean 98.7±15.8). The borderline intelligence quotient was observed in 9.3% of the children. The Child Behavior Checklist indicated a predominance of social competence problems (27.8%, CI 19.2 to 37.9) compared with behavioral problems (15.5%, CI 8.9 to 24.2). Both the Child Behavior Checklist domains, such as schooling, social and attention problems, and the cognitive scores were significantly associated with maternal education and family income. The results of the Denver and Bayley tests were associated with the cognitive performance (p<0.001) and the Child Behavior Checklist social profile, including aggressive and externalizing behavior (p<0.001). CONCLUSIONS: Our data suggest that even low-risk preterm newborns are at risk for developing disturbances in early school age, such as mild cognitive deficits and behavioral disorders. This risk might increase under unfavorable socioeconomic conditions. PMID:23917653

  11. Self-esteem, body-esteem, emotional intelligence, and social anxiety in a college sample: the moderating role of weight.

    PubMed

    Abdollahi, Abbas; Abu Talib, Mansor

    2016-01-01

    To examine the relationships between self-esteem, body-esteem, emotional intelligence, and social anxiety, as well as to examine the moderating role of weight between exogenous variables and social anxiety, 520 university students completed the self-report measures. Structural equation modeling revealed that individuals with low self-esteem, body-esteem, and emotional intelligence were more likely to report social anxiety. The findings indicated that obese and overweight individuals with low body-esteem, emotional intelligence, and self-esteem had higher social anxiety than others. Our results highlight the roles of body-esteem, self-esteem, and emotional intelligence as influencing factors for reducing social anxiety.

  12. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    ERIC Educational Resources Information Center

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  13. Academic freedom, public reactions, and anonymity.

    PubMed

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. PMID:24724541

  14. A Model of Onion Routing with Provable Anonymity

    NASA Astrophysics Data System (ADS)

    Feigenbaum, Joan; Johnson, Aaron; Syverson, Paul

    Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its anonymity guarantees. We give an IO-automata model of an onion-routing protocol and, under possibilistic definitions, characterize the situations in which anonymity and unlinkability are guaranteed.

  15. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  16. Anonymous grading: an ethical teaching strategy.

    PubMed

    McDaniel, C

    1994-01-01

    Increasing emphasis on student rights, as well as attention to ethics, has focused awareness on strategies that faculty can implement to ensure that the subject of ethics is illustrated in classroom teaching. The author discusses anonymous grading as one strategy to operationalize ethics in the classroom. As an ethical concept, justice is a primary concern in the implementation of impartial and fair evaluation of students' work.

  17. Medical document anonymization with a semantic lexicon.

    PubMed Central

    Ruch, P.; Baud, R. H.; Rassinoux, A. M.; Bouillon, P.; Robert, G.

    2000-01-01

    We present an original system for locating and removing personally-identifying information in patient records. In this experiment, anonymization is seen as a particular case of knowledge extraction. We use natural language processing tools provided by the MEDTAG framework: a semantic lexicon specialized in medicine, and a toolkit for word-sense and morpho-syntactic tagging. The system finds 98-99% of all personally-identifying information. PMID:11079980

  18. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  19. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  20. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  1. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  2. Women and cigarette smoking: does amount of weight gain following a failed quit attempt affect social disapproval?

    PubMed

    Knauss, Faye; Martz, Denise; Parker, Amy; Curtin, Lisa; Pai, Shilpa

    2005-05-01

    This study examined the perception of social attractiveness and approval of smoking in a vignette of an American college female smoker after a failed quit attempt. It was hypothesized that she would be perceived more favorably when she was smoking to control her weight, compared to a non-weight related excuse during a failed quit attempt. The design was a 2 (gender: male vs. female)x4 (condition: control, 5, 10, 20 lb gain)x3 (participants' smoking status: never, former, or current smoker) factorial design with the Social Attraction Index and Perception of Smoking Index as dependent variables. Contrary to the hypothesis, perceptions of the female were not affected by her disclosed amount of weight gain. However, consistent with the literature on stigmatization of smokers, smoking participants perceived the female target as most socially attractive and nonsmokers perceived her to be the least attractive. PMID:15833570

  3. Population weighted raster maps can communicate findings of social audits: examples from three continents

    PubMed Central

    2011-01-01

    Background Maps can portray trends, patterns, and spatial differences that might be overlooked in tabular data and are now widely used in health research. Little has been reported about the process of using maps to communicate epidemiological findings. Method Population weighted raster maps show colour changes over the study area. Similar to the rasters of barometric pressure in a weather map, data are the health occurrence – a peak on the map represents a higher value of the indicator in question. The population relevance of each sentinel site, as determined in the stratified last stage random sample, combines with geography (inverse-distance weighting) to provide a population-weighted extension of each colour. This transforms the map to show population space rather than simply geographic space. Results Maps allowed discussion of strategies to reduce violence against women in a context of political sensitivity about quoting summary indicator figures. Time-series maps showed planners how experiences of health services had deteriorated despite a reform programme; where in a country HIV risk behaviours were improving; and how knowledge of an economic development programme quickly fell off across a region. Change maps highlighted where indicators were improving and where they were deteriorating. Maps of potential impact of interventions, based on multivariate modelling, displayed how partial and full implementation of programmes could improve outcomes across a country. Scale depends on context. To support local planning, district maps or local government authority maps of health indicators were more useful than national maps; but multinational maps of outcomes were more useful for regional institutions. Mapping was useful to illustrate in which districts enrolment in religious schools – a rare occurrence - was more prevalent. Conclusions Population weighted raster maps can present social audit findings in an accessible and compelling way, increasing the use of

  4. Participant Anonymity in the Internet Age: From Theory to Practice

    PubMed Central

    Saunders, Benjamin; Kitzinger, Jenny; Kitzinger, Celia

    2015-01-01

    Qualitative researchers attempting to protect the identities of their research participants now face a multitude of new challenges due to the wealth of information once considered private but now readily accessible online. We will draw on our research with family members of people with severe brain injury to discuss these challenges in relation to three areas: participant engagement with the mass media, the availability of court transcripts online, and participants’ use of social media. We suggest strategies for managing these challenges via disguise, refining informed consent, and discussion with interviewees. In the context of a largely theoretical literature on anonymization, this article offers concrete examples of the dilemmas we faced and will be of illustrative use to other researchers confronting similar challenges. PMID:25866484

  5. Social and cognitive predictors of fruit and vegetable intake among adolescents: the context of changes in body weight.

    PubMed

    Szczepanska, Wanda Komorowska; Scholz, Urte; Liszewska, Natalia; Luszczynska, Aleksandra

    2013-05-01

    Two studies investigated differences in the relationships between adolescents' fruit and vegetable intake (FVI) and the predictors specified in the Health Action Process Approach and Social-Cognitive Theory. Retrospective (Study 1; N = 502) and prospective (Study 2; N = 668) designs were applied. Among adolescents with overweight/obesity, intention was cross-sectionally associated with FVI (Study 1); no social or cognitive predictors explained FVI at 14-month follow-up (Study 2). The planning - FVI and self-efficacy - FVI relationships were stronger among adolescents who reduced their body weight to normal, compared to effects observed among those who maintained their body weight (Studies 1 and 2).

  6. Privacy Vulnerability of Published Anonymous Mobility Traces

    SciTech Connect

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; Rao, Nageswara S. V.

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.

  7. Privacy Vulnerability of Published Anonymous Mobility Traces

    DOE PAGES

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; Rao, Nageswara S. V.

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less

  8. Anonymity: an impediment to performance in healthcare.

    PubMed

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  9. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  10. When overweight is the normal weight: an examination of obesity using a social media internet database.

    PubMed

    Kuebler, Meghan; Yom-Tov, Elad; Pelleg, Dan; Puhl, Rebecca M; Muennig, Peter

    2013-01-01

    Using a large social media database, Yahoo Answers, we explored postings to an online forum in which posters asked whether their height and weight qualify themselves as "skinny," "thin," "fat," or "obese" over time and across forum topics. We used these data to better understand whether a higher-than-average body mass index (BMI) in one's county might, in some ways, be protective for one's mental and physical health. For instance, we explored whether higher proportions of obese people in one's county predicts lower levels of bullying or "am I fat?" questions from those with a normal BMI relative to his/her actual BMI. Most women asking whether they were themselves fat/obese were not actually fat/obese. Both men and women who were actually overweight/obese were significantly more likely in the future to ask for advice about bullying than thinner individuals. Moreover, as mean county-level BMI increased, bullying decreased and then increased again (in a U-shape curve). Regardless of where they lived, posters who asked "am I fat?" who had a BMI in the healthy range were more likely than other posters to subsequently post on health problems, but the proportions of such posters also declined greatly as county-level BMI increased. Our findings suggest that obese people residing in counties with higher levels of BMI may have better physical and mental health than obese people living in counties with lower levels of BMI by some measures, but these improvements are modest.

  11. When overweight is the normal weight: an examination of obesity using a social media internet database.

    PubMed

    Kuebler, Meghan; Yom-Tov, Elad; Pelleg, Dan; Puhl, Rebecca M; Muennig, Peter

    2013-01-01

    Using a large social media database, Yahoo Answers, we explored postings to an online forum in which posters asked whether their height and weight qualify themselves as "skinny," "thin," "fat," or "obese" over time and across forum topics. We used these data to better understand whether a higher-than-average body mass index (BMI) in one's county might, in some ways, be protective for one's mental and physical health. For instance, we explored whether higher proportions of obese people in one's county predicts lower levels of bullying or "am I fat?" questions from those with a normal BMI relative to his/her actual BMI. Most women asking whether they were themselves fat/obese were not actually fat/obese. Both men and women who were actually overweight/obese were significantly more likely in the future to ask for advice about bullying than thinner individuals. Moreover, as mean county-level BMI increased, bullying decreased and then increased again (in a U-shape curve). Regardless of where they lived, posters who asked "am I fat?" who had a BMI in the healthy range were more likely than other posters to subsequently post on health problems, but the proportions of such posters also declined greatly as county-level BMI increased. Our findings suggest that obese people residing in counties with higher levels of BMI may have better physical and mental health than obese people living in counties with lower levels of BMI by some measures, but these improvements are modest. PMID:24058478

  12. Influence of maternal and social factors as predictors of low birth weight in Italy

    PubMed Central

    Nobile, Carmelo GA; Raffaele, Gianluca; Altomare, Carlo; Pavia, Maria

    2007-01-01

    Background The purpose of this study is to provide insight into the determinants of low birth weight (LBW) in Italy. Methods The study was carried out in a non-teaching hospital in Catanzaro (Italy). All LBW and very LBW newborns (200) were included in the study and a random sample of 400 newborns weighing ≥ 2500 g was selected. Data were collected from the delivery certificates during one year. Smoking activity of mother and familiar and/or social support during pregnancy was gathered through telephone interviews. Results Overall annual LBW rate was 11.8%. Among LBW newborn there were 125 preterm and 75 term. Younger mothers, those who smoked during pregnancy, and had fewer prenatal care visits were more likely to deliver a LBW child; moreover, preterm newborns, delivered by caesarean section, and twin or multiple birth were significantly more likely to have a LBW. The comparison of very LBW (<1500 g) to LBW newborns showed that a very LBW was significantly more likely in newborns delivered by less educated mothers, those who work outside the home, live in smaller towns, and had less echographies; moreover, as expected, very LBW newborns were more likely to be preterm. Conclusion Several modifiable factors affect the risk of LBW, even when universal access to health care is freely available, but socio-economic status appears to correlate only to very LBW. PMID:17683559

  13. ["Baby cradle coop slots" for abandoned (anonymous) babies: legal problems].

    PubMed

    Riedel, U

    2006-04-01

    It is illegal to propagate or offer anonymous births or to "cradle" abandoned babies in anonymous coop slots ("Babyklappen" in German). Such offers must be rescinded. Offers concerning anonymity of births are ill-suited, since they do not save life. They are unnecessary, because women and children can be assisted even if they are in dire straits, by utilising available help as offered by statutory German child and adolescent aid institutions. Those illegal offers do not solve any problems but create new difficulties and result in lifelong misery for children and parents. Offers for anonymousness create a previously non-existent demand and discredit legal help facilities. Persons assisting anonymous deliveries or recovering "baby cradle" ("Babyklappen") children are obliged to report this to the local registrar's office (in hospitals by the hospital director). Anonymous babies must be immediately reported by hospitals or institutions to local police authorities, and they should be reported to the municipal Youth Office.

  14. Divisible E-Cash Systems Can Be Truly Anonymous

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Gouget, Aline

    This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2 L that he can parceled and spend anonymously and unlinkably. We present the construction of a security tag that allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a binary tree structure without using a trusted third party. This is the first divisible e-cash scheme that provides both full unlinkability and anonymity without requiring a trusted third party.

  15. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    PubMed

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery. PMID:3975305

  16. Design of Anonymous Attribute Authentication Mechanism

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  17. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    PubMed

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  18. When Overweight Is the Normal Weight: An Examination of Obesity Using a Social Media Internet Database

    PubMed Central

    Kuebler, Meghan; Yom-Tov, Elad; Pelleg, Dan; Puhl, Rebecca M.; Muennig, Peter

    2013-01-01

    Using a large social media database, Yahoo Answers, we explored postings to an online forum in which posters asked whether their height and weight qualify themselves as “skinny,” “thin,” “fat,” or “obese” over time and across forum topics. We used these data to better understand whether a higher-than-average body mass index (BMI) in one’s county might, in some ways, be protective for one’s mental and physical health. For instance, we explored whether higher proportions of obese people in one’s county predicts lower levels of bullying or “am I fat?” questions from those with a normal BMI relative to his/her actual BMI. Most women asking whether they were themselves fat/obese were not actually fat/obese. Both men and women who were actually overweight/obese were significantly more likely in the future to ask for advice about bullying than thinner individuals. Moreover, as mean county-level BMI increased, bullying decreased and then increased again (in a U-shape curve). Regardless of where they lived, posters who asked “am I fat?” who had a BMI in the healthy range were more likely than other posters to subsequently post on health problems, but the proportions of such posters also declined greatly as county-level BMI increased. Our findings suggest that obese people residing in counties with higher levels of BMI may have better physical and mental health than obese people living in counties with lower levels of BMI by some measures, but these improvements are modest. PMID:24058478

  19. Design and Implementation of a Randomized Controlled Social and Mobile Weight Loss Trial for Young Adults (project SMART)

    PubMed Central

    Patrick, K; Marshall, SJ; Davila, EP; Kolodziejczyk, JK; Fowler, J; Calfas, KJ; Huang, J; Rock, CL; Griswold, W; Gupta, A; Merchant, G; Norman, GJ; Raab, F; Donohue, M; Fogg, BJ; Robinson, TN

    2014-01-01

    Purpose To describe the theoretical rationale, intervention design, and clinical trial of a two-year weight control intervention for young adults deployed via social and mobile media. Methods A total of 404 overweight or obese college students from three Southern California universities (Mage = 22(±4) years; MBMI=29(±2.8); 70% female) were randomized to participate in the intervention or to receive an informational web-based weight loss program. The intervention is based on behavioral theory and integrates intervention elements across multiple touch points, including Facebook, SMS, smartphone applications, blogs, and e-mail. Participants are encouraged to seek social support among their friends, self-monitor their weight weekly, post their health behaviors on Facebook, and e-mail their weight loss questions/concerns to a health coach. The intervention is adaptive because new theory-driven and iteratively tailored intervention elements are developed and released over the course of the two-year intervention in response to patterns of use and user feedback. Measures of body mass index, waist circumference, physical activity (PA), sedentary behavior (SED), diet, weight management practices, smoking, alcohol, sleep, body image, self-esteem, and depression occur at 6, 12, 18, and 24 months. Currently, all participants have been recruited, and all are in the final year of the trial. Conclusion Theory-driven, evidence-based strategies for PA, SED, and dietary intake can be embedded in an intervention using social and mobile technologies to promote healthy weight-related behaviors in young adults. PMID:24215774

  20. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    PubMed

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  1. Anonymous predictive testing for Huntington's disease in the United States.

    PubMed

    Visintainer, C L; Matthias-Hagen, V; Nance, M A

    2001-01-01

    The widespread use of a predictive genetic test for Huntington's disease (HD) since 1993 has brought to the forefront issues regarding genetic privacy. Although the possibility of anonymous genetic testing has been discussed, its use in the United States has not been described previously. We review the experiences of 11 genetics specialists with anonymous predictive testing for HD. We found that more men than women requested anonymous testing, for reasons that more often related to personal privacy than to insurance or discrimination concerns. A number of approaches to anonymity were used, and genetics specialists varied in the degree to which they were comfortable with the process. A number of legal, medical, and practical questions are raised, which will require resolution if anonymous testing is to be performed with a greater frequency in the future.

  2. Weight Gain Prevention among Midlife Women: A Randomized Controlled Trial to Address Needs Related to the Physical and Social Environment.

    PubMed

    Perry, Courtney D; Degeneffe, Dennis; Davey, Cynthia; Kollannoor-Samuel, Grace; Reicks, Marla

    2016-05-25

    Women tend to gain weight at midlife (40-60 years) increasing risk of obesity-related chronic diseases. Within specific eating occasions, needs related to the physical and social environment may result in less healthy eating behavior, which can lead to weight gain over time. The purpose of this study was to determine if a dietitian-delivered nutrition counseling intervention tailored to eating occasion needs could improve diet and prevent weight gain among midlife women over two years. A randomized controlled trial was conducted with healthy midlife women (n = 354) in one U.S. metropolitan area. The intervention group (n = 185) received ten hours of individual nutrition counseling from dietitians over six months, while women in a control group (n = 169) received no counseling. Measured height, weight and waist circumference, and dietary intakes were collected at baseline and every six months over two years. Mixed linear models were used to test for intervention effect on change in outcome variables over time. Dietary intakes of fruit, reduced/low-fat dairy foods and refined grains were significantly improved over time in the intervention compared to control group. However, the intervention had no effect on weight over time (p = 0.48). Nutrition counseling tailored to address eating occasion needs improved self-reported diet but did not significantly affect weight change.

  3. Weight Gain Prevention among Midlife Women: A Randomized Controlled Trial to Address Needs Related to the Physical and Social Environment

    PubMed Central

    Perry, Courtney D.; Degeneffe, Dennis; Davey, Cynthia; Kollannoor-Samuel, Grace; Reicks, Marla

    2016-01-01

    Women tend to gain weight at midlife (40–60 years) increasing risk of obesity-related chronic diseases. Within specific eating occasions, needs related to the physical and social environment may result in less healthy eating behavior, which can lead to weight gain over time. The purpose of this study was to determine if a dietitian-delivered nutrition counseling intervention tailored to eating occasion needs could improve diet and prevent weight gain among midlife women over two years. A randomized controlled trial was conducted with healthy midlife women (n = 354) in one U.S. metropolitan area. The intervention group (n = 185) received ten hours of individual nutrition counseling from dietitians over six months, while women in a control group (n = 169) received no counseling. Measured height, weight and waist circumference, and dietary intakes were collected at baseline and every six months over two years. Mixed linear models were used to test for intervention effect on change in outcome variables over time. Dietary intakes of fruit, reduced/low-fat dairy foods and refined grains were significantly improved over time in the intervention compared to control group. However, the intervention had no effect on weight over time (p = 0.48). Nutrition counseling tailored to address eating occasion needs improved self-reported diet but did not significantly affect weight change. PMID:27231927

  4. Tweet for health: using an online social network to examine temporal trends in weight loss-related posts.

    PubMed

    Turner-McGrievy, Gabrielle M; Beets, Michael W

    2015-06-01

    Few studies have used social networking sites to track temporal trends in health-related posts, particularly around weight loss. To examine the temporal relationship of Twitter messages about weight loss over 1 year (2012). Temporal trends in #weightloss mentions and #fitness, #diet, and #health tweets which also had the word "weight" in them were examined using three a priori time periods: (1) holidays: pre-winter holidays, holidays, and post-holidays; (2) Season: winter and summer; and (3) New Year's: pre-New Year's and post-New Year's. Regarding #weightloss, there were 145 (95 % CI 79, 211) more posts/day during holidays and 143 (95 % CI 76, 209) more posts/day after holidays as compared to 480 pre-holiday posts/day; 232 (95 % CI 178, 286) more posts/day during the winter versus summer (441 posts/day); there was no difference in posts around New Year's. Examining social networks for trends in health-related posts may aid in timing interventions when individuals are more likely to be discussing weight loss.

  5. Distance learning strategies for weight management utilizing social media: A comparison of phone conference call versus social media platform. Rationale and design for a randomized study.

    PubMed

    Willis, Erik A; Szabo-Reed, Amanda N; Ptomey, Lauren T; Steger, Felicia L; Honas, Jeffery J; Al-Hihi, Eyad M; Lee, Robert; Vansaghi, Lisa; Washburn, Richard A; Donnelly, Joseph E

    2016-03-01

    Management of obesity in the context of the primary care physician visit is of limited efficacy in part because of limited ability to engage participants in sustained behavior change between physician visits. Therefore, healthcare systems must find methods to address obesity that reach beyond the walls of clinics and hospitals and address the issues of lifestyle modification in a cost-conscious way. The dramatic increase in technology and online social networks may present healthcare providers with innovative ways to deliver weight management programs that could have an impact on health care at the population level. A randomized study will be conducted on 70 obese adults (BMI 30.0-45.0 kg/m(2)) to determine if weight loss (6 months) is equivalent between weight management interventions utilizing behavioral strategies by either a conference call or social media approach. The primary outcome, body weight, will be assessed at baseline and 6 months. Secondary outcomes including waist circumference, energy and macronutrient intake, and physical activity will be assessed on the same schedule. In addition, a cost analysis and process evaluation will be completed.

  6. Distance learning strategies for weight management utilizing social media: A comparison of phone conference call versus social media platform. Rationale and design for a randomized study.

    PubMed

    Willis, Erik A; Szabo-Reed, Amanda N; Ptomey, Lauren T; Steger, Felicia L; Honas, Jeffery J; Al-Hihi, Eyad M; Lee, Robert; Vansaghi, Lisa; Washburn, Richard A; Donnelly, Joseph E

    2016-03-01

    Management of obesity in the context of the primary care physician visit is of limited efficacy in part because of limited ability to engage participants in sustained behavior change between physician visits. Therefore, healthcare systems must find methods to address obesity that reach beyond the walls of clinics and hospitals and address the issues of lifestyle modification in a cost-conscious way. The dramatic increase in technology and online social networks may present healthcare providers with innovative ways to deliver weight management programs that could have an impact on health care at the population level. A randomized study will be conducted on 70 obese adults (BMI 30.0-45.0 kg/m(2)) to determine if weight loss (6 months) is equivalent between weight management interventions utilizing behavioral strategies by either a conference call or social media approach. The primary outcome, body weight, will be assessed at baseline and 6 months. Secondary outcomes including waist circumference, energy and macronutrient intake, and physical activity will be assessed on the same schedule. In addition, a cost analysis and process evaluation will be completed. PMID:26883282

  7. Intra- and intergenerational social mobility in relation to height, weight and body mass index in a British national cohort.

    PubMed

    Krzyżanowska, Monika; Mascie-Taylor, C G Nicholas

    2011-09-01

    Using a sample of 2090 father and son pairs, the extent of intra- and inter-generational social mobility (migration between social classes) was examined over a 42-year period in a British cohort in relation to height, weight and body mass index (BMI). The mean height difference between the highest and lowest social class decreased from about 4 cm in the fathers' generation to about 3 cm in the sons' generation, indicating a decline in heterogeneity in height between classes. For fathers downward intra-generational social mobility ranged between 11% and 18% while between 16% and 26% were upwardly mobile; for sons 15% were downwardly mobile and 21% upwardly mobile. On average downwardly mobile fathers were shorter by between 0.1 cm and 0.7 cm while upwardly mobile fathers were taller by, on average, 0.6 cm to 1.7 cm. For sons, the downwardly mobile were on average 0.7 cm shorter and the upwardly mobile 0.8 cm taller. For weight and BMI there were no consistent relationships with intra-generational mobility in either the fathers' or sons' generations. Inter-generationally, between 18% and 19% of sons were downwardly mobile and between 39% and 40% were upwardly mobile; the downwardly mobile were shorter by about 0.9 cm and the upwardly taller by between 0.6 cm and 1.2 cm. Sons with higher BMI were more likely to be inter-generationally downwardly mobile.

  8. Social Inequalities in Body Weight and Physical Activity: Exploring the Role of Fitness Centers

    ERIC Educational Resources Information Center

    McLaren, Lindsay; Rock, Melanie J.; McElgunn, Jamie

    2012-01-01

    Fitness centers are a viable option for physical activity, particularly in climates with significant weather variation. Due to variation in economic and social expressions of exclusivity, fitness centers may have some relation to social inequalities in physical inactivity and related health outcomes; thus, our objective was to explore this…

  9. Social class and body weight among Chinese urban adults: the role of the middle classes in the nutrition transition.

    PubMed

    Bonnefond, Céline; Clément, Matthieu

    2014-07-01

    While a plethoric empirical literature addresses the relationship between socio-economic status and body weight, little is known about the influence of social class on nutritional outcomes, particularly in developing countries. The purpose of this article is to contribute to the analysis of the social determinants of adult body weight in urban China by taking into account the influence of social class. More specifically, we propose to analyse the position of the Chinese urban middle class in terms of being overweight or obese. The empirical investigations conducted as part of this research are based on a sample of 1320 households and 2841 adults from the China Health and Nutrition Survey for 2009. For the first step, we combine an economic approach and a sociological approach to identify social classes at household level. First, households with an annual per capita income between 10,000 Yuan and the 95th income percentile are considered as members of the middle class. Second, we strengthen the characterization of the middle class using information on education and employment. By applying clustering methods, we identify four groups: the elderly and inactive middle class, the old middle class, the lower middle class and the new middle class. For the second step, we implement an econometric analysis to assess the influence of social class on adult body mass index and on the probability of being overweight or obese. We use multinomial treatment regressions to deal with the endogeneity of the social class variable. Our results show that among the four subgroups of the urban middle class, the new middle class is the only one to be relatively well-protected against obesity. We suggest that this group plays a special role in adopting healthier food consumption habits and seems to be at a more advanced stage of the nutrition transition.

  10. Increasing Anonymity in Peer Assessment by Using Classroom Response Technology within Face-to-Face Higher Education

    ERIC Educational Resources Information Center

    Raes, Annelies; Vanderhoven, Ellen; Schellens, Tammy

    2015-01-01

    Peer assessment is becoming more popular in higher education, however it often goes together with undesirable social effects like peer pressure and favoritism, especially when students need to evaluate peers in a face-to-face setting. The present study was set up to investigate increased anonymity in peer assessment to counter these undesirable…

  11. The effects of juror anonymity on jury verdicts.

    PubMed

    Hazelwood, D L; Brigham, J C

    1998-12-01

    This study examined the effects of anonymity on jurors' verdicts and on jurors' feelings of accountability for their jury's verdicts. Twenty four-person anonymous juries and 20 four-person nonanonymous juries rendered individual and group verdicts for three student defendants charged with selling drugs on a school campus. When unanimous guilty verdicts were reached, juries imposed one of five punishments. Finally, jurors completed postdeliberation opinion and accountability questionnaires. As predicted, anonymous juries showed a higher rate of conviction (70%) than did nonanonymous juries (40%) when the evidence against the defendant was strong, supporting the hypothesis that anonymity would have a greater effect for situations in which there was relatively strong evidence of the defendant's guilt. Anonymous juries imposed the harshest punishment (expulsion) significantly more often than did nonanonymous juries. Contrary to predictions from differential self-awareness theory, anonymous juries did not report feeling less accountable than did nonanonymous juries. However, anonymous juries did see the process as significantly more fair than did identifiable juries.

  12. Family factors and social support in the developmental outcomes of very low-birth weight children.

    PubMed

    Hogan, D P; Park, J M

    2000-06-01

    This study used data that were representative of the normative population of all infants born in 1988 and were followed during the first 3 years of life. Large developmental delays and limitations in function were common among children weighing less than 1500 g at birth. Among very low-birth weight infants, minority status and living in a household headed by a single mother further worsen the disadvantages associated with a very low birth weight. Nor could the disadvantages associated with very low birth weight be accounted for by controls for other risk factors or buffering statuses and behaviors. Among all children (including those of very low birth weight) poverty, reliance on Medicaid and other government sources for health insurance, a history of risky behaviors, and inadequate prenatal care are the major risk factors for developmental delays, limitations in function, and impairment at birth. State program benefit levels have no obvious effects on child outcomes, taking into account participation in individual programs. An important finding in light of TANF is that maternal work, the use of child care, and the form and cost of child care did not influence developmental delay, limitation in function, or impairment, the outcomes that we were able to measure during the first 3 years of life. TANF eligibility requirements, however, may increase difficulty in obtaining prenatal and other medical services for mothers and children in need--factors shown here to be related strongly to increased risk of low birth weight and developmental delays, limitations, and impairments. Race and ethnicity, poverty status, and family structure are fundamental factors in early child development and function. Minority status, poverty, and single-parent households greatly increase the likelihood that a mother will engage in risky behaviors (smoking, alcohol use, illegal drug use) during pregnancy and receive inadequate prenatal care. Risky behaviors and inadequate prenatal care are

  13. Longitudinal Influences of Neighbourhood Built and Social Environment on Children’s Weight Status

    PubMed Central

    Gose, Maria; Plachta-Danielzik, Sandra; Willié, Bianca; Johannsen, Maike; Landsberg, Beate; Müller, Manfred J.

    2013-01-01

    The objective was to examine longitudinal 4-year-relationships between neighbourhood social environment and children’s body mass index-standard deviation score (BMI-SDS) taking into account the built environment. Furthermore, we have analysed the influence of potential interactions between the social environment and family/social data on children’s BMI-SDS. Between 2006–2008 and 2010–2012, anthropometric measurements were conducted among 485 children (age at baseline: 6.1 (5.8–6.4)). Socio-demographic characteristics and perception of residential environment were reported by parents. Geographic Information Systems were used to examine street length, number of food outlets and distance to the nearest playground and park/green space within an 800 m Euclidian buffer of each participant address point. Additional data on neighbourhood characteristics (e.g., traffic density, walkability, crime rates) were obtained from the State Capital of Kiel, Germany. In a multivariate model, walkability, street type, socioeconomic status of the district and perceived frequency of passing trucks/busses were associated with BMI-SDS over 4 years, but only neighbourhood SES had an effect on change in BMI-SDS. However, familial/social factors rather than neighbourhood environment (especially social environment) had an impact on children’s BMI-SDS over 4 years. Thus, social inequalities in childhood overweight are only partially explained by social neighbourhood environment. PMID:24132135

  14. Subchronic and mild social defeat stress accelerates food intake and body weight gain with polydipsia-like features in mice.

    PubMed

    Goto, Tatsuhiko; Kubota, Yoshifumi; Tanaka, Yuki; Iio, Wataru; Moriya, Naoko; Toyoda, Atsushi

    2014-08-15

    Development and characterization of animal models of depression are essential for fully understanding the pathogenesis of depression in humans. We made and analyzed a mouse model exhibiting social deficit and hyperphagia-like behavior using a subchronic and mild social defeat stress (sCSDS) paradigm. The body weight, food and water intake of mice were monitored during a test period, and their behaviors and serum components were analyzed at two stages: immediately after the sCSDS period and 1 month after the sCSDS. The body weight and food intake of defeated mice were significantly higher than control mice at the sCSDS period, and these differences were sustained until 1 month after the sCSDS, whereas the water intake of defeated mice was significantly higher than control mice for the period of sCSDS only. Behavioral analyses revealed that the defeated mice exhibit significant social aversion to unfamiliar mice in a social interaction test and a trend of anxiety-like behavior in an elevated-plus maze test. Possibly due to polydipsia-like symptoms, defeated mice had significantly lower levels of albumin and blood urea nitrogen than control mice immediately after the sCSDS period but not at 1 month after sCSDS. The present study revealed that our sCSDS mice keep much more water in their body than control mice. This study reports the first step toward an understanding of the mechanisms of stress-induced overhydration, over-eating and resultant weight gain.

  15. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  16. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    PubMed

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy. PMID:21532265

  17. The effects of social setting, perceived weight category, and gender on eating behavior.

    PubMed

    Blackman, S L; Singer, R D; Mertz, T

    1983-05-01

    Four hundred and sixteen male and 233 female subjects were observed in a university cafeteria at lunch time. They were categorized according to five perceived weight groups with category one being underweight and category five being overweight. The number of calories in the food bought for lunch by each subject was calculated and recorded. Males bought food containing more calories than females but for males the amount of calories did not differ by perceived weight category. Females purchased food with fewer calories than males but the heavier females bought food with higher caloric content.

  18. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity

    SciTech Connect

    Shue, Craig A; Gupta, Prof. Minaxi

    2010-01-01

    Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active or passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.

  19. Associations of Weight Status, Social Factors, and Active Travel among College Students

    ERIC Educational Resources Information Center

    Bopp, Melissa; Behrens, Timothy K.; Velecina, Rachel

    2014-01-01

    Background: Active travel (AT) is associated with various health benefits and may help prevent the decline in physical activity during college years. Purpose: The purpose of this study was to examine the relationship of several factors with AT to campus by weight status. Methods: Students at a large northeastern US campus completed an online…

  20. Social inequalities in body weight and physical activity: exploring the role of fitness centers.

    PubMed

    McLaren, Lindsay; Rock, Melanie J; McElgunn, Jamie

    2012-03-01

    Fitness centers are a viable option for physical activity, particularly in climates with significant weather variation. Due to variation in economic and social expressions ofexclusivity, fitness centers may have some relation to social inequalities in physical inactivity and related health outcomes; thus, our objective was to explore this relation. Using publicly available data and guided by Bourdieu's theory of habitus, we classified fitness centers in Calgary, Canada, on three dimensions of exclusivity (economic, social, and appearance). We found that, although some highly exclusive centers exist, most demonstrated low exclusivity based on our dimensions. An overall contribution of centers to inequalities appears to be limited; however, caution is warranted in light of cutbacks to municipal budgets that can have an impact on publicly funded facilities.

  1. Anonymization of DICOM electronic medical records for radiation therapy.

    PubMed

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-10-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1min/patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved. PMID:25147130

  2. The influence of social norms upon behavioral expressions of implicit and explicit weight-related stigma in an interactive game.

    PubMed

    Pryor, John B; Reeder, Glenn D; Wesselmann, Eric D; Williams, Kipling D; Wirth, James H

    2013-06-01

    This research explored the roles of social influence and stigma-related attitudes in how people behaved toward an overweight female in an interactive computer game. Photographs were used to manipulate whether one of the players in the game was overweight or average weight. We found that both explicit and implicit anti-fat attitudes influenced interactions with an overweight player, but only when other players ostracized the overweight player, not when they included her. Under conditions of ostracism, explicit attitudes were better predictors of more controllable behaviors, while implicit attitudes were better predictors of more automatic behaviors.

  3. The Influence of Social Norms upon Behavioral Expressions of Implicit and Explicit Weight-Related Stigma in an Interactive Game

    PubMed Central

    Pryor, John B.; Reeder, Glenn D.; Wesselmann, Eric D.; Williams, Kipling D.; Wirth, James H.

    2013-01-01

    This research explored the roles of social influence and stigma-related attitudes in how people behaved toward an overweight female in an interactive computer game. Photographs were used to manipulate whether one of the players in the game was overweight or average weight. We found that both explicit and implicit anti-fat attitudes influenced interactions with an overweight player, but only when other players ostracized the overweight player, not when they included her. Under conditions of ostracism, explicit attitudes were better predictors of more controllable behaviors, while implicit attitudes were better predictors of more automatic behaviors. PMID:23766740

  4. Understanding and Acting on the Growing Childhood and Adolescent Weight Crisis: A Role for Social Work

    ERIC Educational Resources Information Center

    Lawrence, Shawn; Hazlett, Rebekah; Hightower, Peggy

    2010-01-01

    The childhood and adolescent overweight and obesity rates are rising at an alarming rate. Numerous individual, family, community, and social factors contribute to overweight and obesity in children and are explored. If left unaddressed, the epidemic of childhood and adolescent overweight and obesity may lead to amplified problems for individual…

  5. Location, Timing, and Social Structure Patterns Related to Physical Activity Participation in Weight Loss Programs

    ERIC Educational Resources Information Center

    Gay, Jennifer L.; Trevarthen, Grace

    2013-01-01

    Less than half of the adults in the United States meet national guidelines for physical activity. Physical activity programs can induce short-term improvements in physical activity. To develop effective interventions, researchers and practitioners should consider the timing, location, and social structure patterns of participants. Using a pretest,…

  6. Enhancing maternal interactive behavior and child social competence in low birth weight, premature infants.

    PubMed

    Spiker, D; Ferguson, J; Brooks-Gunn, J

    1993-06-01

    Effects of a comprehensive early intervention program for low birth weight, premature infants--the Infant Health and Development Program--on mother-child interaction were examined at 30 months (N = 683). Small significant positive effects were found: Intervention mothers had higher ratings on quality of assistance; intervention children had higher ratings on persistence and enthusiasm and on an overall child rating of competence and involvement and lower ratings on percentage of time off-task; intervention dyads were rated as more synchronous. Of a set of initial status variables indexing biological and environmental risk, only 2 treatment interactions were found. Intervention group black children had higher ratings on enthusiasm and lower percentage of time off-task. Independent of treatment, maternal ethnicity and education were significant predictors of maternal and dyadic ratings, while ethnicity and birth weight predicted child ratings. Implications for early intervention and center-based care are discussed.

  7. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  8. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  9. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  10. The relationship between body mass index and unhealthy weight control behaviors among adolescents: the role of family and peer social support.

    PubMed

    Vander Wal, Jillon S

    2012-12-01

    Adolescents classified as overweight or obese are more likely to use unhealthy weight control behaviors such as skipping meals or fasting than their healthy weight peers. Adolescents with low perceived social support may be at particular risk. Therefore, the purpose of the present study was to investigate the association between adolescent overweight and obesity, indices of perceived peer and family social support, and their interaction in the use of unhealthy weight control behaviors among adolescents. The present study used data from the 2001-2002 Health Behavior in School-Aged Children collaborative survey. Participants included 4598 adolescent girls and boys in the ninth and tenth grades. Results of binary logistic regression analyses showed that obese boys and girls were more likely to use unhealthy weight control behaviors than their healthy weight peers. Boys and girls who endorsed difficult communication with their parents, low levels of parent school support, or frequent bullying were more likely to engage in unhealthy weight control behaviors than relevant comparison groups. Among girls, poor classmate relationships were associated with increased use of unhealthy weight control behaviors whereas fewer friendships were associated with decreased use. Results suggest that adolescents are at high risk for use of unhealthy weight control behaviors and would benefit from interventions to increase knowledge and social support for achieving and maintaining a healthy weight. PMID:22609397

  11. Social Cognitive Changes Following Weight Loss and Physical Activity Interventions in Obese, Older Adults in Poor Cardiovascular Health

    PubMed Central

    Brawley, Lawrence; Gaukstern, Jill E.; Ambrosius, Walter T.

    2013-01-01

    Background The study objectives were to determine (a) the effects of group-mediated cognitive–behavioral interventions on change in performance self-efficacy, satisfaction with function, and with appearance among older, overweight/obese adults in poor cardiovascular health and (b) whether self-efficacy mediated change in 400-m walk time. Methods This translational, randomized controlled trial of physical activity and weight loss was conducted within community Cooperative Extension Centers. Participants were randomized to three intervention arms: Physical Activity, Weight Loss+ Physical Activity, or a Successful Aging education control. Results Across 18 months, the Weight Loss+Physical Activity intervention demonstrated greater improvements in self-efficacy, satisfaction with function, and appearance versus other trial arms. Physical Activity intervention participants also experienced significant improvements in self-efficacy and satisfaction with function versus those in Successful Aging. Self-efficacy mediated 400-m walk time at 18 months. Conclusions Both group-mediated cognitive–behavioral interventions yielded desirable improvements in social cognitions and preserved mobility improvements post-intervention. PMID:22773225

  12. Relations among weight control behaviors and eating attitudes, social physique anxiety, and fruit and vegetable consumption in Turkish adolescents.

    PubMed

    Baş, Murat; Kiziltan, Gül

    2007-01-01

    This study examined the relationship among dieting, eating attitudes, social physique anxiety, and fruit and vegetable consumption among Turkish adolescents. Abnormal eating behavior (EAT-26 > or =20) was found in 32.8% of the total sample; this included 26.4% of the males and 38.7% of the females. Weight-control and weight-related behaviors are associated with high fruit and vegetable consumption in adolescents. Dieting was significantly associated with types of consumption in female adolescents. In addition, EAT-26 scores were significantly positively correlated with high fruit and vegetable consumption, but this association was not observed in SPAS scores among adolescents. Adolescents who engage in dieting behaviors seem to consume more fruit and vegetables than do other adolescents. Female adolescents may be more likely to display abnormal eating attitudes and dieting behaviors than do males. Although some weight-control behaviors may be risky, adolescents who were practicing dieting behaviors engaged in the positive dietary behavior of consuming more servings of fruit and vegetables than did non-dieters.

  13. Associations between the use of social networking sites and unhealthy eating behaviours and excess body weight in adolescents.

    PubMed

    Sampasa-Kanyinga, Hugues; Chaput, Jean-Philippe; Hamilton, Hayley A

    2015-12-14

    Unhealthy eating behaviour and excess body weight have been related to sedentary behaviour, particularly screen time, in adolescents; however, little is known about their associations with the use of social networking sites (SNS). We investigated the associations between time spent using SNS and unhealthy eating behaviours (including breakfast skipping, consumption of sugar-sweetened beverages (SSB) and energy drinks) and body weight in adolescents. Data on 9858 students (mean age: 15·2 (SD 1·9) years) in grades 7 through 12 were derived from the 2013 cycle of the Ontario Student Drug Use and Health Survey--a cross-sectional school-based survey of middle and high school students. The majority (81·5%) of students reported daily use of SNS and an additional 10·7% reported using them on an irregular basis. Multivariate logistic regression analyses revealed that the use of SNS was associated with increased odds of skipping breakfast (P trend<0·01) and consuming SSB (P trend<0·01) and energy drinks (P trend<0·01) in a dose-response manner with adjustments for age, sex, ethnicity, socio-economic status, tobacco, alcohol and cannabis use as well as BMI. However, there was no evidence of a significant association between use of SNS and BMI before or after adjusting for all the covariates and unhealthy eating behaviours. In conclusion, our results suggest associations between the use of SNS and unhealthy eating behaviours among youth. Given the popularity of SNS, more efforts are needed to better understand the impact of social networks on eating behaviours and risk of excess weight. PMID:26400488

  14. Associations between the use of social networking sites and unhealthy eating behaviours and excess body weight in adolescents.

    PubMed

    Sampasa-Kanyinga, Hugues; Chaput, Jean-Philippe; Hamilton, Hayley A

    2015-12-14

    Unhealthy eating behaviour and excess body weight have been related to sedentary behaviour, particularly screen time, in adolescents; however, little is known about their associations with the use of social networking sites (SNS). We investigated the associations between time spent using SNS and unhealthy eating behaviours (including breakfast skipping, consumption of sugar-sweetened beverages (SSB) and energy drinks) and body weight in adolescents. Data on 9858 students (mean age: 15·2 (SD 1·9) years) in grades 7 through 12 were derived from the 2013 cycle of the Ontario Student Drug Use and Health Survey--a cross-sectional school-based survey of middle and high school students. The majority (81·5%) of students reported daily use of SNS and an additional 10·7% reported using them on an irregular basis. Multivariate logistic regression analyses revealed that the use of SNS was associated with increased odds of skipping breakfast (P trend<0·01) and consuming SSB (P trend<0·01) and energy drinks (P trend<0·01) in a dose-response manner with adjustments for age, sex, ethnicity, socio-economic status, tobacco, alcohol and cannabis use as well as BMI. However, there was no evidence of a significant association between use of SNS and BMI before or after adjusting for all the covariates and unhealthy eating behaviours. In conclusion, our results suggest associations between the use of SNS and unhealthy eating behaviours among youth. Given the popularity of SNS, more efforts are needed to better understand the impact of social networks on eating behaviours and risk of excess weight.

  15. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  16. The role of mediating factors in the association between social deprivation and low birth weight in Germany.

    PubMed

    Reime, Birgit; Ratner, Pamela A; Tomaselli-Reime, Sandra N; Kelly, Ann; Schuecking, Beate A; Wenzlaff, Paul

    2006-04-01

    This study examines whether the association between social inequalities and low birth weight (LBW) (occurring in both pre- and full-term births) in Germany can be explained by several potentially confounding factors. These include maternal age, occupational status, marital status, nationality, employment status, smoking, prenatal care, psychosocial stress, obesity, short stature, short inter-pregnancy interval, chronic conditions, and several obstetrical risk factors such as pregnancy induced hypertension. We also examined how the risk for LBW varies over time within each socioeconomic group. We analyzed routinely collected perinatal data on singletons born in the federal state of Lower Saxony, Germany, in 1990, 1995, and 1999 (n = 182,444). After adjustment for all potentially confounding factors in multivariate logistic regression models, working class women, unemployed women, single mothers, and women over 39 years of age were at increased risk for pre- and full-term LBW infants. Migrant status was not related to LBW. We examined variations in the risk for LBW over time within groups, using the 1990 birth cohort as the referent group for the 1995 and 1999 birth cohorts. Compared to 1990, in 1999 women aged 19-34 years, housewives, unemployed women, women of German nationality and women with partners had higher risks for pre- and full-term LBW infants; the eldest subgroup had lower risks for LBW after adjustment for confounding factors. The factors we examined partly explain the social inequalities in LBW occurring in pre- and full-term infants. The subgroups with higher rates of LBW in 1999 compared to 1990, included women experiencing childbirth in an optimal stage of life or in a privileged social context. Public health policies in Germany should target social inequalities contributing to the aetiology of LBW and to the factors that result in increased LBW rates. PMID:16236414

  17. No Evidence for Moral Reward and Punishment in an Anonymous Context

    PubMed Central

    Clavien, Christine; Mersch, Danielle P.; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms. PMID:26939060

  18. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    PubMed

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  19. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    PubMed

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms. PMID:26939060

  20. Anonymous and Confidential Communications from an IP Addressless Computer

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on a mediating computer interposed between the sender and the receiver of an e-mail message have been used for several years by senders of e-mail messages who do not wish to disclose their identity to the receivers. In this model, the strength of the system to protect the identity of the sender depends on the ability and willingness of the mediator to keep the secret. In this paper, we propose a novel approach for sending truly anonymous message over the Internet which does not depend on a third party. Our idea departs from the traditional approach by sending the anonymous messages from an Internet wireless and addressless computer, such as a Personal Digital Assistant (PDA) bridged to the Internet by a Mobile Support Station (MSS).

  1. Anonymous pastoral care for problems pertaining to sexuality.

    PubMed

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431

  2. Anonymity and Censorship Resistance in Unstructured Overlay Networks

    NASA Astrophysics Data System (ADS)

    Backes, Michael; Hamerlik, Marek; Linari, Alessandro; Maffei, Matteo; Tryfonopoulos, Christos; Weikum, Gerhard

    This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.

  3. Social rank of pregnant sows affects their body weight gain and behavior and performance of the offspring.

    PubMed

    Kranendonk, G; Van der Mheen, H; Fillerup, M; Hopster, H

    2007-02-01

    Previous studies on group housing of pregnant sows have mainly focused on reproduction, but we hypothesized that the social rank of pregnant sows housed in groups could also affect birth weight, growth, and behavior of their offspring. Therefore, in the present study, pregnant gilts and sows were housed in 15 different groups (n = 7 to 14 animals per group) from 4 d after AI until 1 wk before the expected farrowing date. All groups were fed by an electronically controlled sow feeding system that registered, on a 24-h basis, the time of first visit, number of feeding and non-feeding visits, and number of times succeeding another sow within 2 s. Only in the first 6 groups (n = 57 animals), agonistic interactions were observed continuously. The percentage of agonistic interactions won was highly correlated (r(s) = 0.90, P < 0.001) with the percentage of displacement success (DS) at the feeding station, which was calculated as: [the number of times succeeding another sow within 2 s/(the number of times succeeded by another sow within 2 s + the number of times succeeding another sow within 2 s)] x 100. This allowed us to classify all sows (n = 166) according to their DS: high-social ranking (HSR) sows had a DS >50% (n = 62) and low-social ranking (LSR) sows a DS <50% (n = 104). Body weights before AI did not differ between HSR and LSR sows, but HSR sows gained more BW during gestation, and lost more BW and back-fat during lactation (P < 0.001). Maternal salivary cortisol concentrations at 2, 7, and 13 wk after AI did not differ between HSR and LSR sows, nor did gestation length, litter size, or percentage of live born piglets. During a novel object (NO) test at 3 wk of age, HSR offspring moved and vocalized more than LSR offspring (P < 0.05). In addition, the latency time to touch the NO was shorter in HSR offspring (P < 0.05), and HSR males spent more time near the NO than LSR males (P < 0.01). At weaning, HSR offspring weighed more than LSR offspring (P < 0.05), and

  4. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. PMID:23675490

  5. Action speaks louder than words: young children differentially weight perceptual, social, and linguistic cues to learn verbs.

    PubMed

    Brandone, Amanda C; Pence, Khara L; Golinkoff, Roberta Michnick; Hirsh-Pasek, Kathy

    2007-01-01

    This paper explores how children use two possible solutions to the verb-mapping problem: attention to perceptually salient actions and attention to social and linguistic information (speaker cues). Twenty-two-month-olds attached a verb to one of two actions when perceptual cues (presence/absence of a result) coincided with speaker cues but not when these cues were placed into conflict (Experiment 1), and not when both possible referent actions were perceptually salient (Experiment 2). By 34 months, children were able to override perceptual cues to learn the name of an action that was not perceptually salient (Experiment 3). Results demonstrate an early reliance on perceptual information for verb mapping and an emerging tendency to weight speaker information more heavily over developmental time. PMID:17650141

  6. Cost of care and social consequences of very low birth weight infants without premature- related morbidities in Italy.

    PubMed

    Cavallo, Maria Caterina; Gugiatti, Attilio; Fattore, Giovanni; Gerzeli, Simone; Barbieri, Dario; Zanini, Rinaldo

    2015-08-19

    Aim of this study was to estimate the cost that is borne by the Italian National Health Service, families, and social security due to very low birth weight infants (VLBWIs) without prematurity-related morbidities up to the age of 18 months. We followed up on 150 VLBWIs and 145 comparable full-term infants (FTIs) who were born in one of 25 different neonatal intensive care units upon discharge from the hospital and at six and 18 months of age. The average length of the primary hospitalisation of the VLBWIs was 59.7 days (SD 21.6 days), with a total cost of €20,502 (SD €8409), compared with three days (SD 0.4 days) with a total cost of €907 (SD €304) for the FTIs. The total societal cost of the VLBWIs for the first 18 months of life was €58,098 (SD €21,625), while the corresponding figure for FTIs was €24,209 (SD €15,557). Among VLBWIs, both low birth weight and gestational age were correlated with the length of hospitalisation after birth (r(2) = 0.61 and r(2) = 0.57, respectively; p values < 0.0005). Our findings highlight that the existing DRGs and tariffs inadequately reflect the actual costs for Italian National Health Service.

  7. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    ERIC Educational Resources Information Center

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  8. Who Goes There? Staying Anonymous on the Internet

    ERIC Educational Resources Information Center

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  9. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  10. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    ERIC Educational Resources Information Center

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  11. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    ERIC Educational Resources Information Center

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  12. The Efficacy of Non-Anonymous Measures of Bullying

    ERIC Educational Resources Information Center

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this method is…

  13. 18. Historic American Buildings Survey. Portion of an anonymous watercolor ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Historic American Buildings Survey. Portion of an anonymous watercolor painting of Fort McHenry bombardment of 1814. Peale Museum, Baltimore. View of southeast bastion and sally port. - Fort McHenry National Monument & Historic Shrine, East Fort Avenue at Whetstone Point, Baltimore, Independent City, MD

  14. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  15. Reversible anonymization of DICOM images using automatically generated policies.

    PubMed

    Onken, Michael; Riesmeier, Jörg; Engel, Marcel; Yabanci, Adem; Zabel, Bernhard; Després, Stefan

    2009-01-01

    Many real-world applications in the area of medical imaging like case study databases require separation of identifying (IDATA) and non-identifying (MDATA) data, specifically those offering Internet-based data access. These kinds of projects also must provide a role-based access system, controlling, how patient data must be organized and how it can be accessed. On DICOM image level, different image types support different kind of information, intermixing IDATA and MDATA in a single object. To separate them, it is possible to reversibly anonymize DICOM objects by substituting IDATA by a unique anonymous token. In case that later an authenticated user needs full access to an image, this token can be used for re-linking formerly separated IDATA and MDATA, thus resulting in a dynamically generated, exact copy of the original image. The approach described in this paper is based on the automatic generation of anonymization policies from the DICOM standard text, providing specific support for all kinds of DICOM images. The policies are executed by a newly developed framework based on the DICOM toolkit DCMTK and offer a reliable approach to reversible anonymization. The implementation is evaluated in a German BMBF-supported expert network in the area of skeletal dysplasias, SKELNET, but may generally be applicable to related projects, enormously improving quality and integrity of diagnostics in a field focused on images. It performs effectively and efficiently on real-world test images from the project and other kind of DICOM images. PMID:19745435

  16. Student Feedback, Anonymity, Observable Change and Course Barometers.

    ERIC Educational Resources Information Center

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  17. The Impact of Anonymization for Automated Essay Scoring

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  18. Socialization and selection effects in the association between weight conscious peer groups and thin-ideal internalization: A co-twin control study.

    PubMed

    VanHuysse, Jessica L; Burt, S Alexandra; O'Connor, Shannon M; Thompson, J Kevin; Klump, Kelly L

    2016-06-01

    Affiliation with weight conscious peer groups is theorized to increase thin-ideal internalization through socialization processes. However, selection effects could contribute if genetic and/or environmental predispositions lead to affiliation with weight conscious peers. Co-twin control methodology was used to examine socialization and selection effects in 614 female twins (ages 8-15) from the Michigan State University Twin Registry (MSUTR). Thin-ideal internalization and peer group characteristics were assessed via self-report questionnaires. Results suggested the presence of both socialization and selection effects. In terms of socialization, twins who reported increased exposure to weight conscious peers relative to their co-twins had elevated thin-ideal internalization scores, regardless of zygosity. However, associations between weight conscious peers and thin-ideal internationalization within twin pairs were attenuated, suggesting that genetic and shared environmental selection effects also contribute. Findings significantly extend previous work by confirming the presence of socialization processes and highlighting selection processes to be examined in future longitudinal research. PMID:26859605

  19. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  20. Sepsis-induced morbidity in mice: effects on body temperature, body weight, cage activity, social behavior and cytokines in brain

    PubMed Central

    Granger, Jill I.; Ratti, Pietro-Luca; Datta, Subhash C.; Raymond, Richard M.; Opp, Mark R.

    2012-01-01

    Infection negatively impacts mental health, as evidenced by the lethargy, malaise, and cognitive deficits experienced during illness. These changes in central nervous system processes, collectively termed sickness behavior, have been shown in animal models to be mediated primarily by the actions of cytokines in brain. Most studies of sickness behavior to date have used bolus injection of bacterial lipopolysaccharide (LPS) or selective administration of the proinflammatory cytokines interleukin-1β (IL-1β) or IL-6 as the immune challenge. Such models, although useful for determining mechanisms responsible for acute changes in physiology and behavior, do not adequately represent the more complex effects on central nervous system (CNS) processes of a true infection with replicating pathogens. In the present study, we used the cecal ligation and puncture (CLP) model to quantify sepsis-induced alterations in several facets of physiology and behavior of mice. We determined the impact of sepsis on cage activity, body temperature, food and water consumption and body weights of mice. Because cytokines are critical mediators of changes in behavior and temperature regulation during immune challenge, we also quantified sepsis-induced alterations in cytokine mRNA and protein in brain during the acute period of sepsis onset. We now report that cage activity and temperature regulation in mice that survive are altered for up to 23 days after sepsis induction. Food and water consumption are transiently reduced, and body weight is lost during sepsis. Furthermore, sepsis decreases social interactions for 24 – 48 hours. Finally, mRNA and protein for IL-1β, IL-6, and tumor necrosis factor-α (TNFα) are upregulated in the hypothalamus, hippocampus, and brain stem during sepsis onset, from 6–72 hour post sepsis induction. Collectively, these data indicate that sepsis not only acutely alters physiology, behavior and cytokine profiles in brain, but that some brain functions are

  1. Sepsis-induced morbidity in mice: effects on body temperature, body weight, cage activity, social behavior and cytokines in brain.

    PubMed

    Granger, Jill I; Ratti, Pietro-Luca; Datta, Subhash C; Raymond, Richard M; Opp, Mark R

    2013-07-01

    Infection negatively impacts mental health, as evidenced by the lethargy, malaise, and cognitive deficits experienced during illness. These changes in central nervous system processes, collectively termed sickness behavior, have been shown in animal models to be mediated primarily by the actions of cytokines in brain. Most studies of sickness behavior to date have used bolus injection of bacterial lipopolysaccharide (LPS) or selective administration of the proinflammatory cytokines interleukin-1β (IL-1β) or IL-6 as the immune challenge. Such models, although useful for determining mechanisms responsible for acute changes in physiology and behavior, do not adequately represent the more complex effects on central nervous system (CNS) processes of a true infection with replicating pathogens. In the present study, we used the cecal ligation and puncture (CLP) model to quantify sepsis-induced alterations in several facets of physiology and behavior of mice. We determined the impact of sepsis on cage activity, body temperature, food and water consumption and body weights of mice. Because cytokines are critical mediators of changes in behavior and temperature regulation during immune challenge, we also quantified sepsis-induced alterations in cytokine mRNA and protein in brain during the acute period of sepsis onset. We now report that cage activity and temperature regulation in mice that survive are altered for up to 23 days after sepsis induction. Food and water consumption are transiently reduced, and body weight is lost during sepsis. Furthermore, sepsis decreases social interactions for 24-48 h. Finally, mRNA and protein for IL-1β, IL-6, and tumor necrosis factor-α (TNFα) are upregulated in the hypothalamus, hippocampus, and brain stem during sepsis onset, from 6h to 72 h post sepsis induction. Collectively, these data indicate that sepsis not only acutely alters physiology, behavior and cytokine profiles in brain, but that some brain functions are impaired for

  2. Social class and body management. A qualitative exploration of differences in perceptions and practices related to health and personal body weight.

    PubMed

    Smith, Louise H; Holm, Lotte

    2010-10-01

    To deepen our understanding of the relationship between social class and obesity, the study compares the ways in which conceptions of health and personal body weight are enmeshed in the everyday lives of people with disparate socio-cultural backgrounds and weight status. We ask how perceptions and enactments of health and personal body weight are related to social structures and practices at work, in spare time, and in family life. Qualitative interviews focusing on life history and current everyday life were conducted with two groups of Danish adults. One group contained highly educated people of normal weight. The other contained people with less education and body weights above the obesity threshold. Recommended healthy lifestyle regimes complied more fully with the established practices and internalized ideas of those in the normal weight highly educated group than they did with the practices and ideas of those in the high-BMI less educated group. Work environments, and also conditions connected with work that were carried over into spare time and family life, further promoted the integration of healthy lifestyles into the everyday practices of the highly educated, normal weight group. In the less educated, high-BMI group this kind of integration occurred less.

  3. Why Barbie Feels Heavier than Ken: The Influence of Size-Based Expectancies and Social Cues on the Illusory Perception of Weight

    ERIC Educational Resources Information Center

    Dijker, Anton J. M.

    2008-01-01

    In order to examine the relative influence of size-based expectancies and social cues on the perceived weight of objects, two studies were performed, using equally weighing dolls differing in sex-related and age-related vulnerability or physical strength cues. To increase variation in perceived size, stimulus objects were viewed through optical…

  4. ARX - A Comprehensive Tool for Anonymizing Biomedical Data

    PubMed Central

    Prasser, Fabian; Kohlmayer, Florian; Lautenschläger, Ronald; Kuhn, Klaus A.

    2014-01-01

    Collaboration and data sharing have become core elements of biomedical research. Especially when sensitive data from distributed sources are linked, privacy threats have to be considered. Statistical disclosure control allows the protection of sensitive data by introducing fuzziness. Reduction of data quality, however, needs to be balanced against gains in protection. Therefore, tools are needed which provide a good overview of the anonymization process to those responsible for data sharing. These tools require graphical interfaces and the use of intuitive and replicable methods. In addition, extensive testing, documentation and openness to reviews by the community are important. Existing publicly available software is limited in functionality, and often active support is lacking. We present ARX, an anonymization tool that i) implements a wide variety of privacy methods in a highly efficient manner, ii) provides an intuitive cross-platform graphical interface, iii) offers a programming interface for integration into other software systems, and iv) is well documented and actively supported. PMID:25954407

  5. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  6. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  7. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  8. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-06-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  9. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    ERIC Educational Resources Information Center

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  10. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle

    PubMed Central

    Pagano, Maria E.; Post, Stephen G.; Johnson, Shannon M.

    2012-01-01

    The helper therapy principle (HTP) observes the helper’s health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry. PMID:23525280

  11. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post

  12. Self-disclosure. Reconciling psychoanalytic psychotherapy and alcoholics anonymous philosophy.

    PubMed

    Mallow, A J

    1998-01-01

    Therapists working in the addictions field and practicing from a psychoanalytic psychodynamic framework are often confronted with the patient's need to know, the demand for therapist self-disclosure. Consistent with Alcoholics Anonymous (AA) principles, many patients state that they cannot be helped unless the therapist is revealing of their personal background. This paper discusses the theoretical roots of therapist self-disclosure and the AA philosophy and offers suggestions for how the two might be reconciled.

  13. Utility-preserving transaction data anonymization with low information loss

    PubMed Central

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-01-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual’s record to their identity. Approaches that anonymize data by eliminating certain values in an individual’s record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers’ utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency. PMID:22563145

  14. Guaranteeing anonymity when sharing medical data, the Datafly System.

    PubMed Central

    Sweeney, L.

    1997-01-01

    We present a computer program named Datafly that maintains anonymity in medical data by automatically generalizing, substituting, and removing information as appropriate without losing many of the details found within the data. Decisions are made at the field and record level at the time of database access, so the approach can be used on the fly in role-based security within an institution, and in batch mode for exporting data from an institution. Often organizations release and receive medical data with all explicit identifiers, such as name, address and phone number, removed in the incorrect belief that patient confidentiality is maintained because the resulting data look anonymous; however, we show the remaining data can often be used to re-identify individuals by linking or matching the data to other databases or by looking at unique characteristics found in the fields and records of the database itself. When these less apparent aspects are taken into account, each released record can be made to ambiguously map to many possible people, providing a level of anonymity determined by the user. PMID:9357587

  15. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  16. Gamete donation and anonymity: the ethical and legal debate.

    PubMed

    Frith, L

    2001-05-01

    The British government is currently considering whether to review the law on information provision for donor offspring. This paper therefore provides an overview of the current international legal situation relating to donor anonymity and a review of the key arguments and evidence on both sides of the debate. While the British government is considering all aspects of information giving, both identifying and non-identifying donor information, this paper will focus on the most contentious issue: the provision of information that would identify the donor. The current legal situation in the UK and internationally is examined, drawing attention to a possible international trend towards more information giving. The evolution of the present British system is outlined and it is asked whether some of the concerns and values that gave rise to the practice of anonymous donation are still relevant today. Looking at the concept of a child's right to know their biological identity it examines the possible basis of such a right and its potential conflict with the perceived interests of the child's parents. Finally, some of the practical obstacles to non-anonymous donation are evaluated. The paper concludes that a review of the British law is both timely and desirable. PMID:11331623

  17. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  18. Anonymous HIV testing: what does it mean in policy and practice? A case study in Newfoundland and Labrador, Canada.

    PubMed

    Hancock, Amanda; Gustafson, Diana L

    2014-01-01

    HIV infection is not a legally notifiable disease at the national level in Canada; however, provincial and territorial officials voluntarily undertake notification to the Public Health Agency of Canada. A case study involving four community-based sites in Newfoundland and Labrador found that the absence of clear legislation concerning HIV testing presented challenges for nurses who had to interpret and comply with provincial legislation and agency policy while meeting the needs of test-seekers. This ambiguous messaging is part of other conflicting information about the availability of anonymous HIV testing that, along with other factors, may contribute to under-testing and under-diagnosis in the province. From a social justice perspective, developing a national HIV strategy and amending legislation to facilitate anonymous HIV testing might provide clearer direction to nurses and agencies, and promote public health by improving service delivery and increasing testing in under-tested, higher-risk-taking populations.

  19. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    PubMed

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month. PMID:27442957

  20. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    PubMed

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month.

  1. What drives the association between weight-conscious peer groups and disordered eating? Disentangling genetic and environmental selection from pure socialization effects.

    PubMed

    O'Connor, Shannon M; Burt, S Alexandra; VanHuysse, Jessica L; Klump, Kelly L

    2016-04-01

    Previous studies suggest strong associations between exposure to weight-conscious peer groups and increased levels of disordered eating. This association has been attributed to socialization effects (i.e., membership leads to disordered eating); however, selection effects (i.e., selecting into peer groups based on genetic and/or environmental predispositions toward disordered eating) could contribute to or even account for these associations. The current study was the first to use a co-twin control design to disentangle these types of selection factors from socialization effects. Participants included 610 female twins (ages 8-14) drawn from the Michigan State University Twin Registry. To comprehensively examine a range of eating pathology, several disordered eating attitudes and behaviors (e.g., body dissatisfaction, binge eating) were examined via self-report questionnaires. Questionnaires also were used to assess peer group emphasis on body weight and shape. Replicating previous results, significant individual-level associations were found between membership in weight-conscious peer groups and disordered eating. However, co-twin control analyses indicated that these associations were largely due to genetic and/or shared environmental selection factors rather than pure socialization effects. Importantly, results remained unchanged when controlling for pubertal status, suggesting that effects do not vary across developmental stage. Overall, these findings question whether associations between weight-conscious peer groups and disordered eating are due entirely to socialization processes. Future studies are needed to identify the specific genetic and/or shared environmental factors that may drive selection into weight-conscious peer groups.

  2. What drives the association between weight-conscious peer groups and disordered eating? Disentangling genetic and environmental selection from pure socialization effects.

    PubMed

    O'Connor, Shannon M; Burt, S Alexandra; VanHuysse, Jessica L; Klump, Kelly L

    2016-04-01

    Previous studies suggest strong associations between exposure to weight-conscious peer groups and increased levels of disordered eating. This association has been attributed to socialization effects (i.e., membership leads to disordered eating); however, selection effects (i.e., selecting into peer groups based on genetic and/or environmental predispositions toward disordered eating) could contribute to or even account for these associations. The current study was the first to use a co-twin control design to disentangle these types of selection factors from socialization effects. Participants included 610 female twins (ages 8-14) drawn from the Michigan State University Twin Registry. To comprehensively examine a range of eating pathology, several disordered eating attitudes and behaviors (e.g., body dissatisfaction, binge eating) were examined via self-report questionnaires. Questionnaires also were used to assess peer group emphasis on body weight and shape. Replicating previous results, significant individual-level associations were found between membership in weight-conscious peer groups and disordered eating. However, co-twin control analyses indicated that these associations were largely due to genetic and/or shared environmental selection factors rather than pure socialization effects. Importantly, results remained unchanged when controlling for pubertal status, suggesting that effects do not vary across developmental stage. Overall, these findings question whether associations between weight-conscious peer groups and disordered eating are due entirely to socialization processes. Future studies are needed to identify the specific genetic and/or shared environmental factors that may drive selection into weight-conscious peer groups. PMID:27043917

  3. What Drives the Association between Weight Conscious Peer Groups and Disordered Eating? Disentangling Genetic and Environmental Selection from Pure Socialization Effects

    PubMed Central

    O’Connor, Shannon M.; Burt, S. Alexandra; VanHuysse, Jessica L.; Klump, Kelly L.

    2015-01-01

    Previous studies suggest strong associations between exposure to weight conscious peer groups and increased levels of disordered eating. This association has been attributed to socialization effects (i.e., membership leads to disordered eating); however, selection effects (i.e., selecting into peer groups based on genetic and/or environmental predispositions toward disordered eating) could contribute to or even account for these associations. The current study was the first to use a co-twin control design to disentangle these types of selection factors from socialization effects. Participants included 610 female twins (ages 8–14) drawn from the Michigan State University Twin Registry. To comprehensively examine a range of eating pathology, several disordered eating attitudes and behaviors (e.g., body dissatisfaction, binge eating) were examined via self-report questionnaires. Questionnaires also were used to assess peer group emphasis on body weight and shape. Replicating previous results, significant individual-level associations were found between membership in weight conscious peer groups and disordered eating. However, co-twin control analyses indicated that these associations were largely due to genetic and/or shared environmental selection factors rather than pure socialization effects. Importantly, results remained unchanged when controlling for pubertal status, suggesting that effects do not vary across developmental stage. Overall, these findings question whether associations between weight conscious peer groups and disordered eating are due entirely to socialization processes. Future studies are needed to identify the specific genetic and/or shared environmental factors that may drive selection into weight conscious peer groups. PMID:27043917

  4. The implications of stigma and anonymity for self-disclosure in health blogs.

    PubMed

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  5. Body-Esteem Mediates the Relationship between Self-Esteem and Social Anxiety: The Moderating Roles of Weight and Gender

    ERIC Educational Resources Information Center

    Abdollahi, Abbas; Abu Talib, Mansor; Reza Vakili Mobarakeh, Mohammad; Momtaz, Vahid; Kavian Mobarake, Roya

    2016-01-01

    The prevalence of social anxiety during adolescence is high, and it is necessary that we increase our knowledge on the related factors that contribute to social anxiety. The present study sought to examine the relationships among self-esteem, body-esteem, and social anxiety among adolescent students, as well as to examine the mediating role of…

  6. Associations between program outcomes and adherence to Social Cognitive Theory tasks: process evaluation of the SHED-IT community weight loss trial for men

    PubMed Central

    2014-01-01

    Background Despite rising international rates of obesity, men remain reluctant to participate in weight loss research. There is a lack of evidence to guide the development of effective weight loss interventions that engage men. The objective of this study was to provide a comprehensive process evaluation of the SHED-IT (Self-Help, Exercise and Diet using Information Technology) weight loss program for men, as delivered in the SHED-IT community weight loss trial, and to identify key components associated with success. Methods In an assessor-blinded randomised controlled trial, 159 overweight and obese men (BMI 25.0-40.0 kg/m2) were randomised to one of two gender-tailored weight loss interventions with no face-to-face contact, or a control group. The interventions were informed by Bandura’s Social Cognitive Theory (SCT) with men encouraged to complete a Support Book containing SCT-based tasks including goal setting, reward setting, creation of social support strategies and self-monitoring of: i) weight, ii) physical activity, and iii) diet. At post-test, compliance with SCT tasks was examined and men also completed a process evaluation questionnaire. Results Both SHED-IT intervention groups demonstrated greater weight loss during the intervention compared to the control, with no difference between intervention groups. Most men engaged with the SCT tasks although compliance declined over time and utilisation of social support networks and reward selection was poor. In a multiple regression model, the number of goals set (β [95% CI] = -0.3 [-0.6, -0.1], p = 0.01) and the number of weight records documented (β [95% CI] = -0.2 [-0.4, -0.0], p = 0.03) independently predicted weight loss. The process evaluation indicated that men found the programs to be supportive, enjoyable and beneficial. Conclusions This process evaluation provides valuable information to inform the development of obesity treatment strategies that engage men. Future studies with

  7. Quantum election scheme based on anonymous quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhou, Rui-Rui; Yang, Li

    2012-08-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible.

  8. Quantum anonymous ranking based on the Chinese remainder theorem

    NASA Astrophysics Data System (ADS)

    Lin, Song; Guo, Gong-De; Huang, Feng; Liu, Xiao-Fen

    2016-01-01

    In this paper, an efficient quantum anonymous ranking protocol with single particles is proposed. A semitrusted server is introduced to help multiple users achieve this secure task. At the end of the protocol, each user can obtain the rankings of his private data, and keep these data secret. The Chinese remainder theorem is utilized to reduce the level of signal particles and to improve the efficiency of the presented protocol. Meanwhile, a secret transmission order of the signal particles is used to keep the traveling particles secure. Finally, we discuss the security of this protocol and prove it to be secure against certain common attacks under ideal conditions.

  9. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    PubMed

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist.

  10. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    PubMed

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. PMID:27073260

  11. Secular trends in social class differences of height, weight and BMI of boys from two schools in Lisbon, Portugal (1910-2000).

    PubMed

    Cardoso, Hugo F V; Caninas, Madalena

    2010-03-01

    Data on the physical growth of children can provide useful information about the temporal changes in the economic conditions of the society in which they live and the extent of social inequalities within that society as well. Several studies have documented secular changes in the physical growth of children or of adult height, but seldom have the socioeconomic differences in secular trend been reported. The aim of this study is to examine differences in the secular trend of height, weight and BMI of 10-16-year-old boys enrolled in two schools of opposite socioeconomic makeup in Lisbon, Portugal, in the early and late 20th century. The samples from the upper-middle class come from the Colégio Militar, a military boarding school, and the lower-class samples come from the Casa Pia de Lisboa, a residential school for underprivileged boys. While boys from both schools show an approximate increase of 13.6cm in height, 13.5kg in weight and 2.4kg/m(2) in BMI, the Casa Pia students were shorter and lighter than their Colégio Militar counterparts throughout the 90-year period. Social class differences in mean height, weight and BMI tend to be greater in 1910 than in 2000, but results are statistically significant for height alone. When the two periods are taken together, Colégio Militar boys differ from their Casa Pia counterparts by approximately 6.4cm in height, 4.8kg in weight and 0.4kg/m(2) in BMI. Both samples show a considerable increase in height, weight and BMI but class differences in height, weight and BMI decreased slightly if at all, throughout the 90-year period. This suggests that socioeconomic disparities are persistent, having diminished only slightly since the early 20th century.

  12. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    PubMed

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  13. Quantum anonymous voting with unweighted continuous-variable graph states

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  14. Private anonymous fingerprinting for color images in the wavelet domain

    NASA Astrophysics Data System (ADS)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  15. Give or Take a Few? Comparing Measured and Self-Reported Height and Weight as Correlates of Social Physique Anxiety

    ERIC Educational Resources Information Center

    Gay, Jennifer; Monsma, Eva V.; Torres-McGehee, Toni

    2009-01-01

    Statistically controlling for physical size is common practice, especially in self-perception studies uncovering the etiology of maladaptive behaviors, such as eating disorders. For example, social physique anxiety (SPA)--apprehension about social evaluations while presenting oneself in front of others (Leary, 1992)--is a prominent correlate of…

  16. Social support and weight maintenance in marriage: the interactive effects of support seeking, support provision, and gender.

    PubMed

    Meltzer, Andrea L; McNulty, James K; Karney, Benjamin R

    2012-10-01

    Spouses tend to gain weight over the early years of marriage. Given that maintaining a healthy weight is a common goal among newlyweds, and given the importance of partner support to goal achievement, the current study examined whether the quality of spouses' supportive behaviors in early marriage predicted weight gain over the first 4 years of marriage. We observed 169 newlywed couples discussing a personal goal, coded those discussions for the quality of both partners' support behaviors, and assessed weight every 6 months for 4 years. Husbands and wives both tended to gain more weight to the extent that they engaged in behaviors indicative of a lack of motivation while seeking support, such as whining, complaining, and avoiding responsibility. Among husbands, but not wives, this effect was moderated by their partners' tendencies to engage in oppositional behaviors like criticism, confrontation, and rejection while providing support. These effects held controlling for marital satisfaction, depressive symptoms, neuroticism, and both partners' income. These findings demonstrate the importance of spouses' supportive behaviors for goal achievement, illuminate the dyadic nature of weight gain, and demonstrate the benefits of negativity in some contexts.

  17. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Qianli; Wang, Jilong; Li, Xing

    Traffic traces are generally anonymized before used in analysis. Prefix-preserving anonymization is often used to avoid privacy issues as well as preserve prefix relationship after anonymization. To facilitate research on real time high speed network traffic, address anonymization algorithm should be fast and consistent. In this paper, the bit string based algorithm and the embedded bit string algorithm will be introduced. Bit string based algorithm uses precomputed bit string to improve the anonymization performance. Instead of only using the LSB of each Rijndael output, the embedded bit string algorithm will take advantage of the full size Rijndael output to anonymize several bits at the same time. The implementation can be downloaded from https://sourceforge.net/projects/ipanon.

  18. Weight Gain Prevention for College Freshmen: Comparing Two Social Cognitive Theory-Based Interventions with and without Explicit Self-Regulation Training.

    PubMed

    Dennis, Elizabeth A; Potter, Kerry L; Estabrooks, Paul A; Davy, Brenda M

    2012-01-01

    The college transition represents a critical period for maintaining a healthy weight, yet intervention participation and retention represent significant challenges. The objective of this investigation was to evaluate the preliminary efficacy and acceptability of two interventions to prevent freshman weight gain. One intervention provided opportunities to improve outcome expectations and self-efficacy within a social cognitive theory framework (SCT), while the other targeted the same variables but focused on explicit training in self-regulation skills (SCTSR). Methods. Freshmen (n = 45) aged >18 years were randomized to a 14-week intervention, SCT or SCTSR; both included online modules and in-class meetings. Of the 45 students randomized, 5 withdrew before the classes began and 39 completed pre- and posttesting. Primary outcomes included body weight/composition, health behaviors, and program acceptability. Analyses included independent sample t-tests, repeated measures ANOVA, and bivariate correlational analyses. Results. Body weight increased over the 14-week period, but there was no group difference. Percent body fat increased in SCTSR but not SCT (mean difference: SCTSR, +1.63 ± 0.52%; SCT, -0.25 ± 0.45%; P = 0.01). Class attendance was 100% (SCTSR) and 98% (SCT); SCTSR students (>50%) remarked that the online tracking required "too much time." Conclusions. The intervention was well received, although there were no improvements in weight outcomes.

  19. Weight Gain Prevention for College Freshmen: Comparing Two Social Cognitive Theory-Based Interventions with and without Explicit Self-Regulation Training

    PubMed Central

    Dennis, Elizabeth A.; Potter, Kerry L.; Estabrooks, Paul A.; Davy, Brenda M.

    2012-01-01

    The college transition represents a critical period for maintaining a healthy weight, yet intervention participation and retention represent significant challenges. The objective of this investigation was to evaluate the preliminary efficacy and acceptability of two interventions to prevent freshman weight gain. One intervention provided opportunities to improve outcome expectations and self-efficacy within a social cognitive theory framework (SCT), while the other targeted the same variables but focused on explicit training in self-regulation skills (SCTSR). Methods. Freshmen (n = 45) aged >18 years were randomized to a 14-week intervention, SCT or SCTSR; both included online modules and in-class meetings. Of the 45 students randomized, 5 withdrew before the classes began and 39 completed pre- and posttesting. Primary outcomes included body weight/composition, health behaviors, and program acceptability. Analyses included independent sample t-tests, repeated measures ANOVA, and bivariate correlational analyses. Results. Body weight increased over the 14-week period, but there was no group difference. Percent body fat increased in SCTSR but not SCT (mean difference: SCTSR, +1.63 ± 0.52%; SCT, −0.25 ± 0.45%; P = 0.01). Class attendance was 100% (SCTSR) and 98% (SCT); SCTSR students (>50%) remarked that the online tracking required “too much time.” Conclusions. The intervention was well received, although there were no improvements in weight outcomes. PMID:22778919

  20. Early-Life Social Origins of Later-Life Body Weight: The Role of Socioeconomic Status and Health Behaviors over the Life Course

    PubMed Central

    Logan, Ellis Scott; Richman, Aliza

    2014-01-01

    Using the 1957-2004 data from the Wisconsin Longitudinal Study, we apply structural equation modeling to examine gender-specific effects of family socioeconomic status (SES) at age 18 on body weight at age 65. We further explore SES and health behaviors over the life course as mechanisms linking family background and later-life body weight. We find that early-life socioeconomic disadvantage is related to higher body weight at age 65 and a steeper weight increase between midlife and late life. These adverse effects are stronger among women than men. Significant mediators of the effect of parents' SES include adolescent body mass (especially among women) as well as exercise and SES in midlife. Yet, consistent with the critical period mechanism, the effect of early-life SES on late-life body weight persists net of all mediating variables. This study expands current understanding of life-course mechanisms that contribute to obesity and increase biological vulnerability to social disadvantage. PMID:24767590

  1. Talking about suicide: confidentiality and anonymity in qualitative research.

    PubMed

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  2. Shared ideology in Alcoholics Anonymous: a grounded theory approach.

    PubMed

    Wright, K B

    1997-01-01

    This article uses grounded theory to explore the shared ideology espoused in Alcoholics Anonymous, specifically the nature and role of shared ideology in increasing the efficacy of the recovery process, and the features of the group's tenets and meetings that help facilitate members' indoctrination. Findings support Kassel and Wagner's (1993) contention of shared ideology's major role in the change process of the group, and Antze's (1976) categorizations of the AA ideology and alcoholics' characteristics. Antze's (1979) finding that AA ideology removes the concept of drinking from the voluntary sphere was also supported. The group was found to be a context in which members could change their assumptive worlds through reinterpreting life events, as Frank and Frank (1991) contended. Little support was found for Alexander and Rollins's (1984) comparison of AA to religious cults. The findings underscore the importance of human interaction as persuasion and reinforcement for AA ideology.

  3. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  4. Father-daughter incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Beard, Keith W; Kuo, Shih-Ya; Swindell, Samuel V S; Kommor, Martin J

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were more likely than controls to endorse feeling damaged, psychologically injured, estranged from one or both parents, and shamed by others when they tried to open up about their experience. They had been eroticized early on by the incest experience, and it interfered with their adult sexuality. Incest victims experienced coitus earlier than controls and after reaching age 18 had more sex partners and were more likely to have casual sex outside their primary relationship and engage in sex for money than controls. They also had worse scores on scales measuring depression, sexual satisfaction, and communication about sex than controls.

  5. Shared ideology in Alcoholics Anonymous: a grounded theory approach.

    PubMed

    Wright, K B

    1997-01-01

    This article uses grounded theory to explore the shared ideology espoused in Alcoholics Anonymous, specifically the nature and role of shared ideology in increasing the efficacy of the recovery process, and the features of the group's tenets and meetings that help facilitate members' indoctrination. Findings support Kassel and Wagner's (1993) contention of shared ideology's major role in the change process of the group, and Antze's (1976) categorizations of the AA ideology and alcoholics' characteristics. Antze's (1979) finding that AA ideology removes the concept of drinking from the voluntary sphere was also supported. The group was found to be a context in which members could change their assumptive worlds through reinterpreting life events, as Frank and Frank (1991) contended. Little support was found for Alexander and Rollins's (1984) comparison of AA to religious cults. The findings underscore the importance of human interaction as persuasion and reinforcement for AA ideology. PMID:10977242

  6. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  7. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    PubMed Central

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  8. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis

    PubMed Central

    Kelly, John F.; Greene, M. Claire; Bergman, Brandon G.

    2014-01-01

    Aims: Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Method: Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for ‘primary drug’ patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). Results: The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Conclusion: Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. PMID:25294352

  9. Digital Social Norm Enforcement: Online Firestorms in Social Media

    PubMed Central

    Rost, Katja; Stahel, Lea; Frey, Bruno S.

    2016-01-01

    Actors of public interest today have to fear the adverse impact that stems from social media platforms. Any controversial behavior may promptly trigger temporal, but potentially devastating storms of emotional and aggressive outrage, so called online firestorms. Popular targets of online firestorms are companies, politicians, celebrities, media, academics and many more. This article introduces social norm theory to understand online aggression in a social-political online setting, challenging the popular assumption that online anonymity is one of the principle factors that promotes aggression. We underpin this social norm view by analyzing a major social media platform concerned with public affairs over a period of three years entailing 532,197 comments on 1,612 online petitions. Results show that in the context of online firestorms, non-anonymous individuals are more aggressive compared to anonymous individuals. This effect is reinforced if selective incentives are present and if aggressors are intrinsically motivated. PMID:27315071

  10. Digital Social Norm Enforcement: Online Firestorms in Social Media.

    PubMed

    Rost, Katja; Stahel, Lea; Frey, Bruno S

    2016-01-01

    Actors of public interest today have to fear the adverse impact that stems from social media platforms. Any controversial behavior may promptly trigger temporal, but potentially devastating storms of emotional and aggressive outrage, so called online firestorms. Popular targets of online firestorms are companies, politicians, celebrities, media, academics and many more. This article introduces social norm theory to understand online aggression in a social-political online setting, challenging the popular assumption that online anonymity is one of the principle factors that promotes aggression. We underpin this social norm view by analyzing a major social media platform concerned with public affairs over a period of three years entailing 532,197 comments on 1,612 online petitions. Results show that in the context of online firestorms, non-anonymous individuals are more aggressive compared to anonymous individuals. This effect is reinforced if selective incentives are present and if aggressors are intrinsically motivated. PMID:27315071

  11. Interest in a Twitter-delivered weight loss program among women of childbearing age.

    PubMed

    Waring, Molly E; Schneider, Kristin L; Appelhans, Bradley M; Simas, Tiffany A Moore; Xiao, Rui S; Whited, Matthew C; Busch, Andrew M; Evans, Martinus M; Pagoto, Sherry L

    2016-06-01

    Weight management through the childbearing years is important, yet few women have access to efficacious weight loss programs. Online social network-delivered programs may increase reach and thus impact. The aim of this study was to gauge interest in a Twitter-based weight loss intervention among women of childbearing age and the feasibility of recruitment via Twitter. We recruited English-speaking women aged 18-45 years (N = 63) from Twitter to complete an anonymous online survey including open-ended questions about program advantages and concerns. Forty percent of participants were obese and 83 % were trying to lose weight. Eighty-one percent were interested in a Twitter-delivered weight loss program. Interest was high in all subgroups (62-100 %). Participants (59 %) cited program advantages, including convenience, support/accountability, and privacy. Concerns (59 %) included questions about privacy, support/accountability, engagement, efficacy, and technology barriers. Research is needed to develop and evaluate social media-delivered interventions, and to develop methods for recruiting participants directly from Twitter. PMID:27356998

  12. Interest in a Twitter-delivered weight loss program among women of childbearing age.

    PubMed

    Waring, Molly E; Schneider, Kristin L; Appelhans, Bradley M; Simas, Tiffany A Moore; Xiao, Rui S; Whited, Matthew C; Busch, Andrew M; Evans, Martinus M; Pagoto, Sherry L

    2016-06-01

    Weight management through the childbearing years is important, yet few women have access to efficacious weight loss programs. Online social network-delivered programs may increase reach and thus impact. The aim of this study was to gauge interest in a Twitter-based weight loss intervention among women of childbearing age and the feasibility of recruitment via Twitter. We recruited English-speaking women aged 18-45 years (N = 63) from Twitter to complete an anonymous online survey including open-ended questions about program advantages and concerns. Forty percent of participants were obese and 83 % were trying to lose weight. Eighty-one percent were interested in a Twitter-delivered weight loss program. Interest was high in all subgroups (62-100 %). Participants (59 %) cited program advantages, including convenience, support/accountability, and privacy. Concerns (59 %) included questions about privacy, support/accountability, engagement, efficacy, and technology barriers. Research is needed to develop and evaluate social media-delivered interventions, and to develop methods for recruiting participants directly from Twitter.

  13. The emergence of age-dependent social cognitive deficits after generalized insult to the developing brain: a longitudinal prospective analysis using susceptibility-weighted imaging.

    PubMed

    Ryan, Nicholas P; Catroppa, Cathy; Cooper, Janine M; Beare, Richard; Ditchfield, Michael; Coleman, Lee; Silk, Timothy; Crossley, Louise; Beauchamp, Miriam H; Anderson, Vicki A

    2015-05-01

    Childhood and adolescence are critical periods for maturation of neurobiological processes that underlie complex social and emotional behavior including Theory of Mind (ToM). While structural correlates of ToM are well described in adults, less is known about the anatomical regions subsuming these skills in the developing brain or the impact of cerebral insult on the acquisition and establishment of high-level social cognitive skills. This study aimed to examine the differential influence of age-at-insult and brain pathology on ToM in a sample of children and adolescents with traumatic brain injury (TBI). Children and adolescents with TBI (n = 112) were categorized according to timing of brain insult: (i) middle childhood (5-9 years; n = 41); (ii) late childhood (10-11 years; n = 39); and (iii) adolescence (12-15 years; n = 32) and group-matched for age, gender, and socioeconomic status to a typically developing (TD) control group (n = 43). Participants underwent magnetic resonance imaging including a susceptibility-weighted imaging (SWI) sequence 2-8 weeks postinjury and were assessed on a battery of ToM tasks at 6- and 24-months after injury. Results showed that for adolescents with TBI, social cognitive dysfunction at 6- and 24-months postinjury was associated with diffuse neuropathology and a greater number of lesions detected using SWI. In the late childhood TBI group, we found a time-dependent emergence of social cognitive impairment, linked to diffuse neuropathology. The middle childhood TBI group demonstrated performance unrelated to SWI pathology and comparable to TD controls. Findings indicate that the full extent of social cognitive deficits may not be realized until the associated skills reach maturity. Evidence for brain structure-function relationships suggests that the integrity of an anatomically distributed network of brain regions and their connections is necessary for the acquisition and establishment of high-level social

  14. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    ERIC Educational Resources Information Center

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  15. Oral History Research Ethics: Should Anonymity and Confidentially Issues Be Dealt with on Their Own Merit?

    ERIC Educational Resources Information Center

    Le Roux, C.

    2015-01-01

    A primary principle of ethical codes in research involving people is that of informed consent which ensures participants' right to privacy, confidentiality and anonymity. A blanket application of the principle of anonymity to Oral History (OH) research could well be counterproductive to the purported aims of OH research. The research comprised a…

  16. Survey Confidentiality vs. Anonymity: Young Men's Self-Reported Substance Use.

    ERIC Educational Resources Information Center

    Moore, Roland S.; Ames, Genevieve M.

    2002-01-01

    Experiment was conducted to see if respondents providing identification would be as forthcoming regarding substance use as anonymous respondents. No statistically significant differences were found between 2 groups' self-reported substance use over the previous 12 months. Findings suggest the lack of anonymity does not necessarily impede the same…

  17. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    ERIC Educational Resources Information Center

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  18. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    ERIC Educational Resources Information Center

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  19. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    ERIC Educational Resources Information Center

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  20. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    PubMed

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  1. Direct and social genetic effects on body weight at 270 days and carcass and ham quality traits in heavy pigs.

    PubMed

    Rostellato, R; Sartori, C; Bonfatti, V; Chiarot, G; Carnier, P

    2015-01-01

    The aims of this study were to estimate covariance components for BW at 270 d (BW270) and carcass and ham quality traits in heavy pigs using models accounting for social effects and to compare the ability of such models to fit the data relative to models ignoring social interactions. Phenotypic records were from 9,871 pigs sired by 293 purebred boars mated to 456 crossbred sows. Piglets were born and reared at the same farm and randomly assigned at 60 d of age to groups (6.1 pigs per group on average) housed in finishing pens, each having an area of 6 m(2). The average additive genetic relationship among group mates was 0.11. Pigs were slaughtered at 277 ± 3 d of age and 169.7 ± 13.9 kg BW in groups of nearly 70 animals each. Four univariate animal models were compared: a basic model (M1) including only direct additive genetic effects, a model (M2) with nonheritable social group (pen) effects in addition to effects in M1, a model (M3) accounting for litter effects in addition to M2, and a model (M4) accounting for social genetic effects in addition to effects in M3. Restricted maximum likelihood estimates of covariance components were obtained for BW270; carcass backfat depth; carcass lean meat content (CLM); iodine number (IOD); and linoleic acid content (LIA) of raw ham subcutaneous fat; subcutaneous fat depth in the proximity of semimembranosus muscle (SFD1) and quadriceps femoris muscle (SFD2); and linear scores for ham round shape (RS), subcutaneous fat (SF), and marbling. Likelihood ratio tests indicated that, for all traits, M2 fit the data better than M1 and that M3 was superior to M2 except for SFD1 and SFD2. Model M4 was significantly better than M3 for BW270 (P < 0.001) and CLM, IOD, RS, and SF (P < 0.05). The contribution of social genetic effects to the total heritable variance was large for CLM and BW270, ranging from 33.2 to 35%, whereas the one for ham quality traits ranged from 6.8 (RS) to 11.2% (SF). Direct and social genetic effects on BW270

  2. Direct and social genetic effects on body weight at 270 days and carcass and ham quality traits in heavy pigs.

    PubMed

    Rostellato, R; Sartori, C; Bonfatti, V; Chiarot, G; Carnier, P

    2015-01-01

    The aims of this study were to estimate covariance components for BW at 270 d (BW270) and carcass and ham quality traits in heavy pigs using models accounting for social effects and to compare the ability of such models to fit the data relative to models ignoring social interactions. Phenotypic records were from 9,871 pigs sired by 293 purebred boars mated to 456 crossbred sows. Piglets were born and reared at the same farm and randomly assigned at 60 d of age to groups (6.1 pigs per group on average) housed in finishing pens, each having an area of 6 m(2). The average additive genetic relationship among group mates was 0.11. Pigs were slaughtered at 277 ± 3 d of age and 169.7 ± 13.9 kg BW in groups of nearly 70 animals each. Four univariate animal models were compared: a basic model (M1) including only direct additive genetic effects, a model (M2) with nonheritable social group (pen) effects in addition to effects in M1, a model (M3) accounting for litter effects in addition to M2, and a model (M4) accounting for social genetic effects in addition to effects in M3. Restricted maximum likelihood estimates of covariance components were obtained for BW270; carcass backfat depth; carcass lean meat content (CLM); iodine number (IOD); and linoleic acid content (LIA) of raw ham subcutaneous fat; subcutaneous fat depth in the proximity of semimembranosus muscle (SFD1) and quadriceps femoris muscle (SFD2); and linear scores for ham round shape (RS), subcutaneous fat (SF), and marbling. Likelihood ratio tests indicated that, for all traits, M2 fit the data better than M1 and that M3 was superior to M2 except for SFD1 and SFD2. Model M4 was significantly better than M3 for BW270 (P < 0.001) and CLM, IOD, RS, and SF (P < 0.05). The contribution of social genetic effects to the total heritable variance was large for CLM and BW270, ranging from 33.2 to 35%, whereas the one for ham quality traits ranged from 6.8 (RS) to 11.2% (SF). Direct and social genetic effects on BW270

  3. Maxwell and creation: Acceptance, criticism, and his anonymous publication

    NASA Astrophysics Data System (ADS)

    Marston, Philip L.

    2007-08-01

    Although James Clerk Maxwell's religious views and discussions on atoms having the properties of ``manufactured articles'' have been discussed, some aspects of the responses by his contemporaries to his remarks on creation have been neglected. Various responses quoted here include a book from 1878 by ``Physicus'' (George John Romanes) attributing ``arrogance'' to Maxwell for his inferences. Relevant aspects of the evolution of the perspective of Romanes are noted. A response by B. F. Westcott indicated that Maxwell was the author of a related anonymous publication concerned with what eventually became known as the heat death of the universe. In his teaching to theology students, Westcott, a friend of Maxwell, emphasized Maxwell's reasoning based on the dissipation of energy. There are similarities between Maxwell's perspective on creation and Biblical commentaries by fellow Eranus Club members Westcott and J. B. Lightfoot. Interest in Maxwell's remarks extended into the twentieth century. The principal Baptist chapel attended by Maxwell and his wife when in London in the 1860s is identified and some relevant attributes of the chapel and of its pastor are described.

  4. Sister-sister incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  5. Summarized data to achieve population-wide anonymized wellness measures.

    PubMed

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  6. Knockdown of ventral tegmental area mu-opioid receptors in rats prevents effects of social defeat stress: implications for amphetamine cross-sensitization, social avoidance, weight regulation and expression of brain-derived neurotrophic factor.

    PubMed

    Johnston, Caitlin E; Herschel, Daniel J; Lasek, Amy W; Hammer, Ronald P; Nikulina, Ella M

    2015-02-01

    Social defeat stress causes social avoidance and long-lasting cross-sensitization to psychostimulants, both of which are associated with increased brain-derived neurotrophic factor (BDNF) expression in the ventral tegmental area (VTA). Moreover, social stress upregulates VTA mu-opioid receptor (MOR) mRNA. In the VTA, MOR activation inhibits GABA neurons to disinhibit VTA dopamine neurons, thus providing a role for VTA MORs in the regulation of psychostimulant sensitization. The present study determined the effect of lentivirus-mediated MOR knockdown in the VTA on the consequences of intermittent social defeat stress, a salient and profound stressor in humans and rodents. Social stress exposure induced social avoidance and attenuated weight gain in animals with non-manipulated VTA MORs, but both these effects were prevented by VTA MOR knockdown. Rats with non-manipulated VTA MOR expression exhibited cross-sensitization to amphetamine challenge (1.0 mg/kg, i.p.), evidenced by a significant augmentation of locomotion. By contrast, knockdown of VTA MORs prevented stress-induced cross-sensitization without blunting the locomotor-activating effects of amphetamine. At the time point corresponding to amphetamine challenge, immunohistochemical analysis was performed to examine the effect of stress on VTA BDNF expression. Prior stress exposure increased VTA BDNF expression in rats with non-manipulated VTA MOR expression, while VTA MOR knockdown prevented stress-induced expression of VTA BDNF. Taken together, these results suggest that upregulation of VTA MOR is necessary for the behavioral and biochemical changes induced by social defeat stress. Elucidating VTA MOR regulation of stress effects on the mesolimbic system may provide new therapeutic targets for treating stress-induced vulnerability to substance abuse.

  7. Knockdown of ventral tegmental area mu-opioid receptors in rats prevents effects of social defeat stress: Implications for amphetamine cross-sensitization, social avoidance, weight regulation and expression of brain-derived neurotrophic factor

    PubMed Central

    Johnston, Caitlin E.; Herschel, Daniel; Lasek, Amy W.; Hammer, Ronald P.; Nikulina, Ella M.

    2014-01-01

    Social defeat stress causes social avoidance and long-lasting cross-sensitization to psychostimulants, both of which are associated with increased brain-derived neurotrophic factor (BDNF) expression in the ventral tegmental area (VTA). Moreover, social stress upregulates VTA mu-opioid receptor (MOR) mRNA. In the VTA, MOR activation inhibits GABA neurons to disinhibit VTA dopamine neurons, thus providing a role for VTA MORs in the regulation of psychostimulant sensitization. The present study determined the effect of lentivirus-mediated MOR knockdown in the VTA on the consequences of intermittent social defeat stress, a salient and profound stressor in humans and rodents. Social stress exposure induced social avoidance and attenuated weight gain in animals with non-manipulated VTA MORs, but both these effects were prevented by VTA MOR knockdown. Rats with non-manipulated VTA MOR expression exhibited cross-sensitization to amphetamine challenge (1.0 mg/kg, i.p.), evidenced by a significant augmentation of locomotion. By contrast, knockdown of VTA MORs prevented stress-induced cross-sensitization without blunting the locomotor-activating effects of amphetamine. At the time point corresponding to amphetamine challenge, immunohistochemical analysis was performed to examine the effect of stress on VTA BDNF expression. Prior stress exposure increased VTA BDNF expression in rats with non-manipulated VTA MOR expression, while VTA MOR knockdown prevented stress-induced expression of VTA BDNF. Taken together, these results suggest that upregulation of VTA MOR is necessary for the behavioral and biochemical changes induced by social defeat stress. Elucidating VTA MOR regulation of stress effects on the mesolimbic system may provide new therapeutic targets for treating stress-induced vulnerability to substance abuse. PMID:25446676

  8. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  9. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    PubMed

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure. PMID:26267063

  10. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    PubMed

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  11. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  12. Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    An anonymous password-authenticated key exchange (anonymous PAKE) protocol is designed to provide both password-only authentication and user anonymity against a semi-honest server, who follows the protocol honestly. Very recently, Yang and Zhang [25] have proposed a new anonymous PAKE (NAPAKE) protocol that is claimed efficient compared to the previous constructions. In this paper, we propose a very-efficient anonymous PAKE (called, VEAP) protocol that provides the most efficiency among their kinds in terms of computation and communication costs. The VEAP protocol guarantees semantic security of session keys in the random oracle model under the chosen target CDH problem, and unconditional user anonymity against a semi-honest server. If the pre-computation is allowed, both the user and the server are required to compute only one modular exponentiation, respectively. Surprisingly, this is the same computation cost of the well-known Diffie-Hellman protocol that does not provide authentication at all. In addition, we extend the VEAP protocol in two ways: the first is designed to reduce the communication costs of the VEAP protocol and the second shows that stripping off anonymity parts from the VEAP protocol results in a new PAKE protocol.

  13. Maternal social support and neighborhood income inequality as predictors of low birth weight and preterm birth outcome disparities: analysis of South Carolina Pregnancy Risk Assessment and Monitoring System survey, 2000-2003.

    PubMed

    Nkansah-Amankra, Stephen; Dhawain, Ashish; Hussey, James Robert; Luchok, Kathryn J

    2010-09-01

    Effects of income inequality on health and other social systems have been a subject of considerable debate, but only a few studies have used multilevel models to evaluate these relationships. The main objectives of the study were to (1) Evaluate the relationships among neighborhood income inequality, social support and birth outcomes (low birth weight, and preterm delivery) and (2) Assess variations in racial disparities in birth outcomes across neighborhood contexts of income distribution and maternal social support. We evaluated these relationships by using South Carolina Pregnancy Risk Assessment and Monitoring System (PRAMS) survey for 2000-2003 geocoded to 2000 US Census data for South Carolina. Multilevel analysis was used to simultaneously evaluate the association between income inequality (measured as Gini), maternal social relationships and birth outcomes (low birth weight and preterm delivery). The results showed residence in neighborhoods with medium levels of income inequality was independently associated with low birth weight (OR: 2.00; 95% CI 1.14-3.26), but not preterm birth; low social support was an independent risk for low birth weight or preterm births. The evidence suggests that non-Hispanic black mothers were at increased risks of low birth weight or preterm birth primarily due to greater exposures of neighborhood deprivations associated with low income and reduced social support and modified by unequal income distribution.

  14. Seeking Insights About Cycling Mood Disorders via Anonymized Search Logs

    PubMed Central

    White, Ryen W; Horvitz, Eric

    2014-01-01

    Background Mood disorders affect a significant portion of the general population. Cycling mood disorders are characterized by intermittent episodes (or events) of the disease. Objective Using anonymized Web search logs, we identify a population of people with significant interest in mood stabilizing drugs (MSD) and seek evidence of mood swings in this population. Methods We extracted queries to the Microsoft Bing search engine made by 20,046 Web searchers over six months, separately explored searcher demographics using data from a large external panel of users, and sought supporting information from people with mood disorders via a survey. We analyzed changes in information needs over time relative to searches on MSD. Results Queries for MSD focused on side effects and their relation to the disease. We found evidence of significant changes in search behavior and interests coinciding with days that MSD queries are made. These include large increases (>100%) in the access of nutrition information, commercial information, and adult materials. A survey of patients diagnosed with mood disorders provided evidence that repeated queries on MSD may come with exacerbations of mood disorder. A classifier predicting the occurrence of such queries one day before they are observed obtains strong performance (AUC=0.78). Conclusions Observed patterns in search behavior align with known behaviors and those highlighted by survey respondents. These observations suggest that searchers showing intensive interest in MSD may be patients who have been prescribed these drugs. Given behavioral dynamics, we surmise that the days on which MSD queries are made may coincide with commencement of mania or depression. Although we do not have data on mood changes and whether users have been diagnosed with bipolar illness, we see evidence of cycling in people who show interest in MSD and further show that we can predict impending shifts in behavior and interest. PMID:24568936

  15. Does Social Health Insurance Close the Gap: The Case of Socioeconomic Status and Preterm Low-Birth-Weight Survival.

    PubMed

    Hsieh, Vivian Chia-Rong; Shieh, Shwn-Huey; Chen, Chiu-Ying; Liou, Saou-Hsing; Hsiao, Yu-Chen; Wu, Trong-Neng

    2015-07-01

    Using a retrospective cohort study design, we report empirical evidence on the effect of parental socioeconomic status, primary care, and health care expenditure associated with preterm or low-birth-weight (PLBW) babies on their mortality (neonatal, postneonatal, and under-5 mortality) under a universal health care system. A total of 4668 singleton PLBW babies born in Taiwan between January 1 and December 31, 2001, are extracted from a population-based medical claims database for a follow-up of up to 5 years. Multivariate survival models suggest the positive effect of higher parental income is significant in neonatal period but diminishes in later stages. Consistent inverse relationship is observed between adequate antenatal care and the three outcomes: neonatal hazard ratio (HR) = 0.494, 95% confidence interval (CI) = 0.312 to 0.783; postneonatal HR = 0.282, 95% CI = 0.102 to 0.774; and under-5 HR = 0.575, 95% CI = 0.386 to 0.857. Primary care services uptake should be actively promoted, particularly in lower income groups, to prevent premature PLBW mortality. PMID:25922387

  16. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  17. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  18. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  19. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  20. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given. PMID:23849002

  1. An environmental, economic, and social assessment of improving cattle finishing weight or average daily gain within U.S. beef production.

    PubMed

    White, R R; Capper, J L

    2013-12-01

    The objective of this study was to assess environmental impact, economic viability, and social acceptability of 3 beef production systems with differing levels of efficiency. A deterministic model of U.S. beef production was used to predict the number of animals required to produce 1 × 10(9) kg HCW beef. Three production treatments were compared, 1 representing average U.S. production (control), 1 with a 15% increase in ADG, and 1 with a 15% increase in finishing weight (FW). For each treatment, various socioeconomic scenarios were compared to account for uncertainty in producer and consumer behavior. Environmental impact metrics included feed consumption, land use, water use, greenhouse gas emissions (GHGe), and N and P excretion. Feed cost, animal purchase cost, animal sales revenue, and income over costs (IOVC) were used as metrics of economic viability. Willingness to pay (WTP) was used to identify improvements or reductions in social acceptability. When ADG improved, feedstuff consumption, land use, and water use decreased by 6.4%, 3.2%, and 12.3%, respectively, compared with the control. Carbon footprint decreased 11.7% and N and P excretion were reduced by 4% and 13.8%, respectively. When FW improved, decreases were seen in feedstuff consumption (12.1%), water use (9.2%). and land use (15.5%); total GHGe decreased 14.7%; and N and P excretion decreased by 10.1% and 17.2%, compared with the control. Changes in IOVC were dependent on socioeconomic scenario. When the ADG scenario was compared with the control, changes in sector profitability ranged from 51 to 117% (cow-calf), -38 to 157% (stocker), and 37 to 134% (feedlot). When improved FW was compared, changes in cow-calf profit ranged from 67% to 143%, stocker profit ranged from -41% to 155% and feedlot profit ranged from 37% to 136%. When WTP was based on marketing beef being more efficiently produced, WTP improved by 10%; thus, social acceptability increased. When marketing was based on production

  2. An environmental, economic, and social assessment of improving cattle finishing weight or average daily gain within U.S. beef production.

    PubMed

    White, R R; Capper, J L

    2013-12-01

    The objective of this study was to assess environmental impact, economic viability, and social acceptability of 3 beef production systems with differing levels of efficiency. A deterministic model of U.S. beef production was used to predict the number of animals required to produce 1 × 10(9) kg HCW beef. Three production treatments were compared, 1 representing average U.S. production (control), 1 with a 15% increase in ADG, and 1 with a 15% increase in finishing weight (FW). For each treatment, various socioeconomic scenarios were compared to account for uncertainty in producer and consumer behavior. Environmental impact metrics included feed consumption, land use, water use, greenhouse gas emissions (GHGe), and N and P excretion. Feed cost, animal purchase cost, animal sales revenue, and income over costs (IOVC) were used as metrics of economic viability. Willingness to pay (WTP) was used to identify improvements or reductions in social acceptability. When ADG improved, feedstuff consumption, land use, and water use decreased by 6.4%, 3.2%, and 12.3%, respectively, compared with the control. Carbon footprint decreased 11.7% and N and P excretion were reduced by 4% and 13.8%, respectively. When FW improved, decreases were seen in feedstuff consumption (12.1%), water use (9.2%). and land use (15.5%); total GHGe decreased 14.7%; and N and P excretion decreased by 10.1% and 17.2%, compared with the control. Changes in IOVC were dependent on socioeconomic scenario. When the ADG scenario was compared with the control, changes in sector profitability ranged from 51 to 117% (cow-calf), -38 to 157% (stocker), and 37 to 134% (feedlot). When improved FW was compared, changes in cow-calf profit ranged from 67% to 143%, stocker profit ranged from -41% to 155% and feedlot profit ranged from 37% to 136%. When WTP was based on marketing beef being more efficiently produced, WTP improved by 10%; thus, social acceptability increased. When marketing was based on production

  3. Anthropometric and Health-Related Behavioral Factors in the Explanation of Social Inequalities in Low Birth Weight in Children with Prenatal Alcohol Exposure

    PubMed Central

    Pfinder, Manuela

    2014-01-01

    There is evidence for social inequalities in the health status of children with prenatal alcohol exposure (PAE). This study aimed to describe social inequalities in low birth weight (LBW) in children/adolescents with PAE and to examine the contribution of anthropometric and health-related behavioral factors to the explanation of social inequalities. A total of 2,159 participants with parental self-reported moderate to regular PAE (enrolled in the cross-sectional German Health Interview and Examination Survey for Children and Adolescents) were examined. At similar levels of PAE, the risk of LBW was significantly increased in subjects with a low socioeconomic status (SES) (adjusted odds ratio (OR) 2.78, 95% confidence interval (CI) 1.59, 4.86) and middle SES (adjusted OR 2.04, 95% CI 1.28, 3.24). Maternal height, maternal body mass index (BMI) and smoking during pregnancy mediated the association. The mediating effect of maternal height was 12.5% to 33.7%. Maternal BMI explained 7.9% of the socioeconomic difference in LBW between the high and low SES groups in children with PAE. The mediating effect of smoking during pregnancy was 17.3% to 31.5%. Maternal height, maternal BMI and smoking during pregnancy together explained 24.4% to 60.1% of the socioeconomic differences in LBW in children with PAE. A large proportion of the socioeconomic differences in LBW in children with PAE can be attributed to anthropometric and health-related behavioral factors. PMID:24406666

  4. [BREASTFEEDING PROBLEMS AND OTHER FACTORS ASSOCIATED WITH EXCESSIVE NEONATAL WEIGHT LOSS IN A SOCIAL SECURITY HOSPITAL IN LIMA, PERU].

    PubMed

    Berger-Larrañaga, Melissa; Bustamante-Abuid, Claudia; Díaz-Vergara, Silvia; Tresierra-Cabrera, Julio; Mayta-Tristán, Percy; R Segura, Eddy

    2015-11-01

    Introducción: durante los primeros días de vida la madre es la principal fuente de alimento para el recién nacido. Sin embargo, es común que la madre presente trastornos de la lactancia y se genere una pérdida de peso neonatal superior a la fisiológica. Objetivo: estimar la magnitud y asociación entre los trastornos de la lactancia y la pérdida de peso neonatal superior a la fisiológica en neonatos en el área de alojamiento conjunto de un servicio de neonatología en un hospital de la Seguridad Social en Lima, Perú. Métodos: estudio de tipo transversal analítico. Registramos el peso neonatal en una evaluación de rutina (entre las 24 y 72 horas de vida) y lo comparamos con el peso al nacer. La pérdida de peso excesiva fue definida como una diferencia igual o mayor al 7%. Mediante una encuesta y una verificación visual investigamos los trastornos de la lactancia materna (retraso en el inicio, posición de la boca, duración de la lactancia, frecuencia de la lactancia, sobreabrigo, dolor en el pezón y forma de la C). La asociación entre la pérdida de peso excesiva y los trastornos, ajustada por otros factores, fue cuantificada mediante un modelo lineal generalizado múltiple. Resultados: en 18,8% (74/393) de los neonatos, la pérdida de peso excesiva fue igual o superior al 7% del peso al nacer. La posición inadecuada de la boca en el pezón estuvo presente en el 53,7% (211/393) de los neonatos, mientras que el dolor en el pezón fue reportado en el 44,0% (173/393) de las madres. En el análisis ajustado, el dolor en el pezón [RP = 1,50 (IC95%:1,02-2,22)] y la posición inadecuada de la boca [RP = 1,67 (IC95%:1,09- 2,57)] estuvieron asociados a una mayor pérdida de peso excesiva. Conclusiones: los trastornos de la lactancia son comunes. Estos factores están directa y positivamente asociados a una mayor pérdida de peso excesiva. La introducción de mejoras en las prácticas de lactancia, por ejemplo mediante programas educativos, podr

  5. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  6. The effect of age at separation from the dam and presence of social companions on play behavior and weight gain in dairy calves.

    PubMed

    Valníčková, B; Stěhulová, I; Šárová, R; Špinka, M

    2015-08-01

    Play behavior positively affects welfare of farm animals, yet impoverished social environment during early ontogeny may limit the opportunity or motivation to play. This study investigated the independent and the combined effects of the presence of the dam during the colostrum feeding period and subsequent group housing on play behavior and growth in dairy calves. Forty female calves were allocated to 1 of 4 treatments according to a 2×2 factorial design. The treatments were with or without mother during the 4d after birth and companion housing (single pens or grouped housing in pens of 4 calves between 1 and 8wk of age). After 8wk of age all calves were housed in groups of 4 calves. Play behavior of the calves was observed at 2, 5, and 12wk of age in the following situations: 6 h of spontaneous behavior in the home pen, a 15-min open-field test, and a 15-min social test with an unfamiliar calf. Additionally, play behavior after grouping or relocation at 8wk of age was recorded during two 2-h sessions. There were no significant effects of the mother by companion interaction either on the amount of play behavior in any of the tests or on the body weights of the calves. Presence of the mother after birth did not increase later playfulness, with the exception of higher spontaneous play at 12wk of age. When calves were housed in groups of 4, they played more in the home pen on wk 2 and 5 than individually housed calves of the same age. In contrast, individually housed calves were more playful during open-field tests and social tests on wk 2 and 5. At 8wk, single calves that were placed in a new pen with 3 unfamiliar calves played more than twice as much as grouped calves that were just moved to a new pen with familiar companions. These results show that single-housed calves are deprived of natural levels of play, as demonstrated by both their lower spontaneous play behavior and the higher rebound effect when they are exposed to larger spaces or larger spaces plus

  7. Between control and hacker activism: the political actions of Anonymous Brasil.

    PubMed

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions. PMID:26785867

  8. Between control and hacker activism: the political actions of Anonymous Brasil.

    PubMed

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  9. Weight Control

    MedlinePlus

    ... obese. Achieving a healthy weight can help you control your cholesterol, blood pressure and blood sugar. It ... use more calories than you eat. A weight-control strategy might include Choosing low-fat, low-calorie ...

  10. Body Weight

    MedlinePlus

    ... sign of a medical problem. Causes for sudden weight loss can include Thyroid problems Cancer Infectious diseases Digestive diseases Certain medicines Sudden weight gain can be due to medicines, thyroid problems, ...

  11. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    PubMed

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  12. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    PubMed

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  13. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    PubMed Central

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  14. The French bioethics public consultation and the anonymity doctrine: empirical ethics and normative assumptions.

    PubMed

    Spranzi, Marta; Brunet, Laurence

    2015-03-01

    The French bioethics laws of 1994 contain the principles of the anonymity and non commodification of all donations of body parts and products including gametes in medically assisted reproduction. The two revisions of the law, in 2004 and 2011 have upheld the rule. In view of the latest revision process, the French government organized a large public consultation in 2009 ("Etats généraux de la bioéthique"). Within the event a "consensus conference" was held in Rennes about different aspects of assisted reproduction (access, anonymity, gratuity and surrogacy). In what follows we shall first describe the anonymity clause for gamete donations in the French law and the debates surrounding it. We shall then analyse the procedure used for the 2009 public consultation and the related consensus conference, as well as its upshot concerning the anonymity doctrine. In this respect we shall compare the citizens' own recommendations on the gamete anonymity issue and its translation in the consultation's final report drafted by a philosopher mandated by the organizing committee. Whereas the final report cited some fundamental ethical arguments as reason for upholding the provisions of the law-most notably the refusal of the 'all biological' approach to reproductive issues-citizens were more careful and tentative in their position although they also concluded that for pragmatic reasons the anonymity rule should continue to hold. We shall argue that the conservative upshot of the public consultation is due to some main underlying presuppositions concerning the citizens' role and expertise as well as to the specific design of the consensus conference. Our conclusion will be that public consultations and consensus conferences can only serve as an empirical support for devising suitable bioethics norms by using second-order normative assumptions.

  15. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    NASA Astrophysics Data System (ADS)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  16. Social epidemiology of excess weight and central adiposity in older Indians: analysis of Study on global AGEing and adult health (SAGE)

    PubMed Central

    Samal, Sudipta; Panigrahi, Pinaki; Dutta, Ambarish

    2015-01-01

    Objectives We aimed to estimate the prevalence of overweight and obesity, represented by extra body weight and abdominal circumference, among older Indians; and to characterise the social pattern of obesity and measure the magnitude of hypertension attributable to it. Setting A nationally representative sample of older Indians was selected from 6 Indian states, including Rajasthan, Uttar Pradesh, West Bengal, Assam, Maharashtra and Karnataka, as a part of the multicountry Study on global AGEing and adult health (SAGE). Participants Indians aged 50 years or more (n=7273) were included in the first wave of the SAGE (2010), which we used in our study. Primary and secondary outcome measures The primary outcome measures included excess weight (EW), defined by body mass index (BMI) >25 kg/m2, and central adiposity (CA), defined by waist circumference >90 cm for men and >80 cm for women. The secondary outcome included hypertension, defined by systolic blood pressure >139 or diastolic blood pressure >79 mm Hg, or by those receiving antihypertensive medications. Results 14% of older Indians possessed EW, whereas 35% possessed CA; 50.9% of the wealthier third and 27.7% of the poorer two-thirds have CA; the proportions being 69.1% and 46.2%, respectively, in older women. Mostly wealth (adjusted OR for CA: 4.36 (3.23 to 5.95) and EW: 4.39 (3.49 to 5.53)), but also urban residence, privileged caste, higher education, white-collared occupation and female gender, were important determinants. One of 17 older Indians overall and 1 of 18 in the poorer 70% suffered from CA-driven hypertension, independent of BMI. Conclusions The problem of CA and its allied diseases is already substantial and expected to rise across all socioeconomic strata of older Indians, though currently, CA affects the privileged more than the underprivileged, in later life. Population-based promotion of appropriate lifestyles, with special emphasis on women, is required to counteract prosperity

  17. Weight discrimination and bullying.

    PubMed

    Puhl, Rebecca M; King, Kelly M

    2013-04-01

    Despite significant attention to the medical impacts of obesity, often ignored are the negative outcomes that obese children and adults experience as a result of stigma, bias, and discrimination. Obese individuals are frequently stigmatized because of their weight in many domains of daily life. Research spanning several decades has documented consistent weight bias and stigmatization in employment, health care, schools, the media, and interpersonal relationships. For overweight and obese youth, weight stigmatization translates into pervasive victimization, teasing, and bullying. Multiple adverse outcomes are associated with exposure to weight stigmatization, including depression, anxiety, low self-esteem, body dissatisfaction, suicidal ideation, poor academic performance, lower physical activity, maladaptive eating behaviors, and avoidance of health care. This review summarizes the nature and extent of weight stigmatization against overweight and obese individuals, as well as the resulting consequences that these experiences create for social, psychological, and physical health for children and adults who are targeted. PMID:23731874

  18. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    ERIC Educational Resources Information Center

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  19. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  20. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    ERIC Educational Resources Information Center

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  1. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    ERIC Educational Resources Information Center

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  2. Evolutionary approach to violating group anonymity using third-party data.

    PubMed

    Tavrov, Dan; Chertov, Oleg

    2016-01-01

    In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. PMID:26844025

  3. The Effect of Computer-Mediated Communication on Anonymous End-of-Course Teaching Evaluations

    ERIC Educational Resources Information Center

    Rhea, Nancy; Rovai, Alfred; Ponton, Michael; Derrick, Gail; Davis, John

    2007-01-01

    The purpose of this study was to determine if the nature of student comments on anonymous end-of-course evaluations differed relative to course delivery medium. Comments evaluated were submitted by 202 graduate students enrolled in face-to-face (F2F) and online versions of research and statistics courses over a four-year period. Results suggested…

  4. Communication Channels, Anonymity and the Reduction of Upward Communication Distortion: A Controlled Field Study.

    ERIC Educational Resources Information Center

    Housel, Thomas J.

    A sample of 54 subjects, representing four levels of management in a chain of retail stores, participated in an experimental study of the effects of channel of communication (face-to-face, telephone, and written) and anonymity on satisfaction with, and distortion of, upward communication. Results indicated that the channel used led to significant…

  5. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  6. Understanding the Role of Storytelling in the Transformation of Female Cocaine Addicts in Narcotics Anonymous

    ERIC Educational Resources Information Center

    Ventresca, Melissa Weida

    2012-01-01

    The purpose of this qualitative study was to understand the role of storytelling in the transformation of female cocaine addicts in Narcotics Anonymous. For this research the primary investigator utilized a theoretical orientation of transformative learning theory and storytelling. The rationale for employing transformative learning theory is that…

  7. Terminological Control of "Anonymous Groups" for Catalogues of Audiovisual Television Documents

    ERIC Educational Resources Information Center

    Caldera-Serrano, Jorge

    2006-01-01

    This article discusses the exceptional nature of the description of moving images for television archives, deriving from their audiovisual nature, and of the specifications in the queries of journalists as users of the Document Information System. It is suggested that there is a need to control completely "Anonymous Groups"--groups without any…

  8. A Variation on the Use of Interactive Anonymous Quizzes in the Chemistry Classroom

    ERIC Educational Resources Information Center

    Wagner, Brian D.

    2009-01-01

    This article describes an interesting variation on the use of interactive anonymous quizzes (IAQs) in the chemistry classroom. In this variation, IAQs are used to introduce new material or topics in a course, as opposed to their traditional use for reviewing previously covered material. Two examples of IAQs used to introduce new topics in a…

  9. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  10. Anonymity and Motivation in Asynchronous Discussions and L2 Vocabulary Learning

    ERIC Educational Resources Information Center

    Polat, Nihat; Mancilla, Rae; Mahalingappa, Laura

    2013-01-01

    This study investigates L2 attainment in asynchronous online environments, specifically possible relationships among anonymity, L2 motivation, participation in discussions, quality of L2 production, and success in L2 vocabulary learning. It examines, in asynchronous discussions, (a) if participation and (b) motivation contribute to L2 vocabulary…

  11. Anonymity to Promote Peer Feedback: Pre-Service Teachers' Comments in Asynchronous Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Howard, Craig D.; Barrett, Andrew F.; Frick, Theodore W.

    2010-01-01

    In this quasi-experimental case study, we compared five sections of a basic undergraduate technology course. Within an asynchronous web forum, pre-service teachers wrote short critiques of websites designed by their classmates. This peer feedback was provided anonymously by students in two classes (n = 35) whereas providers and recipients of peer…

  12. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  13. Enhancing self-report of adolescent smoking: the effects of bogus pipeline and anonymity.

    PubMed

    Adams, Jane; Parkinson, Lynne; Sanson-Fisher, Rob W; Walsh, Raoul A

    2008-10-01

    Adolescent smoking prevalence is usually assessed via self-complete questionnaires. However, concern has been expressed about the validity of such self-report. One approach to increase validity involves the threat of biological validation, known as the bogus pipeline method (BPL).This study aimed to assess the effects of BPL, using an expired air carbon monoxide monitor, and of questionnaire anonymity on student smoking self-report data. High school students (n=801) were randomly allocated to one of four conditions: anonymous questionnaire+BPL, named questionnaire+BPL, anonymous questionnaire without BPL and named questionnaire without BPL. Overall, 37% of students agreed that questionnaires were a good way to obtain honest answers. In a logistic regression analysis, students in the BPL condition had significantly higher odds of reporting weekly smoking (OR=1.83 95% CI 1.27-2.65) and monthly smoking (OR=1.66 95% CI 1.21-2.28) but not of lifetime smoking compared with non-BPL students. Students in the named questionnaire condition had a significantly higher odds of reporting lifetime smoking (OR=1.49 95% CI 1.08-2.04) compared with anonymous students. Studies assessing current smoking patterns in adolescents should consider incorporating a BPL method.

  14. Bayesian modeling of consumer behavior in the presence of anonymous visits

    NASA Astrophysics Data System (ADS)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  15. Parents Anonymous[SM]: Strengthening Families. Family Strengthening Series. Juvenile Justice Bulletin.

    ERIC Educational Resources Information Center

    Rafael, Teresa; Pion-Berlin, Lisa

    Asserting that problems arising within the family may lead to children's problem behaviors, this bulletin from the Office of Juvenile Justice and Delinquency Prevention describes Parents Anonymous, Inc., a program designed to enhance the capability of families to help their children. The oldest national child abuse prevention organization, Parents…

  16. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    ERIC Educational Resources Information Center

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  17. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    ERIC Educational Resources Information Center

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  18. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    ERIC Educational Resources Information Center

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  19. Adolescent Substance Abuse in Mexico, Puerto Rico and The United States: Effect of Anonymous versus Confidential Survey Formats

    ERIC Educational Resources Information Center

    Latimer, William W.; O'Brien, Megan S.; Vasquez, Marco A.; Medina-Mora, Maria Elena; Rios-Bedoya, Carlos F.; Floyd, Leah J.

    2006-01-01

    Anonymous surveys have been widely used worldwide to describe adolescent substance use yet cannot elucidate causal drug abuse predictors. Studies in the U.S. have generally found that anonymous and confidential surveys yield comparable levels of self-reported substance use, yet the effect of survey format on youth self-report has not been…

  20. Experimental comparisons of face-to-face and anonymous real-time team competition in a networked gaming learning environment.

    PubMed

    Yu, Fu-Yun; Han, Chialing; Chan, Tak-Wai

    2008-08-01

    This study investigates the impact of anonymous, computerized, synchronized team competition on students' motivation, satisfaction, and interpersonal relationships. Sixty-eight fourth-graders participated in this study. A synchronous gaming learning system was developed to have dyads compete against each other in answering multiple-choice questions set in accordance with the school curriculum in two conditions (face-to-face and anonymous). The results showed that students who were exposed to the anonymous team competition condition responded significantly more positively than those in the face-to-face condition in terms of motivation and satisfaction at the 0.050 and 0.056 levels respectively. Although further studies regarding the effects of anonymous interaction in a networked gaming learning environment are imperative, the positive effects detected in this preliminary study indicate that anonymity is a viable feature for mitigating the negative effects that competition may inflict on motivation and satisfaction as reported in traditional face-to-face environments.

  1. Adolescents' reply intent for sexual disclosure in cyberspace: gender differences and effects of anonymity and topic intimacy.

    PubMed

    Chiou, Wen-Bin

    2007-10-01

    This study examined the effects of anonymity and topic intimacy on adolescents' reply intent for cyber partners' sexual disclosure on the Internet. Two hundred thirty-seven Taiwanese adolescents with sexual self-disclosure experiences on the Internet participated in an experimental study. Regardless of anonymity and topic intimacy, male adolescents were more willing than females to respond to cyber friends' sexual disclosure. The higher the anonymity was, the higher the reply intent for sexual self-disclosure. Participants exhibited higher reply intent when cyber friends self-disclosed sexual topics with higher intimacy. However, the effect of topic intimacy was moderated by anonymity. Topic intimacy displayed prominent influence on adolescents' reply intent in responding to cyber friends' sexual disclosure only when their disclosing condition was under moderate and high anonymity. Implications and future directions are discussed. PMID:17927545

  2. Weight Management

    MedlinePlus

    ... Quit Smoking Benefits of Quitting Health Effects of Smoking Secondhand Smoke Withdrawal Ways to Quit QuitGuide Pregnancy & Motherhood Pregnancy & Motherhood Before Your Baby is Born From Birth to 2 Years Quitting for Two SmokefreeMom Healthy Kids Parenting & ... Weight Management Weight Management ...

  3. Weight Watcher!

    ERIC Educational Resources Information Center

    Clarke, Doug

    1990-01-01

    The author, using a weight machine in an airport lounge, varies the machine's input parameters of height and gender to generate data sets of ideal weight. These data are later used at in-service workshops and in both primary and secondary classrooms to explore patterns and make predictions. (JJK)

  4. Birth Weight

    MedlinePlus

    ... with the placenta and substance abuse by the mother. Some low birth weight babies may be more at risk for certain health problems. Some may become sick in the first days of life or develop infections. Others may suffer ...

  5. Weight simulator

    NASA Technical Reports Server (NTRS)

    Howard, W. H.; Young, D. R.

    1972-01-01

    Device applies compressive force to bone to minimize loss of bone calcium during weightlessness or bedrest. Force is applied through weights, or hydraulic, pneumatic or electrically actuated devices. Device is lightweight and easy to maintain and operate.

  6. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs. PMID:25352490

  7. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems

    PubMed Central

    Xie, Qi; Hu, Bin; Dong, Na; Wong, Duncan S.

    2014-01-01

    Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS. PMID:25047235

  8. Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Park, Haeryong

    Kiyomoto-Fukushima-Tanaka proposed a perfectly ano-nymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.

  9. The Dining Cryptographer Problem-Based Anonymous Quantum Communication via Non-maximally Entanglement State Analysis

    NASA Astrophysics Data System (ADS)

    Shi, Ronghua; Su, Qian; Guo, Ying; Huang, Dazu

    2013-02-01

    We demonstrate an anonymous quantum communication (AQC) via the non-maximally entanglement state analysis (NESA) based on the dining cryptographer problem (DCP). The security of the present AQC is ensured due to the quantum-mechanical impossibility of local unitary transformations between non-maximally entanglement states, which provides random numbers for the secure AQC. The analysis shows that the DCP-based AQC can be performed without intractability through the NESA in the multi-photon entangled quantum system.

  10. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    NASA Astrophysics Data System (ADS)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  11. Reliability and validity of young adults’ anonymous online reports of marijuana use and thoughts about use

    PubMed Central

    Ramo, Danielle E.; Liu, Howard; Prochaska, Judith J.

    2012-01-01

    With growing interest in online assessment of substance abuse behaviors, there is a need to formally evaluate the validity of the data gathered. The current investigation evaluated the reliability and validity of anonymous, online reports of young adults’ marijuana use and related cognitions. Young adults age 18 to 25 who had smoked at least one cigarette in the past 30 days were recruited over 14 months to complete an anonymous online survey. Of 3106 eligible cases, 1617 (52%) completed the entire survey. Of those, 54% (n = 884) reported past-month marijuana use (65% male, 70% Caucasian, mean age was 20.4 years [SD = 2.0]). Prevalence of marijuana use was reported reliably across three similar items, and inter-item correlations ranged from fair to excellent for measures of marijuana dependence symptoms and thoughts about marijuana use. Marijuana use frequency demonstrated good construct validity through expected correlations with marijuana use constructs, and non-significant correlations with thoughts about tobacco use. Marijuana frequency distinguished among stages of change for marijuana use and goals for use, but not among gender, ethnicity, or employment groups. Marijuana use and thoughts about use differed by stage of change in the hypothesized directions. Self-reported marijuana use and associated cognitions reported anonymously online from young adults are generally reliable and valid. Online assessments of substance use broaden the reach of addictions research. PMID:22082344

  12. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    PubMed

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  13. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    PubMed Central

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  14. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    PubMed Central

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-01-01

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN. PMID:25763649

  15. Gamete donor anonymity and limits on numbers of offspring: the views of three stakeholders

    PubMed Central

    Nelson, Margaret K.; Hertz, Rosanna; Kramer, Wendy

    2015-01-01

    This paper discusses the attitudes of three groups of stakeholders in the world of assisted reproduction gamete donors, parents who use donated gamete, and offspring conceived with donated gametes with respect to the two issues of donor anonymity and limits on the number of offspring a single donor can produce. The data are drawn from on-line surveys which were made available between May 12, 2104 and August 15, 2014 to gamete donors, donor-conceived offspring, and parents who used donated gametes to conceive. A total of 325 donors (176 egg donors; 149 sperm donors) responded to the survey as did 2134 parents and 419 offspring. The data show that offspring are more opposed to donor anonymity than are parents and donors. Among offspring opposition to anonymity grows as they age. On the other hand, parents are most in favor of limits on numbers of offspring produced by a single donor. Parents worry about health and accidental contact between people conceived from the same donor. PMID:27774232

  16. Alcoholics Anonymous

    MedlinePlus

    ... A.A.? For Professionals For A.A. Members eBooks Read Big Book and Twelve & Twelve A.A. ... Board Calendars G.S.O. Newsletters A.A. Literature | eBooks | Read the Big Book and Twelve & Twelve | 75th ...

  17. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994

    SciTech Connect

    Fields, C.A.

    1994-09-01

    This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.

  18. "The Weight of Class": Clients' Experiences of How Perceived Differences in Social Class between Counsellor and Client Affect the Therapeutic Relationship

    ERIC Educational Resources Information Center

    Balmforth, Jane

    2009-01-01

    The impact of a difference in social class on the therapeutic relationship has received less attention than other differences between counsellor and client, such as gender, race and sexual orientation. In this qualitative research study six clients who identified as working class were interviewed about their experience of a therapeutic…

  19. Feedback from recently returned veterans on an anonymous web-based brief alcohol intervention

    PubMed Central

    2012-01-01

    Background Veterans of Operation Enduring Freedom and Operation Iraqi Freedom (OEF/OIF) are at increased risk for alcohol misuse, and innovative methods are needed to improve their access to alcohol screening and brief interventions (SBI). This study adapted an electronic SBI (e-SBI) website shown to be efficacious in college students for OEF/OIF veterans and reported findings from interviews with OEF/OIF veterans about their impressions of the e-SBI. Methods Outpatient veterans of OEF/OIF who drank ≥3 days in the past week were recruited from a US Department of Veterans Affairs (VA) Deployment Health Clinic waiting room. Veterans privately pretested the anonymous e-SBI then completed individual semistructured audio-recorded interviews. Their responses were analyzed using template analysis to explore domains identified a priori as well as emergent domains. Results During interviews, all nine OEF/OIF veterans (1 woman and 8 men) indicated they had received feedback for risky alcohol consumption. Participants generally liked the standard-drinks image, alcohol-related caloric and monetary feedback, and the website’s brevity and anonymity (a priori domains). They also experienced challenges with portions of the e-SBI assessment and viewed feedback regarding alcohol risk and normative drinking as problematic, but described potential benefits derived from the e-SBI (emergent domains). The most appealing e-SBIs would ensure anonymity and provide personalized transparent feedback about alcohol-related risk, consideration of the context for drinking, strategies to reduce drinking, and additional resources for veterans with more severe alcohol misuse. Conclusions Results of this qualitative exploratory study suggest e-SBI may be an acceptable strategy for increasing OEF/OIF veteran access to evidenced-based alcohol SBI. PMID:23186354

  20. The General Alcoholics Anonymous Tools of Recovery: The Adoption of 12-Step Practices and Beliefs

    PubMed Central

    Greenfield, Brenna L.; Tonigan, J. Scott

    2013-01-01

    Working the 12 steps is widely prescribed for Alcoholics Anonymous (AA) members although the relative merits of different methods for measuring step-work have received minimal attention and even less is known about how step-work predicts later substance use. The current study (1) compared endorsements of step-work on an face-valid or direct measure, the Alcoholics Anonymous Inventory (AAI), with an indirect measure of step-work, the General Alcoholics Anonymous Tools of Recovery (GAATOR), (2) evaluated the underlying factor structure of the GAATOR and changes in step-work over time, (3) examined changes in the endorsement of step-work over time, and (4) investigated how, if at all, 12-step-work predicted later substance use. New AA affiliates (N = 130) completed assessments at intake, 3, 6, and 9 months. Significantly more participants endorsed step-work on the GAATOR than on the AAI for nine of the 12 steps. An exploratory factor analysis revealed a two-factor structure for the GAATOR comprising Behavioral Step-Work and Spiritual Step-Work. Behavioral Step-Work did not change over time, but was predicted by having a sponsor, while Spiritual Step-Work decreased over time and increases were predicted by attending 12-step meetings or treatment. Behavioral Step-Work did not prospectively predict substance use. In contrast, Spiritual Step-Work predicted percent days abstinent, an effect that is consistent with recent work on the mediating effects of spiritual growth, AA, and increased abstinence. Behavioral and Spiritual Step-Work appear to be conceptually distinct components of step-work that have distinct predictors and unique impacts on outcomes. PMID:22867293

  1. Blinded Anonymization: a method for evaluating cancer prevention programs under restrictive data protection regulations.

    PubMed

    Bartholomäus, Sebastian; Hense, Hans Werner; Heidinger, Oliver

    2015-01-01

    Evaluating cancer prevention programs requires collecting and linking data on a case specific level from multiple sources of the healthcare system. Therefore, one has to comply with data protection regulations which are restrictive in Germany and will likely become stricter in Europe in general. To facilitate the mortality evaluation of the German mammography screening program, with more than 10 Million eligible women, we developed a method that does not require written individual consent and is compliant to existing privacy regulations. Our setup is composed of different data owners, a data collection center (DCC) and an evaluation center (EC). Each data owner uses a dedicated software that preprocesses plain-text personal identifiers (IDAT) and plaintext evaluation data (EDAT) in such a way that only irreversibly encrypted record assignment numbers (RAN) and pre-aggregated, reversibly encrypted EDAT are transmitted to the DCC. The DCC uses the RANs to perform a probabilistic record linkage which is based on an established and evaluated algorithm. For potentially identifying attributes within the EDAT ('quasi-identifiers'), we developed a novel process, named 'blinded anonymization'. It allows selecting a specific generalization from the pre-processed and encrypted attribute aggregations, to create a new data set with assured k-anonymity, without using any plain-text information. The anonymized data is transferred to the EC where the EDAT is decrypted and used for evaluation. Our concept was approved by German data protection authorities. We implemented a prototype and tested it with more than 1.5 Million simulated records, containing realistically distributed IDAT. The core processes worked well with regard to performance parameters. We created different generalizations and calculated the respective suppression rates. We discuss modalities, implications and limitations for large data sets in the cancer registry domain, as well as approaches for further

  2. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  3. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    PubMed Central

    Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  4. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  5. An analysis of the role of overeaters anonymous in women's recovery from bulimia nervosa.

    PubMed

    Wasson, Diane H; Jackson, Mary

    2004-01-01

    This study presents a qualitative analysis of the role of the self-help group Overeaters Anonymous (OA) in the treatment experiences of women with bulimia nervosa. It specifies how various elements of OA facilitate or maintain recovery. Using focus groups and individual interviews, data were collected from 26 women who met the criteria for bulimia nervosa. Data analysis revealed that those participants used five OA skills or strategies. These included: (1) OA meeting attendance and participation, (2) interaction with a sponsor, (3) processing (i.e., writing and journaling), (4) spirituality (i.e., prayer and meditation), and (5) adherence to a food plan.

  6. An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity

    NASA Astrophysics Data System (ADS)

    Li, Wei; Fan, Ming-Yu; Wang, Guang-Wei

    2012-12-01

    In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed. In this scheme a message to be signed is coded with unitary operators. Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message. Combining the entangled states generated by the TTP's Bell measurement with the signature information, the verifier can verify the authentication of a signature through a single quantum state measurement. Compared with previous schemes, our scheme is more efficient and less complex, furthermore, our scheme can ensure the anonymity of the signer.

  7. Weight Loss Nutritional Supplements

    NASA Astrophysics Data System (ADS)

    Eckerson, Joan M.

    Obesity has reached what may be considered epidemic proportions in the United States, not only for adults but for children. Because of the medical implications and health care costs associated with obesity, as well as the negative social and psychological impacts, many individuals turn to nonprescription nutritional weight loss supplements hoping for a quick fix, and the weight loss industry has responded by offering a variety of products that generates billions of dollars each year in sales. Most nutritional weight loss supplements are purported to work by increasing energy expenditure, modulating carbohydrate or fat metabolism, increasing satiety, inducing diuresis, or blocking fat absorption. To review the literally hundreds of nutritional weight loss supplements available on the market today is well beyond the scope of this chapter. Therefore, several of the most commonly used supplements were selected for critical review, and practical recommendations are provided based on the findings of well controlled, randomized clinical trials that examined their efficacy. In most cases, the nutritional supplements reviewed either elicited no meaningful effect or resulted in changes in body weight and composition that are similar to what occurs through a restricted diet and exercise program. Although there is some evidence to suggest that herbal forms of ephedrine, such as ma huang, combined with caffeine or caffeine and aspirin (i.e., ECA stack) is effective for inducing moderate weight loss in overweight adults, because of the recent ban on ephedra manufacturers must now use ephedra-free ingredients, such as bitter orange, which do not appear to be as effective. The dietary fiber, glucomannan, also appears to hold some promise as a possible treatment for weight loss, but other related forms of dietary fiber, including guar gum and psyllium, are ineffective.

  8. Patient Perspectives on Sharing Anonymized Personal Health Data Using a Digital System for Dynamic Consent and Research Feedback: A Qualitative Study

    PubMed Central

    Whitley, Edgar A; Lund, David; Kaye, Jane

    2016-01-01

    Background Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. Objective To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. Methods A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Results Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about

  9. Social Context, Sensation Seeking, and Teen-age Alcohol Abuse.

    ERIC Educational Resources Information Center

    Thombs, Dennis L; And Others

    1994-01-01

    An anonymous questionnaire examined alcohol use, the social context of drinking, and sensation seeking among rural seventh through 12th graders. The sensation-seeking trait proved of moderate importance in distinguishing among different alcohol abuse practices. Social context measures were effective in distinguishing among levels on each indicant…

  10. Democratic Education Online: Combating Racialized Aggressions on Social Media

    ERIC Educational Resources Information Center

    Gin, Kevin J.; Martínez-Alemán, Ana M.; Knight, Sarah; Radimer, Scott; Lewis, Jonathan; Rowan-Kenyon, Heather T.

    2016-01-01

    In the 21st century, mobile, low-friction, and easy to use social media have changed the landscape of college campuses. Social media have opened the doors for racial hostility to be displayed on campus in new ways and have been widely used to express racial aggressions toward students of color. Anonymity allows these behaviors to be freely enacted…

  11. Scuba Weights

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The Attitude Adjuster is a system for weight repositioning corresponding to a SCUBA diver's changing positions. Compact tubes on the diver's air tank permit controlled movement of lead balls within the Adjuster, automatically repositioning when the diver changes position. Manufactured by Think Tank Technologies, the system is light and small, reducing drag and energy requirements and contributing to lower air consumption. The Mid-Continent Technology Transfer Center helped the company with both technical and business information and arranged for the testing at Marshall Space Flight Center's Weightlessness Environmental Training Facility for astronauts.

  12. Applying the nursing theory of human relatedness to alcoholism and recovery in alcoholics anonymous.

    PubMed

    Strobbe, Stephen; Hagerty, Bonnie; Boyd, Carol

    2012-12-01

    Alcohol misuse is a global health risk, and Alcoholics Anonymous (AA) is the largest and most popular mutual-help program for individuals with alcohol-related problems. In recent years, researchers and clinicians have become increasingly interested in specific mechanisms of action that may contribute to positive outcomes through involvement with this 12-step program for recovery, yet few have applied a theoretical framework to these efforts. We examined the phenomena of alcoholism and recovery in AA, using the nursing Theory of Human Relatedness (THR). THR addresses a pervasive human concern: "establishing and maintaining relatedness to others, objects, environments, society and self." The theory describes four states of relatedness (connectedness, disconnectedness, parallelism, and enmeshment) and four relatedness competencies (sense of belonging, reciprocity, mutuality, and synchrony). Both alcoholism and recovery in AA can be viewed primarily in terms of relatedness. In active alcoholism, an individual's involvement with alcohol (enmeshment) can limit, impair, or preclude healthy or adaptive relatedness toward virtually all other referents, including self. As a program of recovery, each of the 12 Steps of Alcoholics Anonymous addresses an individual's relatedness to one or more identified referents while simultaneously enhancing and expanding each of the four relatedness competencies. THR provides a theoretical framework to help direct patient care, research, and education and has the potential to serve as a unifying theory in the study of alcoholism and recovery in AA.

  13. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical. PMID:24643750

  14. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic. PMID:24146334

  15. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    PubMed

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  16. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  17. Teaching Internal Medicine Resident Physicians About Alcoholics Anonymous: A Pilot Study of an Educational Intervention

    PubMed Central

    Rose, Adam J.; Stein, Melissa R.; Arnsten, Julia H.; Saitz, Richard

    2007-01-01

    Greater physician confidence in treating alcoholism is associated with a higher frequency of referring alcoholic patients for treatment, but many physicians have limited experience with Alcoholics Anonymous. We implemented a brief, didactic and experiential educational intervention about AA and evaluated its effect on knowledge and attitudes, using a before-after repeated measures study design. Thirty-six first-year internal medicine resident physicians received an educational intervention, which consisted of a 45-minute lecture about AA, a visit to an AA meeting, and a 30-minute debriefing session the next day. Residents’ knowledge and attitudes were assessed by a brief written anonymous survey before and after the educational intervention. Residents reported increases in self-perceived knowledge about AA and had more favorable attitudes towards AA after the intervention. Our pilot study shows that a brief, didactic and experiential course can improve physician knowledge and attitudes about AA, and holds promise for improving physician interface with this commonly used intervention. PMID:17135175

  18. Anonymity versus Privacy in the Dictator Game: Revealing Donor Decisions to Recipients Does Not Substantially Impact Donor Behavior

    PubMed Central

    Winking, Jeffrey

    2014-01-01

    Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006) in which recipients were left unaware of the Dictator Game and given donations as “bonuses” to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006)) and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories—one in which the recipient knew of (1) any donation by an anonymous donor (including zero donations), (2) nothing at all, (3) only zero donations, and (4) and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior. PMID:25532025

  19. The importance of community consultation and social support in adhering to an obesity reduction program: results from the Healthy Weights Initiative

    PubMed Central

    Lemstra, Mark; Rogers, Marla R

    2015-01-01

    Background Few community-based obesity reduction programs have been evaluated. After 153 community consultations, the City of Moose Jaw, SK, Canada, decided to initiate a free comprehensive program. The initiative included 71 letters of support from the Mayor, every family physician, cardiologist, and internist in the city, and every relevant community group including the Heart and Stroke Foundation, the Canadian Cancer Society, and the Public Health Agency of Canada. Objective To promote strong adherence while positively influencing a wide range of physical and mental health variables measured through objective assessment or validated surveys. Methods The only inclusion criterion was that the individuals must be obese adults (body mass index >30 kg/m2). Participants were requested to sign up with a “buddy” who was also obese and identify three family members or friends to sign a social support contract. During the initial 12 weeks, each individual received 60 group exercise sessions, 12 group cognitive behavioral therapy sessions, and 12 group dietary sessions with licensed professionals. During the second 12-week period, maintenance therapy included 12 group exercise sessions (24 weeks in total). Results To date, 243 people have been referred with 229 starting. Among those who started, 183 completed the program (79.9%), while 15 quit for medical reasons and 31 quit for personal reasons. Mean objective reductions included the following: 31.0 lbs of body fat, 3.9% body fat, 2.9 in from the waist, 2.3 in from the hip, blood cholesterol by 0.5 mmol/L, systolic blood pressure by 5.9 mmHg, and diastolic blood pressure by 3.2 mmHg (all P<0.000). There were no changes in blood sugar levels. There was also statistically significant differences in aerobic fitness, self-report health, quality of life measured by Short Form-36, and depressed mood measured by Beck Depression Inventory-II (all P<0.000). Independent risk factors for not completing the program were not

  20. Part of the Job? Workplace Violence in Massachusetts Social Service Agencies

    ERIC Educational Resources Information Center

    Zelnick, Jennifer R.; Slayter, Elspeth; Flanzbaum, Beth; Butler, Nanci Ginty; Domingo, Beryl; Perlstein, Judith; Trust, Carol

    2013-01-01

    Workplace violence is a serious and surprisingly understudied occupational hazard in social service settings. The authors of this study conducted an anonymous, Internet-based survey of Massachusetts social service agencies to estimate the incidence of physical assault and verbal threat of violence in social service agencies, understand how social…

  1. Faithful but Different: Clinical Social Workers Speak Out about Career Motivation and Professional Values

    ERIC Educational Resources Information Center

    Bradley, Carolyn; Maschi, Tina; O'Brien, Helen; Morgen, Keith; Ward, Kelly

    2012-01-01

    The purpose of this study was to describe licensed clinical social workers' (LCSWs) professional motivation to pursue a social work career and the decision to enter clinical practice. It used a probability sample of 245 New Jersey LCSWs and the Social Work Values Survey as part of an anonymous self-administered mail survey. Descriptive analyses…

  2. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study

    PubMed Central

    Klier, Claudia M; Chryssa, Grylli; Amon, Sabine; Fiala, Christian; Weizmann-Henelius, Ghitta; Pruitt, Sandi L; Putkonen, Hanna

    2013-01-01

    Objectives To assess rates of neonaticide after the implementation of a preventative “anonymous delivery” law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Design Retrospective Study Setting A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. Population All neonaticides reported to the police, 1991-2009. Main outcome measures Neonaticide rates pre- (1991-2001) and post- (2002-2009) anonymous delivery legislation per 100,000 births. Methods The Mann-Whitney U test for two independent samples was used to compare neonaticide rates during the pre-law period to the rates observed after the implementation of the new law for each country. Results On average the rate of police-reported neonaticides was 7.2 per 100.000 births (SD=3.5, median=7.1) in Austria prior to passage of the law and 3.1 per 100.000 births (SD= 2.1; median= 2.6) after passage of the law. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U test p=.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Conclusion Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. PMID:23210536

  3. Finding erotic oases: locating the sites of men's same-sex anonymous sexual encounters.

    PubMed

    Tewksbury, Richard

    2008-01-01

    Because anonymous sexual relations between two men are widely considered deviant many men seeking such activities look to erotic oases-natural environments appropriated for covert, often furtive sexual purposes. Previous research on erotic oases has focused on characteristics of involved men and processes of locating, negotiating with, and consummating sexual relations with others. This study draws on one major Web site listing of "cruising places" in the United States to identify common locations for erotic oases. Results show that the most common locations identified as erotic oases by users are public parks, adult bookstores, health clubs, and college campuses. Locations most likely to be listed as believed to be under law enforcement surveillance are outdoor, high traffic locations. Based on these results existing research has only begun to examine the most common locations for this highly stigmatized, deviant behavior and subculture.

  4. Anonymous self-evaluation of performance by ethics board members: a pilot study.

    PubMed

    Feldman, James A; Rebholz, Casey M

    2009-03-01

    EVALUATING THE EFFECTIVENESS OF A Reserch Ethics Committee or Institutional Review Board (IRB) continues to be a difficult task. There are limited data that examine the perceptions of members of IRBs about their own performance or methods that would allow comparison among IRB panels at a single institution or between institutions. We piloted an anonymous survey instrument that examined members' attitudes about the efficiency, procedures and outcomes of IRB meetings and developed a process for presentation and discussion of these results with panel members. This quality improvement process was initially completed with one panel, and then replicated with two other IRB panels at one institution. This allowed comparison of perceived IRB performance across panels at a single institution. Further research is required to determine the association between IRB members' perception of performance and other measures of IRB effectiveness and to examine the perceived performance of IRBs by other research stakeholders.

  5. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    PubMed

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication. PMID:24994512

  6. Predictors of Membership in Alcoholics Anonymous in a Sample of Successfully Remitted Alcoholics

    PubMed Central

    Krentzman, Amy R.; Robinson, Elizabeth A. R.; Perron, Brian E.; Cranford, James A.

    2012-01-01

    This study identifies factors associated with Alcoholics Anonymous (AA) membership in a sample of 81 persons who have achieved at least one year of total abstinence from drugs and alcohol. Forty-four were AA members, 37 were not. Logistic regression was used to test the cross-sectional associations of baseline demographic, substance-related, spiritual and religious, and personality variables with AA membership. Significant variables from the bivariate analyses were included in a multivariate model controlling for previous AA involvement. Having more positive views of God and more negative consequences of drinking were significantly associated with AA membership. This information can be used by clinicians to identify clients for whom AA might be a good fit, and can help others overcome obstacles to AA or explore alternative forms of abstinence support. PMID:21615004

  7. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    PubMed

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  8. Gender and Extroversion as Moderators of the Association Between Alcoholics Anonymous and Sobriety

    PubMed Central

    Krentzman, Amy R.; Brower, Kirk J.; Cranford, James A.; Bradley, Jaclyn Christine; Robinson, Elizabeth A. R.

    2012-01-01

    Objective: Although women make up one third of Alcoholics Anonymous (AA) membership, research on gender and AA has been limited. Findings in the literature are mixed, with few empirical investigations of factors that may moderate any gender differences found. AA is highly interpersonal, and research has found that women are more extroverted than men. The current study explores the impact of AA on sobriety, gender differences in the relationship between AA and sobriety, and whether extroversion can inform our understanding of gender differences. Method: A sample of 276 alcohol-dependent adults (180 men, 96 women) was recruited from four sites and followed prospectively for 2.5–3 years. Participants completed the Timeline Followback interview. AA member ship was assessed by an item from the Alcoholics Anonymous Involvement scale. Multiple logistic regression analyses were conducted to determine whether gender, extroversion, AA membership, and their interaction would predict sobriety status at follow-up. Results: AA membership significantly increased the odds of achieving a year of sobriety, and this relationship was stronger for women than men (odds ratio [OR] = 4.42, 95% CI [1.14, 17.18]). There were no main or interactive effects of extroversion on sobriety. Conclusions: AA was founded by men, and early in its history it was exclusively attended by men. Some have criticized AA for women because of its emphasis on “powerless-ness.” Despite its historical beginnings and such debate, this study joins others in finding evidence that women fare better in AA than do men. In this sample, extroversion did not moderate the association between gender and sobriety. Further research is needed on gender differences in AA and its explanatory factors. PMID:22152661

  9. Suicidal ideation and sex differences in relation to 18 major psychiatric disorders in college and university students: anonymous web-based assessment.

    PubMed

    Tupler, Larry A; Hong, Jennifer Y; Gibori, Ron; Blitchington, Timothy F; Krishnan, K Ranga R

    2015-04-01

    College/university students are at high risk for psychiatric disorder and suicide secondary to age, campus stressors, and social pressures. We therefore report frequencies of 18 Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision disorders and suicidal ideation (SI) acquired anonymously from a Web site receiving 113,181 visits from more than 1,500 predominantly US colleges/universities. Depression was foremost, followed by social phobia and eating disorders. Substance-related disorders were less frequent than expected. SI occurred in 47.1% of students, with women evidencing somewhat stronger findings than men. SI was more associated with substance, bipolar, and panic disorders than depression. Self-reported emotional volatility exceeded thoughts of self-harm for all disorders. The results support two subtypes of suicide risk: dysphoric premeditators and those primarily angry and/or impulsive. Clinicians and researchers should therefore consider suicide as an independent psychopathological phenomenon that includes emotional volatility as a risk factor and thoroughly evaluate psychiatric disorders potentially conferring greater suicidal propensity than depression. PMID:25784307

  10. Questioning the Use of Alcoholics Anonymous with College Students: Is an Old Concept the Only Alternative for a New Generation?

    ERIC Educational Resources Information Center

    Vick, Ron, Sr.

    2000-01-01

    The recommended treatment for alcoholism in the past typically has been participation in Alcoholics Anonymous (AA). However, the use of AA on college campuses has not been proven effective. With a new generation comes the opportunity to rethink this approach to the problem of alcohol abuse on campuses and to incorporate new methods in counseling…

  11. Attachment Styles and Changes among Women Members of Overeaters Anonymous Who Have Recovered from Binge-Eating Disorder

    ERIC Educational Resources Information Center

    Hertz, Pnina; Addad, Moshe; Ronel, Natti

    2012-01-01

    In Overeaters Anonymous (OA), the 12-step self-help program for compulsive overeaters, binge eating is regarded as a physical, spiritual, and emotional disorder. Consequently, the program proposes recovery through the adoption of a lifestyle that leads to physical, spiritual, and emotional well-being. A qualitative phenomenological study that…

  12. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    PubMed Central

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  13. Anonymous nuclear markers data supporting species tree phylogeny and divergence time estimates in a cactus species complex in South America.

    PubMed

    Perez, Manolo F; Carstens, Bryan C; Rodrigues, Gustavo L; Moraes, Evandro M

    2016-03-01

    Supportive data related to the article "Anonymous nuclear markers reveal taxonomic incongruence and long-term disjunction in a cactus species complex with continental-island distribution in South America" (Perez et al., 2016) [1]. Here, we present pyrosequencing results, primer sequences, a cpDNA phylogeny, and a species tree phylogeny. PMID:26900589

  14. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset.

    PubMed

    Zhang, Haitao; Chen, Zewei; Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users' privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  15. Alcoholics Anonymous and behavior therapy: can habits be treated as diseases? Can diseases be treated as habits?

    PubMed

    McCrady, B S

    1994-12-01

    Alcoholics Anonymous (AA) and behavior therapy have often been characterized as having opposing views of the nature and treatment of alcohol problems. This article describes the theoretical foundations, view of the change process, and treatment practices of AA and behavior therapy. Theoretical and practice perspectives on integration of the two models are examined, and advantages and disadvantages of integration are discussed. PMID:7860813

  16. The Person in Crisis.; How Help Anonymous Helps.; Reactions from Volunteers.; The Use and Abuse of Back-Up Resources.

    ERIC Educational Resources Information Center

    Tucker, Betty Jo, Ed.; Vigil, Lyle, Ed.

    Help Anonymous, a volunteer-operated telephone service for persons in crisis, is presented in its various aspects. Five key areas, descriptive of the person in crisis, are delineated as are the external signs which signal that a crisis is impending or ongoing. The service is viewed as the right arm of the Pueblo Suicide Prevention Center, and in…

  17. An Anonymous Survey of Psychosomatic Medicine Fellowship Directors regarding Breaches of Contracts and a Proposal for Prevention

    ERIC Educational Resources Information Center

    Levenson, James L.; Bialer, Philip

    2010-01-01

    Objective: The authors studied how often applicants accept positions at more than one program, or programs offer positions to applicants who have already signed contracts with other programs. Methods: An anonymous survey was distributed to all psychosomatic medicine fellowship program directors. Results: It is fairly common for applicants to sign…

  18. Weight-Loss Expectancies, Relative Weight, and Symptoms of Bulimia in Young Women.

    ERIC Educational Resources Information Center

    Thombs, Dennis L.; And Others

    1996-01-01

    A canonical correlation analysis of various weight concerns in a sample of college women revealed that strong expectations of weight loss benefits and a high relative body weight were positively correlated with the four major symptoms of bulimia. Expectations of increased self-worth and social confidence were linked to eating problems. (RJM)

  19. Who succeeds in maintaining weight loss? A conceptual review of factors associated with weight loss maintenance and weight regain.

    PubMed

    Elfhag, K; Rössner, S

    2005-02-01

    Weight loss is difficult to achieve and maintaining the weight loss is an even greater challenge. The identification of factors associated with weight loss maintenance can enhance our understanding for the behaviours and prerequisites that are crucial in sustaining a lowered body weight. In this paper we have reviewed the literature on factors associated with weight loss maintenance and weight regain. We have used a definition of weight maintenance implying intentional weight loss that has subsequently been maintained for at least 6 months. According to our review, successful weight maintenance is associated with more initial weight loss, reaching a self-determined goal weight, having a physically active lifestyle, a regular meal rhythm including breakfast and healthier eating, control of over-eating and self-monitoring of behaviours. Weight maintenance is further associated with an internal motivation to lose weight, social support, better coping strategies and ability to handle life stress, self-efficacy, autonomy, assuming responsibility in life, and overall more psychological strength and stability. Factors that may pose a risk for weight regain include a history of weight cycling, disinhibited eating, binge eating, more hunger, eating in response to negative emotions and stress, and more passive reactions to problems. PMID:15655039

  20. Weight-ing: the experience of waiting on weight loss.

    PubMed

    Glenn, Nicole M

    2013-03-01

    Perhaps we want to be perfect, strive for health, beauty, and the admiring gaze of others. Maybe we desire the body of our youth, the "healthy" body, the body that has just the right fit. Regardless of the motivation, we might find ourselves striving, wanting, and waiting on weight loss. What is it to wait on weight loss? I explore the meaning of this experience-as-lived using van Manen's guide to phenomenological reflection and writing. Weight has become an increasing focus of contemporary culture, demonstrated, for example, by a growing weight-loss industry and global obesity "epidemic." Weight has become synonymous with health status, and weight loss with "healthier." I examine the weight wait through experiences of the common and uncommon, considering relations to time, body, space, and the other with the aim of evoking a felt, embodied, emotive understanding of the meaning of waiting on weight loss. I also discuss the implications of the findings.

  1. Weight Loss Surgery

    MedlinePlus

    Weight loss surgery helps people with extreme obesity to lose weight. It may be an option if you cannot lose weight ... obesity. There are different types of weight loss surgery. They often limit the amount of food you ...

  2. Weight Self-Regulation Process in Adolescence: The Relationship between Control Weight Attitudes, Behaviors, and Body Weight Status.

    PubMed

    Pich, Jordi; Bibiloni, Maria Del Mar; Pons, Antoni; Tur, Josep A

    2015-01-01

    Adolescents' self-control weight behaviors were assessed (N = 1961; 12-17 years old; 2007-2008) in the Balearic Islands, Spain. The study analyzed the relationships between body weight status, body image, and self-weight concern, and actual attempts to lose weight by restrained eating and/or increased exercising. In terms of regulatory focus theory (RFT), we considered that efforts to lose or to maintain weight (successful or failed) would be motivated either by a "promotion focus" (to show an attractive body), or a "prevention focus" (to avoid social rejection of fatness), or both. Results showed that 41% of overweight boys and 25% of obese boys stated that they had never made any attempt to lose weight, and 13 and 4% in females. Around half of overweight boys and around a quarter of obese boys stated that they were "Not at all" concerned about weight gain, and girls' percentages decreased to 13 and 11%, respectively. By contrast, 57% of normal weight girls monitored their weight and stated that they had tried to become slim at least once. Weight self-regulation in females attempted to combine diet and exercise, while boys relied almost exclusively on exercise. Apparent lack of consciousness of body weight status among overweight boys, and more important, subsequent absence of behaviors to reduce their weight clearly challenges efforts to prevent obesity. We argue that several causes may be involved in this outcome, including unconscious, emotional (self-defense), and cognitive (dissonance) mechanisms driven by perceived social stigmatization of obesity. The active participation of social values of male and female body image (strong vs. pretty), and the existence of social habituation to overweight are suggested. A better knowledge of psychosocial mechanisms underlying adolescent weight self-control may improve obesity epidemics. PMID:26284248

  3. Weight Self-Regulation Process in Adolescence: The Relationship between Control Weight Attitudes, Behaviors, and Body Weight Status.

    PubMed

    Pich, Jordi; Bibiloni, Maria Del Mar; Pons, Antoni; Tur, Josep A

    2015-01-01

    Adolescents' self-control weight behaviors were assessed (N = 1961; 12-17 years old; 2007-2008) in the Balearic Islands, Spain. The study analyzed the relationships between body weight status, body image, and self-weight concern, and actual attempts to lose weight by restrained eating and/or increased exercising. In terms of regulatory focus theory (RFT), we considered that efforts to lose or to maintain weight (successful or failed) would be motivated either by a "promotion focus" (to show an attractive body), or a "prevention focus" (to avoid social rejection of fatness), or both. Results showed that 41% of overweight boys and 25% of obese boys stated that they had never made any attempt to lose weight, and 13 and 4% in females. Around half of overweight boys and around a quarter of obese boys stated that they were "Not at all" concerned about weight gain, and girls' percentages decreased to 13 and 11%, respectively. By contrast, 57% of normal weight girls monitored their weight and stated that they had tried to become slim at least once. Weight self-regulation in females attempted to combine diet and exercise, while boys relied almost exclusively on exercise. Apparent lack of consciousness of body weight status among overweight boys, and more important, subsequent absence of behaviors to reduce their weight clearly challenges efforts to prevent obesity. We argue that several causes may be involved in this outcome, including unconscious, emotional (self-defense), and cognitive (dissonance) mechanisms driven by perceived social stigmatization of obesity. The active participation of social values of male and female body image (strong vs. pretty), and the existence of social habituation to overweight are suggested. A better knowledge of psychosocial mechanisms underlying adolescent weight self-control may improve obesity epidemics.

  4. Weight Self-Regulation Process in Adolescence: The Relationship between Control Weight Attitudes, Behaviors, and Body Weight Status

    PubMed Central

    Pich, Jordi; Bibiloni, Maria del Mar; Pons, Antoni; Tur, Josep A.

    2015-01-01

    Adolescents’ self-control weight behaviors were assessed (N = 1961; 12–17 years old; 2007–2008) in the Balearic Islands, Spain. The study analyzed the relationships between body weight status, body image, and self-weight concern, and actual attempts to lose weight by restrained eating and/or increased exercising. In terms of regulatory focus theory (RFT), we considered that efforts to lose or to maintain weight (successful or failed) would be motivated either by a “promotion focus” (to show an attractive body), or a “prevention focus” (to avoid social rejection of fatness), or both. Results showed that 41% of overweight boys and 25% of obese boys stated that they had never made any attempt to lose weight, and 13 and 4% in females. Around half of overweight boys and around a quarter of obese boys stated that they were “Not at all” concerned about weight gain, and girls’ percentages decreased to 13 and 11%, respectively. By contrast, 57% of normal weight girls monitored their weight and stated that they had tried to become slim at least once. Weight self-regulation in females attempted to combine diet and exercise, while boys relied almost exclusively on exercise. Apparent lack of consciousness of body weight status among overweight boys, and more important, subsequent absence of behaviors to reduce their weight clearly challenges efforts to prevent obesity. We argue that several causes may be involved in this outcome, including unconscious, emotional (self-defense), and cognitive (dissonance) mechanisms driven by perceived social stigmatization of obesity. The active participation of social values of male and female body image (strong vs. pretty), and the existence of social habituation to overweight are suggested. A better knowledge of psychosocial mechanisms underlying adolescent weight self-control may improve obesity epidemics. PMID:26284248

  5. [Utilization of anonymous HIV testing by the federal health office--developments and motives].

    PubMed

    Scheibner, J; Waldvogel, B

    1993-01-01

    In the state-run health office in Ulm a survey of the frequency of anonymous HIV-antibody tests was taken between 1985 to 1991, of the age and gender representation from 1988 to 1991, of the test motives from 1.1.1990 to 1.3.1991. The result was a regressive trend following the test boom of 1987 and 1988, which is becoming more and more stable. The relation of men and women has been amounting to 6:4 in the last four years; the proportion of women receding slightly but constantly. The main motive of being tested was finding out about a high-risk or potentially high-risk sexual contact, mostly at the beginning of a new partnership. The motive ranking second in frequency was the investigation of the consequences of blood exposure, mostly relating to medical work. The third place was taken by irrational anxieties as a test motive. The article discusses the fact that test at the beginning of a new partnership frequently have the meaning of a sacrifice and a symbol of bondage in combination with a vow to be faithful. In case of irrational anxieties about AIDS the test-counsellor gets a chance to diagnose a possibly neurotic development at a very early stage, so that painful and expensive chronification and generalisation could be stopped or eased. PMID:8435542

  6. Identification of genes in anonymous DNA sequences. Annual performance report, February 1, 1991--January 31, 1992

    SciTech Connect

    Fields, C.A.

    1996-06-01

    The objective of this project is the development of practical software to automate the identification of genes in anonymous DNA sequences from the human, and other higher eukaryotic genomes. A software system for automated sequence analysis, gm (gene modeler) has been designed, implemented, tested, and distributed to several dozen laboratories worldwide. A significantly faster, more robust, and more flexible version of this software, gm 2.0 has now been completed, and is being tested by operational use to analyze human cosmid sequence data. A range of efforts to further understand the features of eukaryoyic gene sequences are also underway. This progress report also contains papers coming out of the project including the following: gm: a Tool for Exploratory Analysis of DNA Sequence Data; The Human THE-LTR(O) and MstII Interspersed Repeats are subfamilies of a single widely distruted highly variable repeat family; Information contents and dinucleotide compostions of plant intron sequences vary with evolutionary origin; Splicing signals in Drosophila: intron size, information content, and consensus sequences; Integration of automated sequence analysis into mapping and sequencing projects; Software for the C. elegans genome project.

  7. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  8. Evolution of fairness in the one-shot anonymous Ultimatum Game

    PubMed Central

    Rand, David G.; Tarnita, Corina E.; Ohtsuki, Hisashi; Nowak, Martin A.

    2013-01-01

    Classical economic models assume that people are fully rational and selfish, while experiments often point to different conclusions. A canonical example is the Ultimatum Game: one player proposes a division of a sum of money between herself and a second player, who either accepts or rejects. Based on rational self-interest, responders should accept any nonzero offer and proposers should offer the smallest possible amount. Traditional, deterministic models of evolutionary game theory agree: in the one-shot anonymous Ultimatum Game, natural selection favors low offers and demands. Experiments instead show a preference for fairness: often responders reject low offers and proposers make higher offers than needed to avoid rejection. Here we show that using stochastic evolutionary game theory, where agents make mistakes when judging the payoffs and strategies of others, natural selection favors fairness. Across a range of parameters, the average strategy matches the observed behavior: proposers offer between 30% and 50%, and responders demand between 25% and 40%. Rejecting low offers increases relative payoff in pairwise competition between two strategies and is favored when selection is sufficiently weak. Offering more than you demand increases payoff when many strategies are present simultaneously and is favored when mutation is sufficiently high. We also perform a behavioral experiment and find empirical support for these theoretical findings: uncertainty about the success of others is associated with higher demands and offers; and inconsistency in the behavior of others is associated with higher offers but not predictive of demands. In an uncertain world, fairness finishes first. PMID:23341593

  9. Capturing genomic signatures of DNA sequence variation using a standard anonymous microarray platform

    PubMed Central

    Cannon, C. H.; Kua, C. S.; Lobenhofer, E. K.; Hurban, P.

    2006-01-01

    Comparative genomics, using the model organism approach, has provided powerful insights into the structure and evolution of whole genomes. Unfortunately, only a small fraction of Earth's biodiversity will have its genome sequenced in the foreseeable future. Most wild organisms have radically different life histories and evolutionary genomics than current model systems. A novel technique is needed to expand comparative genomics to a wider range of organisms. Here, we describe a novel approach using an anonymous DNA microarray platform that gathers genomic samples of sequence variation from any organism. Oligonucleotide probe sequences placed on a custom 44 K array were 25 bp long and designed using a simple set of criteria to maximize their complexity and dispersion in sequence probability space. Using whole genomic samples from three known genomes (mouse, rat and human) and one unknown (Gonystylus bancanus), we demonstrate and validate its power, reliability, transitivity and sensitivity. Using two separate statistical analyses, a large numbers of genomic ‘indicator’ probes were discovered. The construction of a genomic signature database based upon this technique would allow virtual comparisons and simple queries could generate optimal subsets of markers to be used in large-scale assays, using simple downstream techniques. Biologists from a wide range of fields, studying almost any organism, could efficiently perform genomic comparisons, at potentially any phylogenetic level after performing a small number of standardized DNA microarray hybridizations. Possibilities for refining and expanding the approach are discussed. PMID:17000641

  10. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    PubMed

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  11. An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs

    PubMed Central

    Wen, Qiaoyan; Li, Wenmin; Jin, Zhengping; Zhang, Hua

    2013-01-01

    With advancement of computer community and widespread dissemination of network applications, users generally need multiple servers to provide different services. Accordingly, the multiserver architecture has been prevalent, and designing a secure and efficient remote user authentication under multiserver architecture becomes a nontrivial challenge. In last decade, various remote user authentication protocols have been put forward to correspond to the multi-server scenario requirements. However, these schemes suffered from certain security problems or their cost consumption exceeded users' own constrained ability. In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings. The proposed scheme can not only retain previous schemes' advantages but also achieve user privacy concern. Moreover, our proposal can gain higher efficiency by removing the pairings operation compared with the related schemes. Through analysis and comparison with the related schemes, we can say that our proposal is in accordance with the scenario requirements and feasible to the multi-server architecture. PMID:23844397

  12. Brother-sister incest: data from anonymous computer-assisted self interviews.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Beard, Keith W; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The other 1,230 served as controls. The victims of brother-sister incest had significantly more problematic outcomes than controls on many measures (e.g., more likely than the controls to endorse feeling like damaged goods, thinking that they had suffered psychological injury, and having undergone psychological treatment for childhood sexual abuse). However, victims of brother-sister incest also had significantly less problematic outcomes than victims of father-daughter incest on some measures (e.g., significantly less likely than the father-daughter incest victims to endorse feeling like damaged goods, thinking that they had suffered psychological injury, and having undergone psychological treatment for childhood sexual abuse).

  13. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security. PMID:24760224

  14. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data. PMID:23321970

  15. Parents' perception of self-advocacy of children with myositis: an anonymous online survey

    PubMed Central

    2011-01-01

    Background Children with complex medical issues experience barriers to the transition of care from pediatric to adult providers. We sought to identify these barriers by elucidating the experiences of patients with idiopathic inflammatory muscle disorders. Methods We collected anonymous survey data using an online website. Patients and their families were solicited from the US and Canada through established clinics for children with idiopathic inflammatory muscle diseases as well as with the aid of a nonprofit organization for the benefit of such individuals. The parents of 45 older children/young adults suffering from idiopathic inflammatory muscle diseases were surveyed. As a basis of comparison, we similarly collected data from the parents of 207 younger children with inflammatory muscle diseases. The survey assessed transition of care issues confronting families of children and young adults with chronic juvenile myositis. Results Regardless of age of the patient, respondents were unlikely to have a designated health care provider assigned to aid in transition of care and were unlikely to be aware of a posted policy concerning transition of care at their pediatrician's office. Additionally, regardless of age, patients and their families were unlikely to have a written plan for moving to adult care. Conclusions We identified deficiencies in the health care experiences of families as pertain to knowledge, self-advocacy, policy, and vocational readiness. Moreover, as children with complex medical issues grow up, parents attribute less self-advocacy to their children's level of independence. PMID:21649897

  16. Intuitive presentation of clinical forensic data using anonymous and person-specific 3D reference manikins.

    PubMed

    Urschler, Martin; Höller, Johannes; Bornik, Alexander; Paul, Tobias; Giretzlehner, Michael; Bischof, Horst; Yen, Kathrin; Scheurer, Eva

    2014-08-01

    The increasing use of CT/MR devices in forensic analysis motivates the need to present forensic findings from different sources in an intuitive reference visualization, with the aim of combining 3D volumetric images along with digital photographs of external findings into a 3D computer graphics model. This model allows a comprehensive presentation of forensic findings in court and enables comparative evaluation studies correlating data sources. The goal of this work was to investigate different methods to generate anonymous and patient-specific 3D models which may be used as reference visualizations. The issue of registering 3D volumetric as well as 2D photographic data to such 3D models is addressed to provide an intuitive context for injury documentation from arbitrary modalities. We present an image processing and visualization work-flow, discuss the major parts of this work-flow, compare the different investigated reference models, and show a number of cases studies that underline the suitability of the proposed work-flow for presenting forensically relevant information in 3D visualizations. PMID:24952238

  17. Evaluating Alcoholics Anonymous's Effect on Drinking in Project MATCH Using Cross-Lagged Regression Panel Analysis

    PubMed Central

    Magura, Stephen; Cleland, Charles M.; Tonigan, J. Scott

    2013-01-01

    Objective: The objective of the study is to determine whether Alcoholics Anonymous (AA) participation leads to reduced drinking and problems related to drinking within Project MATCH (Matching Alcoholism Treatments to Client Heterogeneity), an existing national alcoholism treatment data set. Method: The method used is structural equation modeling of panel data with cross-lagged partial regression coefficients. The main advantage of this technique for the analysis of AA outcomes is that potential reciprocal causation between AA participation and drinking behavior can be explicitly modeled through the specification of finite causal lags. Results: For the outpatient subsample (n = 952), the results strongly support the hypothesis that AA attendance leads to increases in alcohol abstinence and reduces drinking/problems, whereas a causal effect in the reverse direction is unsupported. For the aftercare subsample (n = 774), the results are not as clear but also suggest that AA attendance leads to better outcomes. Conclusions: Although randomized controlled trials are the surest means of establishing causal relations between interventions and outcomes, such trials are rare in AA research for practical reasons. The current study successfully exploited the multiple data waves in Project MATCH to examine evidence of causality between AA participation and drinking outcomes. The study obtained unique statistical results supporting the effectiveness of AA primarily in the context of primary outpatient treatment for alcoholism. PMID:23490566

  18. Implementing Social Norm Pedagogy to Impact Students' Personal Health Behavior

    ERIC Educational Resources Information Center

    Kramer, Mary M.; Stover, Sheri

    2015-01-01

    This quantitative exploratory research study describes the incorporation of Social Norms as a unique pedagogical method in an undergraduate Health Behaviors course (N = 32). With the use of an audience response system (clickers), students anonymously answered health-behavior related questions. Aggregate data from the class was compared to state…

  19. Phenomenological Characteristics, Social Problems, and the Economic Impact Associated with Chronic Skin Picking

    ERIC Educational Resources Information Center

    Flessner, Christopher A.; Woods, Douglas W.

    2006-01-01

    In this study, the authors collected data on the demographic characteristics, phenomenology, and social and economic impact of skin picking. A total of 92 participants completed an anonymous, Internet-based survey through a link to the Trichotillomania Learning Center's home page. Results indicated that skin pickers experienced social,…

  20. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    PubMed Central

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  1. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  2. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    PubMed

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  3. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    PubMed

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  4. Informed Test Component Weighting.

    ERIC Educational Resources Information Center

    Rudner, Lawrence M.

    2001-01-01

    Identifies and evaluates alternative methods for weighting tests. Presents formulas for composite reliability and validity as a function of component weights and suggests a rational process that identifies and considers trade-offs in determining weights. Discusses drawbacks to implicit weighting and explicit weighting and the difficulty of…

  5. Assessment of wishes regarding disposition of oocytes and embryo management among ovum donors in an anonymous egg donation program.

    PubMed

    Adsuar, Natalie; Zweifel, Julianne E; Pritts, Elizabeth A; Davidson, Marie A; Olive, David L; Lindheim, Steven R

    2005-11-01

    Revealing possible clinical scenarios to potential anonymous donors for their donated oocytes appears to uncover ambivalence in the majority of prospective candidates about their donation and unwillingness in some to proceed. Full disclosure to a prospective donor candidate of the program's policies for directives of donated oocytes and embryo management emphasizes the importance of the informed consent process and how it may affect the decision to donate.

  6. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.

    PubMed

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.

  7. Reconsidering Anonymization-Related Concepts and the Term “Identification” Against the Backdrop of the European Legal Framework

    PubMed Central

    Schlünder, Irene

    2016-01-01

    Sharing data in biomedical contexts has become increasingly relevant, but privacy concerns set constraints for free sharing of individual-level data. Data protection law protects only data relating to an identifiable individual, whereas “anonymous” data are free to be used by everybody. Usage of many terms related to anonymization is often not consistent among different domains such as statistics and law. The crucial term “identification” seems especially hard to define, since its definition presupposes the existence of identifying characteristics, leading to some circularity. In this article, we present a discussion of important terms based on a legal perspective that it is outlined before we present issues related to the usage of terms such as unique “identifiers,” “quasi-identifiers,” and “sensitive attributes.” Based on these terms, we have tried to circumvent a circular definition for the term “identification” by making two decisions: first, deciding which (natural) identifier should stand for the individual; second, deciding how to recognize the individual. In addition, we provide an overview of anonymization techniques/methods for preventing re-identification. The discussion of basic notions related to anonymization shows that there is some work to be done in order to achieve a mutual understanding between legal and technical experts concerning some of these notions. Using a dialectical definition process in order to merge technical and legal perspectives on terms seems important for enhancing mutual understanding. PMID:27104620

  8. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  9. Risk factors for father-daughter incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; Kuo, Shih-Ya; O'Keefe, Stephen L; Beard, Keith W; Swindell, Sam; Kommor, Martin J

    2013-12-01

    Retrospective data from 2,034 female participants, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for father-daughter incest (FDI). A total of 51 participants had reported having experienced FDI. The risk factors identified within the nuclear family by the multiple logistic regression analysis included the following: (a) Having parents whose relationship included verbal or physical fighting or brutality increased the likelihood of FDI by approximately 5 times; (b) families accepting father-daughter nudity as measured by a scale with values ranging from 0 to 4 increased the likelihood of FDI by approximately 2 times for each unit value increase of 1 above 0; (c) demonstrating maternal affection protected against FDI. The likelihood of being a victim of FDI was highest if the participant's mother never kissed or hugged her; it decreased by 0.44 for a 1-unit increase in affection and by 0.19 times for a 2-unit increase; and (d) being in homes headed by single-parent mothers or where divorce or death of the father had resulted in a man other than the biological father living in the home increased the risk of FDI by approximately 3.2 times. The results were consistent with the idea that FDI in many families was the cumulative result of a circular pattern of interactions, a finding that has implications for treatment of the perpetrator, the victim, and the families. The data also suggested it may be possible to design an information program for parents that will result in reducing the risk of FDI in families implementing the program's recommendations.

  10. Etiological Risk Factors for Sibling Incest: Data From an Anonymous Computer-Assisted Self-Interview.

    PubMed

    Griffee, Karen; Swindell, Sam; O'Keefe, Stephen L; Stroebel, Sandra S; Beard, Keith W; Kuo, Shih-Ya; Stroupe, Walter

    2016-10-01

    Retrospective data from 1,821 women and 1,064 men with one or more siblings, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for sibling incest (SI); 137 were participants in SI. In order of decreasing predictive power, the risk factors identified by the multiple logistic regression analysis included ever having shared a bed for sleeping with a sibling, parent-child incest (PCI), family nudity, low levels of maternal affection, and ever having shared a tub bath with a sibling. The results were consistent with the idea that SI in many families was the cumulative result of four types of parental behaviors: (a) factors that lower external barriers to sexual behavior (e.g., permitting co-sleeping or co-bathing of sibling dyads), (b) factors that encourage nudity of children within the nuclear family and permit children to see the parent's genitals, (c) factors that lead to the siblings relying on one another for affection (e.g., diminished maternal affection), and (d) factors that eroticize young children (e.g., child sexual abuse [CSA] by a parent). Thirty-eight of the 137 SI participants were participants in coerced sibling incest (CSI). In order of decreasing predictive power, risk factors for CSI identified by multiple logistic regression analysis included ever having shared a bed for sleeping with a brother, PCI, witnessing parental physical fighting, and family nudity. SI was more likely to have been reported as CSI if the sibling had touched the reporting sibling's genitals, and less likely to have been reported as CSI if the siblings had shared a bed.

  11. Risk factors for father-daughter incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; Kuo, Shih-Ya; O'Keefe, Stephen L; Beard, Keith W; Swindell, Sam; Kommor, Martin J

    2013-12-01

    Retrospective data from 2,034 female participants, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for father-daughter incest (FDI). A total of 51 participants had reported having experienced FDI. The risk factors identified within the nuclear family by the multiple logistic regression analysis included the following: (a) Having parents whose relationship included verbal or physical fighting or brutality increased the likelihood of FDI by approximately 5 times; (b) families accepting father-daughter nudity as measured by a scale with values ranging from 0 to 4 increased the likelihood of FDI by approximately 2 times for each unit value increase of 1 above 0; (c) demonstrating maternal affection protected against FDI. The likelihood of being a victim of FDI was highest if the participant's mother never kissed or hugged her; it decreased by 0.44 for a 1-unit increase in affection and by 0.19 times for a 2-unit increase; and (d) being in homes headed by single-parent mothers or where divorce or death of the father had resulted in a man other than the biological father living in the home increased the risk of FDI by approximately 3.2 times. The results were consistent with the idea that FDI in many families was the cumulative result of a circular pattern of interactions, a finding that has implications for treatment of the perpetrator, the victim, and the families. The data also suggested it may be possible to design an information program for parents that will result in reducing the risk of FDI in families implementing the program's recommendations. PMID:23363491

  12. Etiological Risk Factors for Sibling Incest: Data From an Anonymous Computer-Assisted Self-Interview.

    PubMed

    Griffee, Karen; Swindell, Sam; O'Keefe, Stephen L; Stroebel, Sandra S; Beard, Keith W; Kuo, Shih-Ya; Stroupe, Walter

    2016-10-01

    Retrospective data from 1,821 women and 1,064 men with one or more siblings, provided anonymously using a computer-assisted self-interview, were used to identify risk factors for sibling incest (SI); 137 were participants in SI. In order of decreasing predictive power, the risk factors identified by the multiple logistic regression analysis included ever having shared a bed for sleeping with a sibling, parent-child incest (PCI), family nudity, low levels of maternal affection, and ever having shared a tub bath with a sibling. The results were consistent with the idea that SI in many families was the cumulative result of four types of parental behaviors: (a) factors that lower external barriers to sexual behavior (e.g., permitting co-sleeping or co-bathing of sibling dyads), (b) factors that encourage nudity of children within the nuclear family and permit children to see the parent's genitals, (c) factors that lead to the siblings relying on one another for affection (e.g., diminished maternal affection), and (d) factors that eroticize young children (e.g., child sexual abuse [CSA] by a parent). Thirty-eight of the 137 SI participants were participants in coerced sibling incest (CSI). In order of decreasing predictive power, risk factors for CSI identified by multiple logistic regression analysis included ever having shared a bed for sleeping with a brother, PCI, witnessing parental physical fighting, and family nudity. SI was more likely to have been reported as CSI if the sibling had touched the reporting sibling's genitals, and less likely to have been reported as CSI if the siblings had shared a bed. PMID:25432976

  13. [Public free anonymous HIV testing centers: cost analysis and financing options].

    PubMed

    Dozol, Adrien; Tribout, Martin; Labalette, Céline; Moreau, Anne-Christine; Duteil, Christelle; Bertrand, Dominique; Segouin, Christophe

    2011-01-01

    The services of general interest provided by hospitals, such as free HIV clinics, have been funded since 2005 by a lump sum covering all costs. The allocation of the budget was initially determined based on historical and declarative data. However, the French Ministry of Health (MoH) recently outlined new rules for determining the allocation of financial resources and contracting hospitals for each type of services of general interest provided. The aim of this study was to estimate the annual cost of a public free anonymous HIV-testing center and to assess the budgetary implications of new financing systems. Three financing options were compared: the historic block grant; a mixed system recommended by the MoH associating a lump sum covering the recurring costs of an average center and a variable part based on the type and volume of services provided; and a fee-for-services system. For the purposes of this retrospective study, the costs and activity data of the HIV testing clinic of a public hospital located in the North of Paris were obtained for 2007. The costs were analyzed from the perspective of the hospital. The total cost was estimated at 555,698 euros. Personnel costs accounted for 31% of the total costs, while laboratory expenses accounted for 36% of the total costs. While the estimated deficit was 292,553 euros under the historic system, the financial balance of the clinic was found to be positive under a fee-for-services system. The budget allocated to the HIV clinic under the system recommended by the MoH covers most of the current expenses of the HIV clinic while meeting the requirements of free confidential care.

  14. Assessing Your Weight

    MedlinePlus

    ... Measure and Interpret Weight Status Adult Body Mass Index or BMI Body Mass Index (BMI) is a person's weight in kilograms divided ... finding your height and weight in this BMI Index Chart 1 . If your BMI is less than ...

  15. Perspectives on the Use of "Anonymous" Discussion Forums in Undergraduate Education Courses

    ERIC Educational Resources Information Center

    Bowen, G. Michael; Farmer, Robert; Arsenault, Nicole

    2012-01-01

    This paper theorizes issues involved with conflicts between participation in on-line settings and real-world social commitments, such as has recently happened in schools with students using public discussion forums for classes. We problematize how real-world social commitments negatively affect participation in online learning environments…

  16. Body Weight Relationships in Early Marriage: Weight Relevance, Weight Comparisons, and Weight Talk

    PubMed Central

    Bove, Caron F.; Sobal, Jeffery

    2011-01-01

    This investigation uncovered processes underlying the dynamics of body weight and body image among individuals involved in nascent heterosexual marital relationships in Upstate New York. In-depth, semi-structured qualitative interviews conducted with 34 informants, 20 women and 14 men, just prior to marriage and again one year later were used to explore continuity and change in cognitive, affective, and behavioral factors relating to body weight and body image at the time of marriage, an important transition in the life course. Three major conceptual themes operated in the process of developing and enacting informants’ body weight relationships with their partner: weight relevance, weight comparisons, and weight talk. Weight relevance encompassed the changing significance of weight during early marriage and included attracting and capturing a mate, relaxing about weight, living healthily, and concentrating on weight. Weight comparisons between partners involved weight relativism, weight competition, weight envy, and weight role models. Weight talk employed pragmatic talk, active and passive reassurance, and complaining and critiquing criticism. Concepts emerging from this investigation may be useful in designing future studies of and approaches to managing body weight in adulthood. PMID:21864601

  17. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    PubMed

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  18. Proven Weight Loss Methods

    MedlinePlus

    Fact Sheet Proven Weight Loss Methods What can weight loss do for you? Losing weight can improve your health in a number of ways. It can lower ... at www.hormone.org/Spanish . Proven Weight Loss Methods Fact Sheet www.hormone.org

  19. Gestational weight gain among Hispanic women.

    PubMed

    Sangi-Haghpeykar, Haleh; Lam, Kim; Raine, Susan P

    2014-01-01

    To describe gestational weight gain among Hispanic women and to examine psychological, social, and cultural contexts affecting weight gain. A total of 282 Hispanic women were surveyed post-partum before leaving the hospital. Women were queried about their prepregnancy weight and weight gained during pregnancy. Adequacy of gestational weight gain was based on guidelines set by the Institute of Medicine in 2009. Independent risk factors for excessive or insufficient weight gain were examined by logistic regression. Most women were unmarried (59 %), with a mean age of 28.4 ± 6.6 years and an average weight gain of 27.9 ± 13.3 lbs. Approximately 45 % of women had gained too much, 32 % too little, and only 24 % had an adequate amount of weight gain. The mean birth weight was 7.3, 7.9, and 6.8 lbs among the adequate, excessive, and insufficient weight gain groups. Among women who exercised before pregnancy, two-thirds continued to do so during pregnancy; the mean gestational weight gain of those who continued was lower than those who stopped (26.8 vs. 31.4 lbs, p = 0.04). Independent risk factors for excessive weight gain were being unmarried, U.S. born, higher prepregnancy body mass index, and having indifferent or negative views about weight gain. Independent risk factors for insufficient weight gain were low levels of support and late initiation of prenatal care. Depression, stress, and a woman's or her partner's happiness regarding pregnancy were unrelated to weight gain. The results of this study can be used by prenatal programs to identify Hispanic women at risk for excessive or insufficient gestational weight gain.

  20. Club Drug Use among Young Adults Frequenting Dance Clubs and Other Social Venues in New York City

    ERIC Educational Resources Information Center

    Parsons, Jeffrey T.; Halkitis, Perry N.; Bimbi, David S.

    2006-01-01

    A convenience sample of young adults (ages 18-25) in New York City was recruited to complete anonymous surveys in social venues (either dance clubs or other social settings, such as coffee shops and university "hangouts") regarding their use of "club drugs" (e.g., MDMA/Ecstasy, GHB, ketamine, crystal methamphetamine, cocaine, and LSD).…

  1. The Social Strategy Game

    PubMed Central

    Gurven, Michael; Kaplan, Hillard; Winking, Jeffrey

    2010-01-01

    This paper examines social determinants of resource competition among Tsimane Amerindian women of Bolivia. We introduce a semi-anonymous experiment (the Social Strategy Game) designed to simulate resource competition among women. Information concerning dyadic social relationships and demographic data were collected to identify variables influencing resource competition intensity, as measured by the number of beads one woman took from another. Relationship variables are used to test how the affiliative or competitive aspects of dyads affect the extent of prosociality in the game. Using a mixed-modeling procedure, we find that women compete with those with whom they are quarreling over accusations of meat theft, mate competition, and rumor spreading. They also compete with members of their social network and with those who were designated as cooperative helpers or as close kin. Women take fewer beads from desired friends, neighbors, and from those viewed as enemies. We interpret favoritism toward enemies as resulting from fear of retribution. Our results suggest that social relations among women are multifaceted and often cannot be simplified by exclusive focus on genetic relatedness, physical proximity, or reciprocity. We argue that a complex understanding of cooperation and competition among women may require important contextual information concerning relationship history in addition to typical features of resource ecology. PMID:20526460

  2. Using discharge abstracts to evaluate a regional perinatal network: assessment of the linkage procedure of anonymous data.

    PubMed

    Quantin, Catherine; Gouyon, Béatrice; Avillach, Paul; Ferdynus, Cyril; Sagot, Paul; Gouyon, Jean-Bernard

    2009-01-01

    To assess the Burgundy perinatal network (18 obstetrical units; 18 500 births per year), discharge abstracts and additional data were collected for all mothers and newborns. In accordance with French law, data were rendered anonymous before statistical analysis, and were linked to patients using a specific procedure. This procedure allowed data concerning each mother to be linked to those for her newborn(s). This study showed that all mothers and newborns were included in the regional database; the data for all mothers were linked to those for their infant(s) in all cases. Additional data (gestational age) were obtained for 99.9% of newborns.

  3. Using Discharge Abstracts to Evaluate a Regional Perinatal Network: Assessment of the Linkage Procedure of Anonymous Data

    PubMed Central

    Quantin, Catherine; Gouyon, Béatrice; Avillach, Paul; Ferdynus, Cyril; Sagot, Paul; Gouyon, Jean-Bernard

    2009-01-01

    To assess the Burgundy perinatal network (18 obstetrical units; 18 500 births per year), discharge abstracts and additional data were collected for all mothers and newborns. In accordance with French law, data were rendered anonymous before statistical analysis, and were linked to patients using a specific procedure. This procedure allowed data concerning each mother to be linked to those for her newborn(s). This study showed that all mothers and newborns were included in the regional database; the data for all mothers were linked to those for their infant(s) in all cases. Additional data (gestational age) were obtained for 99.9% of newborns. PMID:19125196

  4. Factors associated with shooting accuracy and wounding rate of four managed wild deer species in the UK, based on anonymous field records from deer stalkers.

    PubMed

    Aebischer, Nicholas J; Wheatley, Christopher J; Rose, Hugh R

    2014-01-01

    The amount of wounding during routine culling is an important factor in the welfare of wild deer. Little information exists on factors determining shooting accuracy and wounding rates under field conditions in the UK. In this study, 102 anonymous stalkers collected data on the outcomes and circumstances of 2281 shots. Using hot-deck imputation and generalised linear mixed modelling, we related the probability that a shot hit its target, and the probability that the shot killed the deer if it was hit, to 28 variables describing the circumstances of the shot. Overall, 96% of deer were hit, of which 93% were killed outright. A reduced probability of hitting the target was associated with an uncomfortable firing position, too little time available, shooting off elbows or freehand, taking the head or upper neck as point of aim, a heavily obscured target, a distant target, shooting at females, lack of shooting practice and a basic (or no) stalker qualification. An increase in the likelihood of wounding was associated with an uncomfortable firing position, shooting with insufficient time, a distant target (only when time was not sufficient), a bullet weight below 75 grains, a target concealed in thicket or on the move and an area rarely stalked. To maximise stalking success and deer welfare, we recommend that stalkers ensure a comfortable firing position, use a gun rest, aim at the chest, use bullets heavier than 75 grains, avoid taking a rushed shot, shoot a distant animal only if there is plenty of time, fire only when the target is stationary, avoid shooting at an obscured animal, take care when the ground is unfamiliar, and do shooting practice at least once a month. The high miss rate of basic-level stalkers suggests that training should include additional firing practice under realistic shooting conditions.

  5. Factors Associated with Shooting Accuracy and Wounding Rate of Four Managed Wild Deer Species in the UK, Based on Anonymous Field Records from Deer Stalkers

    PubMed Central

    Aebischer, Nicholas J.; Wheatley, Christopher J.; Rose, Hugh R.

    2014-01-01

    The amount of wounding during routine culling is an important factor in the welfare of wild deer. Little information exists on factors determining shooting accuracy and wounding rates under field conditions in the UK. In this study, 102 anonymous stalkers collected data on the outcomes and circumstances of 2281 shots. Using hot-deck imputation and generalised linear mixed modelling, we related the probability that a shot hit its target, and the probability that the shot killed the deer if it was hit, to 28 variables describing the circumstances of the shot. Overall, 96% of deer were hit, of which 93% were killed outright. A reduced probability of hitting the target was associated with an uncomfortable firing position, too little time available, shooting off elbows or freehand, taking the head or upper neck as point of aim, a heavily obscured target, a distant target, shooting at females, lack of shooting practice and a basic (or no) stalker qualification. An increase in the likelihood of wounding was associated with an uncomfortable firing position, shooting with insufficient time, a distant target (only when time was not sufficient), a bullet weight below 75 grains, a target concealed in thicket or on the move and an area rarely stalked. To maximise stalking success and deer welfare, we recommend that stalkers ensure a comfortable firing position, use a gun rest, aim at the chest, use bullets heavier than 75 grains, avoid taking a rushed shot, shoot a distant animal only if there is plenty of time, fire only when the target is stationary, avoid shooting at an obscured animal, take care when the ground is unfamiliar, and do shooting practice at least once a month. The high miss rate of basic-level stalkers suggests that training should include additional firing practice under realistic shooting conditions. PMID:25334012

  6. Support Needs of Overweight African American Women for Weight Loss

    PubMed Central

    Thomas, Janet L.; Stewart, Diana W.; Lynam, Ian M.; Daley, Christine M.; Befort, Christie; Scherber, Robyn M.; Mercurio, Andrea E.; Okuyemi, Kolawole S.; Ahluwalia, Jasjit S.

    2014-01-01

    Objectives To examine social support needs of obese and over-weight African American women for weight loss. Methods Focus groups were conducted with over-weight and obese African American women. Data were analyzed using standard grounded theory text analysis. Results Our middle-aged (45.7 years; SD=12.6) women (N = 66) were interested in receiving support from others focused on the health benefits of weight loss. Behaviors perceived as supportive include co-participating in exercise, providing nutrition education, using positive reinforcements, and avoiding criticism. Conclusions: African American women are interested in a program designed to increase social support for their weight loss. PMID:19182980

  7. Losing weight after pregnancy

    MedlinePlus

    ... below the minimum number of calories you need. Breastfeeding If you are breastfeeding, you will want to lose weight slowly. Weight ... not affect your milk supply or your health. Breastfeeding makes your body burn calories. It helps you ...

  8. Pregnancy and Healthy Weight

    MedlinePlus

    ... Division (HMD) of the National Academies of Sciences, Engineering, and Medicine released updated guidelines for weight gain ... Division (HMD) of the National Academies of Sciences, Engineering, and Medicine: Weight Gain During Pregnancy: Reexamining the ...

  9. Weight-loss medications

    MedlinePlus

    ... this page: //medlineplus.gov/ency/patientinstructions/000346.htm Weight-loss medicines To use the sharing features on this page, please enable JavaScript. Several weight-loss medicines are available. Ask your health care provider ...

  10. Weight Loss & Acute Porphyria

    MedlinePlus

    ... Sale You are here Home Diet and Nutrition Weight loss & acute Porphyria Being overweight is a particular problem ... one of these diseases before they enter a weight-loss program. Also, they should not participate in a ...

  11. Weight gain - unintentional

    MedlinePlus

    ... as much as 25 to 30 pounds. This weight gain is not simply due to eating more. ... or a dietitian about how to make a healthy eating plan and set ... be causing the weight gain without talking with your provider.

  12. Watching Your Weight.

    ERIC Educational Resources Information Center

    Clarke, Doug

    1993-01-01

    Describes an activity shared at an inservice teacher workshop and suitable for middle school in which students predict their ideal weight in kilograms based on tables giving ideal weights for given heights. (MDH)

  13. Gradient Weight in Phonology

    ERIC Educational Resources Information Center

    Ryan, Kevin Michael

    2011-01-01

    Research on syllable weight in generative phonology has focused almost exclusively on systems in which weight is treated as an ordinal hierarchy of clearly delineated categories (e.g. light and heavy). As I discuss, canonical weight-sensitive phenomena in phonology, including quantitative meter and quantity-sensitive stress, can also treat weight…

  14. Comparative population genetic analysis of bocaccio rockfish Sebastes paucispinis using anonymous and gene-associated simple sequence repeat loci.

    PubMed

    Buonaccorsi, Vincent P; Kimbrell, Carol A; Lynn, Eric A; Hyde, John R

    2012-01-01

    Comparative population genetic analyses of traditional and emergent molecular markers aid in determining appropriate use of new technologies. The bocaccio rockfish Sebastes paucispinis is a high gene-flow marine species off the west coast of North America that experienced strong population decline over the past 3 decades. We used 18 anonymous and 13 gene-associated simple sequence repeat (SSR) loci (expressed sequence tag [EST]-SSRs) to characterize range-wide population structure with temporal replicates. No F(ST)-outliers were detected using the LOSITAN program, suggesting that neither balancing nor divergent selection affected the loci surveyed. Consistent hierarchical structuring of populations by geography or year class was not detected regardless of marker class. The EST-SSRs were less variable than the anonymous SSRs, but no correlation between F(ST) and variation or marker class was observed. General linear model analysis showed that low EST-SSR variation was attributable to low mean repeat number. Comparative genomic analysis with Gasterosteus aculeatus, Takifugu rubripes, and Oryzias latipes showed consistently lower repeat number in EST-SSRs than SSR loci that were not in ESTs. Purifying selection likely imposed functional constraints on EST-SSRs resulting in low repeat numbers that affected diversity estimates but did not affect the observed pattern of population structure.

  15. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  16. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  17. A quality improvement project to tackle under-reporting of hazards by doctors by using an anonymous telephone hotline

    PubMed Central

    Johnson, Sarah

    2016-01-01

    An anonymous hazard reporting hotline was established for doctors to use on two general medical wards at Weston General Hospital (WGH) in North Somerset in England during an eight day period in July/August 2014. Doctors were encouraged to report hazards and near misses or just start a conversation about a concern. The existing computer based significant event system remained alongside the hotline and was to be used where actual harm had come to a patient. A team of consultants and quality improvement administrators monitored the hotline on a daily basis, categorized the level of risk being reported and ensured, where possible, that action was taken to address the doctors' concerns. The hotline increased reporting rates from two per month to 25 in eight days. The system identified 13 amber (medium risk) and five red (high risk) hazards which would otherwise not have been known about. This author believes these five high risk reports alone make the case for a new, quicker, easier, and anonymous reporting system for doctors at WGH urgent and irrefutable. PMID:26893901

  18. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  19. Anonymous nuclear loci in the white-faced storm-petrel Pelagodroma marina and their applicability to other Procellariiform seabirds.

    PubMed

    Silva, Mónica C; Duarte, Margarida A; Coelho, M Manuela

    2011-01-01

    Procellariiform seabirds are among the avian species with the fastest rates of extinction due to interactions with fisheries and introduction of alien predators to the breeding colonies. Conservation and management policies targeting populations of these species must include information on colony demographics and levels of isolation and genetic markers go a long way toward providing reliable estimates of these parameters. To this end, we report isolation and characterization of 14 anonymous nuclear loci, with average length of 657 bp, in the pelagic seabird White-faced Storm-petrel Pelagodroma marina, a species for which there is virtually no genetic information available. These loci, initially isolated from a genomic library built from P. marina, were further tested, for a range of conditions, in 7 other species representing all Procellariiform families. We found high levels of cross-species amplification success, varying between 79% and 86% in representatives of Diomedeidae, Procellariidae, Pelecanoididae, and other Hydrobatidae. We also sequenced 11 loci for 22 P. marina individuals and report higher levels of anonymous genetic variation (π = 0.002), with an average of 1 single nucleotide polymorphism every 100 bp surveyed, relative to the levels found on a typically variable intron in avian species. These markers will be a valuable tool in future population genetics and phylogenetic studies, particularly of nonmodel seabird species. PMID:21447754

  20. A quality improvement project to tackle under-reporting of hazards by doctors by using an anonymous telephone hotline.

    PubMed

    Johnson, Sarah

    2016-01-01

    An anonymous hazard reporting hotline was established for doctors to use on two general medical wards at Weston General Hospital (WGH) in North Somerset in England during an eight day period in July/August 2014. Doctors were encouraged to report hazards and near misses or just start a conversation about a concern. The existing computer based significant event system remained alongside the hotline and was to be used where actual harm had come to a patient. A team of consultants and quality improvement administrators monitored the hotline on a daily basis, categorized the level of risk being reported and ensured, where possible, that action was taken to address the doctors' concerns. The hotline increased reporting rates from two per month to 25 in eight days. The system identified 13 amber (medium risk) and five red (high risk) hazards which would otherwise not have been known about. This author believes these five high risk reports alone make the case for a new, quicker, easier, and anonymous reporting system for doctors at WGH urgent and irrefutable.

  1. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] Anecdotal information is insufficient to claim

    NASA Astrophysics Data System (ADS)

    Walder, Joseph S.

    I have read the recent Forum commentaries describing disgruntlement with particular anonymous reviews (1 July 2003 and 29 July 2003 issues), and nodded sympathetically. After all, who among us has not felt, at one time or another, that a reviewer badly misunderstood our contribution to the scientific literature or our grant proposal? But each of these recent Forum contributors in fact committed the elementary logical error of invoking anecdotal evidence to prove a point. I doubt that any of these correspondents would accept scientific claims based on anecdotes. Yet somehow they believe that anecdotes form a sufficient basis for claiming that anonymous reviewing is inherently a nasty business. These correspondents further employed the dubious rhetorical device of contrasting their own self-defined, high ethical standards with those of their adversaries, whom they variously described as rude, hostile, vindictive, lazy, cowardly, selfish, bigoted against women and minorities, and attired in “the costume of crooks.” The parallel with the discourse of political argument is hard to miss.

  2. Factors associated with failure to return for HIV test results in a free and anonymous screening centre.

    PubMed

    Laanani, Moussa; Dozol, Adrien; Meyer, Laurence; David, Stéphane; Camara, Sékou; Segouin, Christophe; Troude, Pénélope

    2015-07-01

    Free and anonymous screening centres (CDAG: Centres de Depistage Anononyme et Gratuit) are public facilities set up for HIV infection diagnosis in France. Some people visiting CDAG fail to return for test results and are not informed of their serology. This study aimed to assess factors associated with failure to return for HIV test results. Patients visiting the Fernand-Widal CDAG (Paris) for an HIV test in January-February 2011 were eligible to take part in the study. Data were collected with an anonymous self-administered questionnaire. Factors associated with failure to return were assessed using logistic regression models. Of the 710 participants (participation rate 88%), 46 patients failed to return. Not specifying birthplace and not living in the region of Paris were associated with failure to return. Those who perceived no risk of HIV infection and those who felt they were more at risk than other people were both statistically associated with failure to return. Self-perceived risk seemed to be of chief concern for failure to return for HIV test results and should be considered during pre-test counselling.

  3. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  4. Kriging without negative weights

    SciTech Connect

    Szidarovszky, F.; Baafi, E.Y.; Kim, Y.C.

    1987-08-01

    Under a constant drift, the linear kriging estimator is considered as a weighted average of n available sample values. Kriging weights are determined such that the estimator is unbiased and optimal. To meet these requirements, negative kriging weights are sometimes found. Use of negative weights can produce negative block grades, which makes no practical sense. In some applications, all kriging weights may be required to be nonnegative. In this paper, a derivation of a set of nonlinear equations with the nonnegative constraint is presented. A numerical algorithm also is developed for the solution of the new set of kriging equations.

  5. Blogging for weight loss: personal accountability, writing selves, and the weight-loss blogosphere.

    PubMed

    Leggatt-Cook, Chez; Chamberlain, Kerry

    2012-09-01

    Body weight is a key concern in contemporary society, with large proportions of the population attempting to control their weight. However, losing weight and maintaining weight loss is notoriously difficult, and new strategies for weight loss attract significant interest. Writing about experiences of weight loss in online journals, or blogging, has recently expanded rapidly. Weight-loss bloggers typically write about daily successes and failures, report calorie consumption and exercise output, and post photographs of their changing bodies. Many bloggers openly court the surveillance of blog readers as a motivation for accountability to their weight-loss goals. Drawing from a sample of weight-loss blogs authored by women, we explore three issues arising from this practice of disclosing a conventionally private activity within an online public domain. First, we examine motivations for blogging, focusing on accountability. Secondly, we consider the online construction of self, exploring how weight-loss bloggers negotiate discourses around fatness, and rework selves as their bodies transform. Finally, we consider the communities of interest that form around weight-loss blogs. This 'blogosphere' provides mutual support for weight loss. However, participating in online social spaces is complicated and bloggers must carefully manage issues of privacy and disclosure.

  6. Internalized weight bias: ratings of the self, normal weight, and obese individuals and psychological maladjustment.

    PubMed

    Carels, Robert A; Burmeister, J; Oehlhof, M W; Hinman, N; LeRoy, M; Bannon, E; Koball, A; Ashrafloun, L

    2013-02-01

    Current measures of internalized weight bias assess factors such as responsibility for weight status, mistreatment because of weight, etc. A potential complementary approach for assessing internalized weight bias is to examine the correspondence between individuals' ratings of obese people, normal weight people, and themselves on personality traits. This investigation examined the relationships among different measures of internalized weight bias, as well as the association between those measures and psychosocial maladjustment. Prior to the beginning of a weight loss intervention, 62 overweight/obese adults completed measures of explicit and internalized weight bias as well as body image, binge eating, and depression. Discrepancies between participants' ratings of obese people in general and ratings of themselves on both positive and negative traits predicted unique variance in measures of maladjustment above a traditional assessment of internalized weight bias. This novel approach to measuring internalized weight bias provides information above and beyond traditional measures of internalized weight bias and begins to provide insights into social comparison processes involved in weight bias. PMID:22322909

  7. Yogurt and weight management.

    PubMed

    Jacques, Paul F; Wang, Huifen

    2014-05-01

    A large body of observational studies and randomized controlled trials (RCTs) has examined the role of dairy products in weight loss and maintenance of healthy weight. Yogurt is a dairy product that is generally very similar to milk, but it also has some unique properties that may enhance its possible role in weight maintenance. This review summarizes the human RCT and prospective observational evidence on the relation of yogurt consumption to the management and maintenance of body weight and composition. The RCT evidence is limited to 2 small, short-term, energy-restricted trials. They both showed greater weight losses with yogurt interventions, but the difference between the yogurt intervention and the control diet was only significant in one of these trials. There are 5 prospective observational studies that have examined the association between yogurt and weight gain. The results of these studies are equivocal. Two of these studies reported that individuals with higher yogurt consumption gained less weight over time. One of these same studies also considered changes in waist circumference (WC) and showed that higher yogurt consumption was associated with smaller increases in WC. A third study was inconclusive because of low statistical power. A fourth study observed no association between changes in yogurt intake and weight gain, but the results suggested that those with the largest increases in yogurt intake during the study also had the highest increase in WC. The final study examined weight and WC change separately by sex and baseline weight status and showed benefits for both weight and WC changes for higher yogurt consumption in overweight men, but it also found that higher yogurt consumption in normal-weight women was associated with a greater increase in weight over follow-up. Potential underlying mechanisms for the action of yogurt on weight are briefly discussed.

  8. Topology dependent epidemic spreading velocity in weighted networks

    NASA Astrophysics Data System (ADS)

    Duan, Wei; Quax, Rick; Lees, Michael; Qiu, Xiaogang; Sloot, Peter M. A.

    2014-12-01

    Many diffusive processes occur on structured networks with weighted links, such as disease spread by airplane transport or information diffusion in social networks or blogs. Understanding the impact of weight-connectivity correlations on epidemic spreading in weighted networks is crucial to support decision-making on disease control and other diffusive processes. However, a real understanding of epidemic spreading velocity in weighted networks is still lacking. Here we conduct a numerical study of the velocity of a Reed-Frost epidemic spreading process in various weighted network topologies as a function of the correlations between edge weights and node degrees. We find that a positive weight-connectivity correlation leads to a faster epidemic spreading compared to an unweighted network. In contrast, we find that both uncorrelated and negatively correlated weight distributions lead to slower spreading processes. In the case of positive weight-connectivity correlations, the acceleration of spreading velocity is weak when the heterogeneity of weight distribution increases.

  9. Social Media and HIV: A Systematic Review of Uses of Social Media in HIV Communication

    PubMed Central

    Grewe, Mary Elisabeth; Conserve, Donaldson F; Gliwa, Catherine; Roman Isler, Malika

    2015-01-01

    Background Social media, including mobile technologies and social networking sites, are being used increasingly as part of human immunodeficiency virus (HIV) prevention and treatment efforts. As an important avenue for communication about HIV, social media use may continue to increase and become more widespread. Objective The objective of this paper is to present a comprehensive systematic review of the current published literature on the design, users, benefits, and limitations of using social media to communicate about HIV prevention and treatment. Methods This review paper used a systematic approach to survey all literature published before February 2014 using 7 electronic databases and a manual search. The inclusion criteria were (1) primary focus on communication/interaction about HIV/acquired immunodeficiency syndrome (AIDS), (2) discusses the use of social media to facilitate communication, (3) communication on the social media platform is between individuals or a group of individuals rather than the use of preset, automated responses from a platform, (4) published before February 19, 2014, and (5) all study designs. Results The search identified 35 original research studies. Thirty studies had low or unclear risk of at least one of the bias items in the methodological quality assessment. Among the 8 social media platform types described, short message service text messaging was most commonly used. Platforms served multiple purposes including disseminating health information, conducting health promotion, sharing experiences, providing social support, and promoting medication adherence. Social media users were diverse in geographic location and race/ethnicity; studies commonly reported users aged 18-40 years and users with lower income. Although most studies did not specify whether use was anonymous, studies reported the importance of anonymity in social media use to communicate about HIV largely due to the stigma associated with HIV. The ability to share and

  10. [The "secret book" of Dr Friedrich Benjamin Osiander: anonymous births in the Göttingen Accouchierhaus, 1794-1819].

    PubMed

    Schlumbohm, Jürgen

    2014-01-01

    The problem of anonymous or confidential deliveries, a subject of current controversy, has a long history. Some maternity hospitals offered the possibility for "clandestine" births as early as the 18th and 19th century. A recently emerged source about the maternity clinic of Göttingen University allows insight into the motives that led to keeping a birth secret and the consequences of such a clandestine birth for mother, father and child. The director of the institution, a professor of obstetrics, wrote case reports on the women, who paid a handsome sum for his help and the in-patient care they received. In return, these women could be admitted under a pseudonym, and thus falsify their child's birth certificate; moreover they were not used as teaching material for medical students and midwife apprentices, whereas "regular" patients had to give their names and, in return for being treated free of charge, be available for teaching purposes. The ten cases that have been painstakingly investigated reveal that the reasons that led the women and men to opt for an anonymous birth were manifold, that they used this offer in different ways and with different consequences. All of these pregnancies were illegitimate, of course. In one case the expectant mother was married. In several cases it would be the father who was married. Most of the women who gave birth secretly seem to have given the professor their actual details and he kept quiet about them--with the exception of one case where he revealed the contents of the case report many years later in an alimony suit. Only one of the men admitted paternity openly, but many revealed their identity implicitly by registering the pregnant woman or by accompanying her to the clinic. If the birth was to be kept secret the child needed to be handed over to foster parents. By paying a lump sum that covered the usual fourteen years of parenting, one mother was able to avoid any later contact with her son. In most cases contact seems

  11. [The "secret book" of Dr Friedrich Benjamin Osiander: anonymous births in the Göttingen Accouchierhaus, 1794-1819].

    PubMed

    Schlumbohm, Jürgen

    2014-01-01

    The problem of anonymous or confidential deliveries, a subject of current controversy, has a long history. Some maternity hospitals offered the possibility for "clandestine" births as early as the 18th and 19th century. A recently emerged source about the maternity clinic of Göttingen University allows insight into the motives that led to keeping a birth secret and the consequences of such a clandestine birth for mother, father and child. The director of the institution, a professor of obstetrics, wrote case reports on the women, who paid a handsome sum for his help and the in-patient care they received. In return, these women could be admitted under a pseudonym, and thus falsify their child's birth certificate; moreover they were not used as teaching material for medical students and midwife apprentices, whereas "regular" patients had to give their names and, in return for being treated free of charge, be available for teaching purposes. The ten cases that have been painstakingly investigated reveal that the reasons that led the women and men to opt for an anonymous birth were manifold, that they used this offer in different ways and with different consequences. All of these pregnancies were illegitimate, of course. In one case the expectant mother was married. In several cases it would be the father who was married. Most of the women who gave birth secretly seem to have given the professor their actual details and he kept quiet about them--with the exception of one case where he revealed the contents of the case report many years later in an alimony suit. Only one of the men admitted paternity openly, but many revealed their identity implicitly by registering the pregnant woman or by accompanying her to the clinic. If the birth was to be kept secret the child needed to be handed over to foster parents. By paying a lump sum that covered the usual fourteen years of parenting, one mother was able to avoid any later contact with her son. In most cases contact seems

  12. Power of Peer Review: An Online Collaborative Learning Assignment in Social Psychology

    ERIC Educational Resources Information Center

    Cathey, Christie

    2007-01-01

    In a semester-long, peer review assignment, undergraduates enrolled in a social psychology course wrote essays that applied course concepts to life experiences. Students anonymously posted essays for the entire class to view, and peers posted commentaries on classmates' essays using an online discussion board. Students rated the assignment as…

  13. Attitudes toward Gay Men and Lesbian Women among Heterosexual Social Work Faculty

    ERIC Educational Resources Information Center

    Chonody, Jill M.; Woodford, Michael R.; Brennan, David J.; Newman, Bernie; Wang, Donna

    2014-01-01

    This study reports results from a national Internet-based survey administered anonymously to a cross-section of social work faculty in the United States. Drawn from a sampling frame of 700 accredited or in candidacy schools, data were collected between November 2010 and March 2011. We investigate the role of sex, sexual orientation, race,…

  14. Paved with good intentions: Paradoxical eating responses to weight stigma.

    PubMed

    Nolan, Laurence J; Eshleman, Amy

    2016-07-01

    Because body weight is largely seen as controllable, weight stigma-the social devaluation of those who are overweight-is not subject to the social norms that condemn open expression of racism and sexism. Indeed, rejection of peers based on perceptions of excess weight is normative. Since weight stigma is internalized, popular views (and often the views of physicians) have suggested that increasing the salience of weight stigma might produce a reduction in overeating and/or an increase in physical activity. However, that perspective is not rooted in scientific evidence. Recent randomized controlled designs demonstrate that stigma may promote overeating. Correlational evidence suggests that self-reported stigma experience is associated with risk for binge eating and decreased interest in physical exercise and dieting, for children and adults. In addition to reviewing these research studies, this paper examines the potential for intersectionality of stigma across multiple social identities and considers alternatives to stigmatizing weight loss interventions.

  15. Youth Homelessness: Prevalence and Associations with Weight in Three Regions.

    PubMed

    Cutuli, J J; Steinway, Caren; Perlman, Staci; Herbers, Janette E; Eyrich-Garg, Karin M; Willard, Joe

    2015-11-01

    This study investigated the utility of the Youth Risk Behavior Survey (YRBS) to document associations between homeless status and weight while estimating the prevalence of youth homelessness in three regions. A school-based survey, the YRBS includes youths who have been difficult to involve in past research. Analysis of 2011 YRBS data produced population-weighted estimates of youth homelessness prevalence separately for Connecticut, Delaware, and Philadelphia. Public high school students anonymously reported their housing status, height, and weight on the YRBS. Height and weight were converted to body mass index (BMI) percentile-for-age scores. Homelessness was associated with higher BMI percentile scores for youths compared with nonhomeless peers. Associations between BMI percentile and different forms of homelessness (homeless with family, unaccompanied homeless without family) were explored at each site. Estimates of one-month homelessness prevalence ranged from 3.9 percent to 5.9 percent at each site. Homelessness, especially family homelessness, is associated with risk for higher BMI. The YRBS is an informative tool for estimating the prevalence of youth homelessness, expanding on what is known through other, more commonly used methods.

  16. Youth Homelessness: Prevalence and Associations with Weight in Three Regions.

    PubMed

    Cutuli, J J; Steinway, Caren; Perlman, Staci; Herbers, Janette E; Eyrich-Garg, Karin M; Willard, Joe

    2015-11-01

    This study investigated the utility of the Youth Risk Behavior Survey (YRBS) to document associations between homeless status and weight while estimating the prevalence of youth homelessness in three regions. A school-based survey, the YRBS includes youths who have been difficult to involve in past research. Analysis of 2011 YRBS data produced population-weighted estimates of youth homelessness prevalence separately for Connecticut, Delaware, and Philadelphia. Public high school students anonymously reported their housing status, height, and weight on the YRBS. Height and weight were converted to body mass index (BMI) percentile-for-age scores. Homelessness was associated with higher BMI percentile scores for youths compared with nonhomeless peers. Associations between BMI percentile and different forms of homelessness (homeless with family, unaccompanied homeless without family) were explored at each site. Estimates of one-month homelessness prevalence ranged from 3.9 percent to 5.9 percent at each site. Homelessness, especially family homelessness, is associated with risk for higher BMI. The YRBS is an informative tool for estimating the prevalence of youth homelessness, expanding on what is known through other, more commonly used methods. PMID:26638508

  17. Humility and 12-Step Recovery: A Prolegomenon for the Empirical Investigation of a Cardinal Virtue in Alcoholics Anonymous

    PubMed Central

    Post, Stephen G.; Pagano, Maria E.; Lee, Matthew T.; Johnson, Byron R.

    2016-01-01

    Alcoholics Anonymous (AA) offers a live stage to study how humility is worn by thousands for another day of sobriety and more freedom from the bondage of self. It has been the coauthors’ intent to emphasize the significance of humility as a cardinal virtue across the 12-Step program and as essential to all its key elements. The coauthors have placed this emphasis in the context of a wider theological history of thought as this converged on Bill W. and AA. In addition, the coauthors have offered a constructive developmental interpretation of the 12 Steps that relies on a model of four modulations of humility. Finally, the coauthors have reviewed in brief some approaches to the measurement of humility in this context, and suggest several aims for future research. PMID:27429509

  18. Rapid identification of anonymous subjects in large criminal databases: problems and solutions in IAFIS III/FBI subject searches

    NASA Astrophysics Data System (ADS)

    Kutzleb, C. D.

    1997-02-01

    The high incidence of recidivism (repeat offenders) in the criminal population makes the use of the IAFIS III/FBI criminal database an important tool in law enforcement. The problems and solutions employed by IAFIS III/FBI criminal subject searches are discussed for the following topics: (1) subject search selectivity and reliability; (2) the difficulty and limitations of identifying subjects whose anonymity may be a prime objective; (3) database size, search workload, and search response time; (4) techniques and advantages of normalizing the variability in an individual's name and identifying features into identifiable and discrete categories; and (5) the use of database demographics to estimate the likelihood of a match between a search subject and database subjects.

  19. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin

    Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser changes, its security requirements also change. In this work, we present the use of authorisation policies to automatise the process of controlling the resources of a Web browser when its context changes. The objective of our proposal is oriented towards easing the adaptation to the security requirements of the new context and enforce them in the browser without the need for user intervention. We present a concrete application of our work as a plug-in for the adaption of security requirements in Mozilla/Firefox browser when a context of anonymous navigation through the Tor network is enabled.

  20. 'Let me tell you what I really think about you'--evaluating nursing managers using anonymous staff feedback.

    PubMed

    Kagan, Ilya; Kigli-Shemesh, Ronit; Tabak, Nilli

    2006-07-01

    The evaluation of employees by their superiors is standard managerial practice but the value of the evaluation of superiors by their employees is much less recognized. This study describes a project where for 3 years (2000-02), in an Israeli mental health center, the Director of Nursing, clinical supervisors, ward head nurses and their deputies were evaluated by nurses and nursing aides. Feedback was gathered through anonymous questionnaires under conditions of confidentiality. Based on the findings, steps were taken to improve managers' performance. Evaluators were also requested to evaluate the project's contribution to themselves and the hospital in a second, open questionnaire. All parties, evaluators and evaluated, expressed satisfaction and recommended that the project continue on a regular basis. Nurses felt empowered and respected and that manager-subordinate relations were improved. Other results and recommendations are discussed.

  1. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes. PMID:25677956

  2. The Meaning of Weight

    ERIC Educational Resources Information Center

    Iona, Mario

    1975-01-01

    Presents a summary and comparison of various views on the concepts of mass and weight. Includes a consideration of gravitational force in an inertial system and apparent gravitational force on a rotating earth. Discusses the units and methods for measuring mass and weight. (GS)

  3. The Weighted Oblimin Rotation.

    ERIC Educational Resources Information Center

    Lorenzo-Seva, Urbano

    2000-01-01

    Demonstrates that the weighting procedure proposed by E. Cureton and S. Mulaik (1975) can be applied to the Direct Oblimin approach of D. Clarkson and R. Jennrich (1988) to provide good results. The rotation method obtained is called Weighted Oblimin. Compared this method to other rotation methods with favorable results. (SLD)

  4. Marijuana and Body Weight

    PubMed Central

    Sansone, Lori A.

    2014-01-01

    Acute marijuana use is classically associated with snacking behavior (colloquially referred to as “the munchies”). In support of these acute appetite-enhancing effects, several authorities report that marijuana may increase body mass index in patients suffering from human immunodeficiency virus and cancer. However, for these medical conditions, while appetite may be stimulated, some studies indicate that weight gain is not always clinically meaningful. In addition, in a study of cancer patients in which weight gain did occur, it was less than the comparator drug (megestrol). However, data generally suggest that acute marijuana use stimulates appetite, and that marijuana use may stimulate appetite in low-weight individuals. As for large epidemiological studies in the general population, findings consistently indicate that users of marijuana tend to have lower body mass indices than nonusers. While paradoxical and somewhat perplexing, these findings may be explained by various study confounds, such as potential differences between acute versus chronic marijuana use; the tendency for marijuana use to be associated with other types of drug use; and/or the possible competition between food and drugs for the same reward sites in the brain. Likewise, perhaps the effects of marijuana are a function of initial weight status—i.e., maybe marijuana is a metabolic regulatory substance that increases body weight in low-weight individuals but not in normal-weight or overweight individuals. Only further research will clarify the complex relationships between marijuana and body weight. PMID:25337447

  5. Exercise and Weight Control.

    ERIC Educational Resources Information Center

    Katch, Victor L.

    This paper describes a number of factors which go into determining weight. The paper describes what calories are, how caloric expenditure is measured, and why caloric expenditure is different for different people. The paper then outlines the way the body tends to adjust food intake and exercise to maintain a constant body weight. It is speculated…

  6. Labor Supply and Weight

    ERIC Educational Resources Information Center

    Lakdawalla, Darius; Philipson, Tomas

    2007-01-01

    We use panel data from the National Longitudinal Survey of Youth to investigate on-the-job exercise and weight. For male workers, job-related exercise has causal effects on weight, but for female workers, the effects seem primarily selective. A man who spends 18 years in the most physical fitness-demanding occupation is about 25 pounds (14…

  7. Quantifying Social Influence in an Online Cultural Market

    PubMed Central

    Krumme, Coco; Cebrian, Manuel; Pickard, Galen; Pentland, Sandy

    2012-01-01

    We revisit experimental data from an online cultural market in which 14,000 users interact to download songs, and develop a simple model that can explain seemingly complex outcomes. Our results suggest that individual behavior is characterized by a two-step process–the decision to sample and the decision to download a song. Contrary to conventional wisdom, social influence is material to the first step only. The model also identifies the role of placement in mediating social signals, and suggests that in this market with anonymous feedback cues, social influence serves an informational rather than normative role. PMID:22590493

  8. Quantifying social influence in an online cultural market.

    PubMed

    Krumme, Coco; Cebrian, Manuel; Pickard, Galen; Pentland, Sandy

    2012-01-01

    We revisit experimental data from an online cultural market in which 14,000 users interact to download songs, and develop a simple model that can explain seemingly complex outcomes. Our results suggest that individual behavior is characterized by a two-step process--the decision to sample and the decision to download a song. Contrary to conventional wisdom, social influence is material to the first step only. The model also identifies the role of placement in mediating social signals, and suggests that in this market with anonymous feedback cues, social influence serves an informational rather than normative role.

  9. Doctoring the Genitals: Towards Broadening the Meaning of Social Medicine.

    PubMed

    Shweder, Richard A

    2015-01-01

    Doctoring the genitals is compatible with a recognizable conception of social medicine. This commentary critically examines the distinction between medical and nonmedical procedures; presents an alternative account of Sohaila Bastami's personal reaction to the anonymous caller's request for referral information concerning hymen reconstruction surgery; and makes use of Yelp to simulate the caller's procedure for locating a helpful practitioner. Yelp is a very useful informational search engine that does not subject its users to a moral examination.

  10. The Impact of Counselor Recovery Status Similarity on Perceptions of Attractiveness with Members of Alcoholics Anonymous: An Exception to the Repulsion Hypothesis

    ERIC Educational Resources Information Center

    Priester, Paul E.; Azen, Razia; Speight, Suzette; Vera, Elizabeth M.

    2007-01-01

    This study explores the impact of counselor alcoholism recovery status on perceptions of recovering alcoholics who are active members of Alcoholics Anonymous. The participants (n = 116) were given a description of an analogue counselor and rated this counselor using the "Counselor Rating Form-Short." There were three forms of the analogue…

  11. Social Trust, Social Partner Time and Television Time

    ERIC Educational Resources Information Center

    Patulny, Roger

    2011-01-01

    Social trust is an important phenomenon, but the influence of important time-based measures upon trust has not been examined. Such measures include social contact and anti-social activity, such as television watching, which allows for the co-presence of other people. This paper reports on associations between trust and weighted means of co-present…

  12. The Overweight Preschool Retarded Child Can and Should Lose Weight.

    ERIC Educational Resources Information Center

    Fox, Robert; And Others

    1983-01-01

    Describes a weight reduction and control program for obese retarded preschool children involving parent leaders and incorporating social and tangible rewards. Discusses techniques children practice daily for a total of 15 weeks. (RH)

  13. Attempts to lose weight among overweight and non-overweight adolescents: a cross-national survey

    PubMed Central

    Ojala, Kristiina; Vereecken, Carine; Välimaa, Raili; Currie, Candace; Villberg, Jari; Tynjälä, Jorma; Kannas, Lasse

    2007-01-01

    Background Despite the global obesity epidemic, few studies have performed cross-national comparisons of adolescents' attempts to lose weight and weight control practices. This study aims to investigate matters mentioned above by weight status in Europe, Israel, and North America. Methods Nationally representative samples of adolescents from over 30 countries completed an anonymous, standardized questionnaire as part of the Health Behaviour in School-aged Children 2001/2002 survey. The prevalence and likelihood of attempts to lose weight were determined. The effect of weight status, self-perception of overweight, age and country of residence upon the likelihood of current attempts to lose weight were evaluated using multilevel multivariate logistic regression in separate analyses for boys and girls. The study also presented the prevalence of weight control practices of overweight and non-overweight adolescents who had controlled their weight in seven countries. Results In general, overweight and obese adolescents were more likely to be engaged in current attempts to lose weight and had tried to control their weight during the past 12 months more often than non-overweight adolescents. Besides weight status, self-perception of overweight and age were significant individual-level factors determining current attempts to lose weight. Country of residence was a significant second-level factor but no clear geographical pattern was found. Several gender-related differences existed. Conclusion The findings indicated that most overweight adolescents were motivated to reduce their weight. The importance of promoting a healthy body image for all adolescents was highlighted by the fact that self-perception of overweight was found to be the most important factor leading to attempts to lose weight. PMID:17935629

  14. Exploring women's responses to online media coverage of weight loss surgery.

    PubMed

    Champion, C; Glenn, N; Berry, T; Spence, J C

    2015-10-01

    The purpose of this study was to understand the reactions of women to online news articles about weight loss surgery and related reader comments. Focus groups were conducted; open-ended questions were asked to elicit responses to existing online news media content related to weight loss surgery. The participants described the online articles as predominantly supportive of weight loss surgery and in response they expressed a desire to see more critical content, including different and competing perspectives. Participants felt the online comments represented extreme perspectives and were predominately negative. These were therefore not viewed as helpful or informative. Nevertheless, readers viewed comments as a form of entertainment. Because of the aggressive and anonymous nature of reader comments in response to online news stories, the participants did not feel comfortable leaving comments themselves on the news sites. Findings highlight the importance of gathering readers' perspectives in response to interactive media content and, in particular, health information. PMID:26278398

  15. Thyroid and Weight

    MedlinePlus

    ... Differences in BMRs are associated with changes in energy balance. Energy balance reflects the difference between the amount of ... such as amphetamines, animals often have a negative energy balance which leads to weight loss. Based on ...

  16. Preventing Weight Gain

    MedlinePlus

    ... If this is the case, preventing further weight gain is a worthy goal. As people age, their body composition gradually shifts — the proportion of muscle decreases and the proportion of fat increases. This ...

  17. Prizes for weight loss.

    PubMed Central

    Englberger, L.

    1999-01-01

    A programme of weight loss competitions and associated activities in Tonga, intended to combat obesity and the noncommunicable diseases linked to it, has popular support and the potential to effect significant improvements in health. PMID:10063662

  18. Your Child's Weight

    MedlinePlus

    ... spurts in height and weight gain in both boys and girls. Once these changes start, they continue for several ... or obese . Different BMI charts are used for boys and girls under the age of 20 because the amount ...

  19. Weight Gain during Pregnancy

    MedlinePlus

    ... Global Map Premature birth report card Careers Archives Pregnancy Before or between pregnancies Nutrition, weight & fitness Prenatal ... Zika virus and pregnancy Microcephaly Medicine safety and pregnancy Birth defects prevention Learn how to help reduce ...

  20. Correctly Expressing Atomic Weights

    NASA Astrophysics Data System (ADS)

    Paolini, Moreno; Cercignani, Giovanni; Bauer, Carlo

    2000-11-01

    Very often, atomic or molecular weights are expressed as dimensionless quantities, but although the historical importance of their definition as "pure numbers" is acknowledged, it is inconsistent with experimental formulas and with the theory of measure in general. Here, we propose on the basis of clear-cut formulas that, contrary to customary statements, atomic and molecular weights should be expressed as dimensional quantities (masses) in which the Dalton (= 1.663 x 10-24 g) is taken as the unit.

  1. Exercise and weight control.

    PubMed

    Stefanick, M L

    1993-01-01

    Several important questions need to be answered to increase the likelihood that exercise will be accepted by the millions in the population who are obese. What is the minimum exercise "dose" (intensity, duration, frequency) and what is the optimal mode to bring about substantial fat weight loss, with minimal loss of lean mass? What is the best nutritional plan to optimize fat utilization during exercise, without impairing performance or loss of lean mass? Which diet and exercise programs maximally increase utilization of centrally deposited fat and how can hyperplastic obesity best be treated? Also of interest is the potential role of resistance exercise for weight loss, and the predictors of weight loss success. For instance, do individuals with gynoid obesity really differ from individuals with android obesity in their utilization and loss of body fat during exercise? The potential advantages of exercise include: stimulation of fat as opposed to carbohydrate oxidation; increased energy use during the exercise itself and in the postexercise period; protection of lean body mass; possible reversal of the diet-induced suppression of BMR; and other health benefits. Among other parameters, the effectiveness of exercise on weight loss may be influenced by the type, intensity, frequency, and duration of exercise bouts and the duration of the training program, the nature of the excess fat stores, i.e., whether the person has obesity characterized by hyperplastic or hypertrophic adipose tissue or central (with large-intra-abdominal depot) or peripheral obesity, the composition and caloric content of the diet, and behavioral aspects that affect adherence to the program. With respect to this latter concern, even if a person has been very successful at weight loss in a metabolic ward or intensive program, he/she must eventually return to the outside world and figure out for himself/herself how to eat real food and/or maintain an activity level that promotes weight maintenance

  2. Teachers' Reflections on Pedagogies that Enhance Learning in an Online Course on Teaching for Equity and Social Justice

    ERIC Educational Resources Information Center

    Ukpokodu, Omiunota Nelly

    2010-01-01

    This study investigated teachers' reflective perspectives on pedagogies that enhance learning in an online course on "Teaching for equity and social justice" in a teacher education program. Data were collected from survey, alternative anonymous course assessment, interview, and document analysis. Participants identified threaded discussions,…

  3. An Attempt to Shorten the Quest for Weight Loss Predictors.

    ERIC Educational Resources Information Center

    Black, David R.; And Others

    Health psychologists continue to have difficulty identifying prognostic indicators of weight loss success. Psychological, social, and demographic factors have been examined, but correlations with weight loss are disappointing. Actual behaviors or quantifications of specific actions and historical measures were examined for their validity in…

  4. Diet pills, powders, and liquids: predictors of use by healthy weight females.

    PubMed

    Thorlton, Janet; Park, Chang; Hughes, Tonda

    2014-04-01

    About 35% of healthy weight adolescent females describe themselves as overweight, and 66% report planning to lose weight.Body weight dissatisfaction is associated with unhealthy weight loss practices including diet pill/powder/liquid (PPL) use. Few studies have examined diet PPL use in healthy weight adolescent females; therefore, Youth Risk Behavior Survey data (n =247) were analyzed to identify predictors of use. Descriptive statistics and logistic regression analyses were conducted using Statistical Package for the Social Sciences Complex Samples software. Social cognitive theory served as the framework guiding the analysis. Approximately 8% of healthy weight females reported using diet PPL for weight loss. Describing self as overweight, planning to lose weight, being offered drugs at school, fasting to lose weight, cigarette/alcohol use, vomiting, and laxative use were significantly associated (p < .05) with diet PPL use. Health professionals, including school nurses, must assess for unhealthy weight loss practices in healthy weight females, in order to adequately address related issues.

  5. Lorcaserin for weight management

    PubMed Central

    Taylor, James R; Dietrich, Eric; Powell, Jason

    2013-01-01

    Type 2 diabetes and obesity commonly occur together. Obesity contributes to insulin resistance, a main cause of type 2 diabetes. Modest weight loss reduces glucose, lipids, blood pressure, need for medications, and cardiovascular risk. A number of approaches can be used to achieve weight loss, including lifestyle modification, surgery, and medication. Lorcaserin, a novel antiobesity agent, affects central serotonin subtype 2A receptors, resulting in decreased food intake and increased satiety. It has been studied in obese patients with type 2 diabetes and results in an approximately 5.5 kg weight loss, on average, when used for one year. Headache, back pain, nasopharyngitis, and nausea were the most common adverse effects noted with lorcaserin. Hypoglycemia was more common in the lorcaserin groups in the clinical trials, but none of the episodes were categorized as severe. Based on the results of these studies, lorcaserin was approved at a dose of 10 mg twice daily in patients with a body mass index ≥30 kg/m2 or ≥27 kg/m2 with at least one weight-related comorbidity, such as hypertension, type 2 diabetes mellitus, or dyslipidemia, in addition to a reduced calorie diet and increased physical activity. Lorcaserin is effective for weight loss in obese patients with and without type 2 diabetes, although its specific role in the management of obesity is unclear at this time. This paper reviews the clinical trials of lorcaserin, its use from the patient perspective, and its potential role in the treatment of obesity. PMID:23788837

  6. Microbiological examination of ready-to-eat burgers sampled anonymously at the point of sale in the United Kingdom.

    PubMed

    Little, C L; Gillespie, I A; Mitchell, R T

    2001-12-01

    During May and June 1999 a microbiological study of ready-to-eat burgers purchased anonymously from burger outlets (combined take-away and burger restaurants, take-away-only fixed premises, mobile vendors, temporary stalls and other burger outlets) was undertaken. The intention was to determine the microbiological quality of ready-to-eat burgers as purchased by customers of take-away premises and to ascertain, where information was available, whether the Chief Medical Officer's advice on cooking burgers was being followed. Examination of 3,128 ready-to-eat burgers found that 2,868 (92%) were of acceptable quality and 260 (8%) were of unsatisfactory quality. Unsatisfactory results were mostly due to high aerobic colony counts (ACCs). Salmonella spp., Campylobacter spp. and Escherichia coli O157 were not detected in any of the samples examined. Acceptable microbiological quality of ready-to-eat burgers was associated with outlets, such as combined take-away and burger restaurants and in particular national franchise outlets, which had management food hygiene training and hazard analysis in place. Poor microbiological quality was associated with undercooking and local outlets as indicated by Local Authority Inspectors' Consumers at Risk scores. PMID:12109398

  7. How anonymous is ‘anonymous’? Some suggestions towards a coherent universal coding system for genetic samples

    PubMed Central

    Schmidt, Harald; Callier, Shawneequa

    2012-01-01

    So-called ‘anonymous’ tissue samples are widely used in research. Because they lack externally identifying information, they are viewed as useful in reconciling conflicts between the control, privacy and confidentiality interests of those from whom the samples originated and the public (or commercial) interest in carrying out research, as reflected in ‘consent or anonymise’ policies. High level guidance documents suggest that withdrawal of consent and samples and the provision of feedback are impossible in the case of anonymous samples. In view of recent developments in science and consumer-driven genomics the authors argue that such statements are misleading and only muddle complex ethical questions about possible entitlements to control over samples. The authors therefore propose that terms such as ‘anonymised’, ‘anonymous’ or ‘non-identifiable’ be removed entirely from documents describing research samples, especially from those aimed at the public. This is necessary as a matter of conceptual clarity and because failure to do so may jeopardise public trust in the governance of large scale databases. As there is wide variation in the taxonomy for tissue samples and no uniform national or international standards, the authors propose that a numeral-based universal coding system be implemented that focuses on specifying incremental levels of identifiability, rather than use terms that imply that the reidentification of research samples and associated actions are categorically impossible. PMID:22345546

  8. The limits of evidence: evidence based policy and the removal of gamete donor anonymity in the UK.

    PubMed

    Frith, Lucy

    2015-03-01

    This paper will critically examine the use of evidence in creating policy in the area of reproductive technologies. The use of evidence in health care and policy is not a new phenomenon. However, codified strategies for evidence appraisal in health care technology assessments and attempts to create evidence based policy initiatives suggest that the way evidence is used in practice and policy has changed. This paper will examine this trend by considering what is counted as 'good' evidence, difficulties in translating evidence into policy and practice and how evidence interacts with principles. To illustrate these points the removal of gamete donor anonymity in the UK in 2005 and the debates that preceded this change in the law will be examined. It will be argued that evidence will only ever take us so far and attention should also be paid to the underlying principles that guide policy. The paper will conclude with suggestions for how underlying principles can be more rigorously used in policy formation. PMID:25743050

  9. Smoking Cessation and Weight Gain.

    ERIC Educational Resources Information Center

    Hall, Sharon M.; And Others

    1986-01-01

    Investigated determinants of weight gain after quitting smoking in two smoking treatment outcome studies. Results indicated abstinence resulted in weight gain, and postquitting weight gain was predicted by pretreatment tobacco use, a history of weight problems, and eating patterns. Relapse to smoking did not follow weight gain. (Author/BL)

  10. Weight for Stephen Finlay.

    PubMed

    Evers, Daan

    2013-04-01

    According to Stephen Finlay, 'A ought to X' means that X-ing is more conducive to contextually salient ends than relevant alternatives. This in turn is analysed in terms of probability. I show why this theory of 'ought' is hard to square with a theory of a reason's weight which could explain why 'A ought to X' logically entails that the balance of reasons favours that A X-es. I develop two theories of weight to illustrate my point. I first look at the prospects of a theory of weight based on expected utility theory. I then suggest a simpler theory. Although neither allows that 'A ought to X' logically entails that the balance of reasons favours that A X-es, this price may be accepted. For there remains a strong pragmatic relation between these claims. PMID:23576822

  11. Light weight phosphate cements

    DOEpatents

    Wagh, Arun S.; Natarajan, Ramkumar,; Kahn, David

    2010-03-09

    A sealant having a specific gravity in the range of from about 0.7 to about 1.6 for heavy oil and/or coal bed methane fields is disclosed. The sealant has a binder including an oxide or hydroxide of Al or of Fe and a phosphoric acid solution. The binder may have MgO or an oxide of Fe and/or an acid phosphate. The binder is present from about 20 to about 50% by weight of the sealant with a lightweight additive present in the range of from about 1 to about 10% by weight of said sealant, a filler, and water sufficient to provide chemically bound water present in the range of from about 9 to about 36% by weight of the sealant when set. A porous ceramic is also disclosed.

  12. Generalized constructive tree weights

    SciTech Connect

    Rivasseau, Vincent E-mail: adrian.tanasa@ens-lyon.org; Tanasa, Adrian E-mail: adrian.tanasa@ens-lyon.org

    2014-04-15

    The Loop Vertex Expansion (LVE) is a quantum field theory (QFT) method which explicitly computes the Borel sum of Feynman perturbation series. This LVE relies in a crucial way on symmetric tree weights which define a measure on the set of spanning trees of any connected graph. In this paper we generalize this method by defining new tree weights. They depend on the choice of a partition of a set of vertices of the graph, and when the partition is non-trivial, they are no longer symmetric under permutation of vertices. Nevertheless we prove they have the required positivity property to lead to a convergent LVE; in fact we formulate this positivity property precisely for the first time. Our generalized tree weights are inspired by the Brydges-Battle-Federbush work on cluster expansions and could be particularly suited to the computation of connected functions in QFT. Several concrete examples are explicitly given.

  13. Weight management in Ramadan.

    PubMed

    Sethi, Bipin Kumar; Nagesh, V Sri

    2015-05-01

    Ramadan fasting is associated with significant weight loss in both men and women. Reduction in blood pressure, lipids, blood glucose, body mass index and waist and hip circumference may also occur. However, benefits accrued during this month often reverse within a few weeks of cessation of fasting, with most people returning back to their pre-Ramadan body weights and body composition. To ensure maintenance of this fasting induced weight loss, health care professionals should encourage continuation of healthy dietary habits, moderate physical activity and behaviour modification, even after conclusion of fasting. It should be realized that Ramadan is an ideal platform to target year long lifestyle modification, to ensure that whatever health care benefits have been gained during this month, are perpetuated.

  14. Increases in New Social Network Ties are Associated with Increased Cohesion among Intervention Participants

    PubMed Central

    Gesell, Sabina B.; Barkin, Shari L.; Sommer, Evan C.; Thompson, Jessica R.; Valente, Thomas W.

    2016-01-01

    Objective Many behavior change programs are delivered in group settings to manage implementation costs and to foster support and interactions among group members to facilitate behavior change. Understanding the group dynamics that evolve in group settings (e.g., weight management, Alcoholics Anonymous) is important, yet rarely measured. This paper examined the relationship between social network ties and group cohesion in a group-based intervention to prevent obesity in children. Method The data reported are process measures from an ongoing community-based randomized controlled trial. 305 parents with a child (3-6 years) at risk of developing obesity were assigned to an intervention that taught parents healthy lifestyles. Parents met weekly for 12 weeks in small consistent groups. Two measures were collected at weeks 3 and 6: a social network survey (people in the group with whom one discusses healthy lifestyles); and the validated Perceived Cohesion Scale (Bollen & Hoyle, 1990). We used lagged random and fixed effects regression models to analyze the data. Results Cohesion increased from 6.51 to 6.71 (t=4.4, p<0.01). Network nominations tended to increase over the 3-week period in each network. In the combined discussion and advice network, the number of nominations increased from 1.76 to 1.95 (z=2.59, p<0.01). Cohesion at week 3 was the strongest predictor of cohesion at week 6 (b=0.55, p<0.01). Number of new network nominations at week 6 was positively related to cohesion at week 6 (b=0.06, p<.01). In sum, being able to name new network contacts was associated with feelings of cohesion. Conclusion This is the first study to demonstrate how network changes affect perceived group cohesion within a behavioral intervention. Given that many behavioral interventions occur in group settings, intentionally building new social networks could be promising to augment desired outcomes. PMID:26286298

  15. Weighted Uncertainty Relations

    PubMed Central

    Xiao, Yunlong; Jing, Naihuan; Li-Jost, Xianqing; Fei, Shao-Ming

    2016-01-01

    Recently, Maccone and Pati have given two stronger uncertainty relations based on the sum of variances and one of them is nontrivial when the quantum state is not an eigenstate of the sum of the observables. We derive a family of weighted uncertainty relations to provide an optimal lower bound for all situations and remove the restriction on the quantum state. Generalization to multi-observable cases is also given and an optimal lower bound for the weighted sum of the variances is obtained in general quantum situation. PMID:26984295

  16. Maternal Stress Predicts Postpartum Weight Retention

    PubMed Central

    Whitaker, Kara; Vernon, Marlo; Wilcox, Sara

    2014-01-01

    Postpartum weight retention (PPWR) is a significant contributor to the development of overweight and obesity in women of childbearing age. Stress may be a key mechanism making it more difficult for mothers to lose weight in the year following delivery. The aim of this study was to assess whether specific aspects of parenting stress and life stress influence postpartum weight retention in new mothers. Women in late pregnancy or up to 2 months postpartum (n = 123) were enrolled in the study and followed through the first year postpartum. Linear regression models evaluated the associations of parenting stress (isolation, attachment and depressive symptoms) as well as overall life stress at 2, 6, and 12 months postpartum with PPWR at 6 and 12 months. During the first year postpartum, higher depression and life stress were significantly associated with greater PPWR. As the effect of depression diminished, the effect of life stress became significant. Contrary to hypothesized relationships, fewer problems with attachment and less social isolation were significantly associated with greater PPWR. Higher gestational weight gain and African American race were also significantly associated with greater PPWR at both 6 and 12 months. Different types of stress predict weight retention in first time mothers during the first year postpartum. Understanding the relationships between parenting stress, concurrent life stress and PPWR can enhance the development of future interventions that specifically target self-identified stressors, leading to improved weight related outcomes. PMID:24760321

  17. Aim For a Healthy Weight

    MedlinePlus

    ... oxygen into energy), and behavior or habits. Energy Balance Energy balance is important for maintaining a healthy weight. The ... OUT over time = weight stays the same (energy balance) More energy IN than OUT over time = weight ...

  18. Diet for rapid weight loss

    MedlinePlus

    ... diet; VLCD; Low-calorie diet; LCD; Very low energy diet; Weight loss - rapid weight loss; Overweight - rapid ... AM, Aveyard P. Clinical effectiveness of very-low-energy diets in the management of weight loss: a ...

  19. Weight and Diabetes (For Parents)

    MedlinePlus

    ... Things to Know About Zika & Pregnancy Weight and Diabetes KidsHealth > For Parents > Weight and Diabetes Print A ... or type 2 diabetes. Weight and Type 1 Diabetes Undiagnosed or untreated, type 1 diabetes can make ...

  20. Group Colocation Behavior in Technological Social Networks

    PubMed Central

    Brown, Chloë; Lathia, Neal; Mascolo, Cecilia; Noulas, Anastasios; Blondel, Vincent

    2014-01-01

    We analyze two large datasets from technological networks with location and social data: user location records from an online location-based social networking service, and anonymized telecommunications data from a European cellphone operator, in order to investigate the differences between individual and group behavior with respect to physical location. We discover agreements between the two datasets: firstly, that individuals are more likely to meet with one friend at a place they have not visited before, but tend to meet at familiar locations when with a larger group. We also find that groups of individuals are more likely to meet at places that their other friends have visited, and that the type of a place strongly affects the propensity for groups to meet there. These differences between group and solo mobility has potential technological applications, for example, in venue recommendation in location-based social networks. PMID:25148037

  1. Weighted multiplex networks.

    PubMed

    Menichetti, Giulia; Remondini, Daniel; Panzarasa, Pietro; Mondragón, Raúl J; Bianconi, Ginestra

    2014-01-01

    One of the most important challenges in network science is to quantify the information encoded in complex network structures. Disentangling randomness from organizational principles is even more demanding when networks have a multiplex nature. Multiplex networks are multilayer systems of [Formula: see text] nodes that can be linked in multiple interacting and co-evolving layers. In these networks, relevant information might not be captured if the single layers were analyzed separately. Here we demonstrate that such partial analysis of layers fails to capture significant correlations between weights and topology of complex multiplex networks. To this end, we study two weighted multiplex co-authorship and citation networks involving the authors included in the American Physical Society. We show that in these networks weights are strongly correlated with multiplex structure, and provide empirical evidence in favor of the advantage of studying weighted measures of multiplex networks, such as multistrength and the inverse multiparticipation ratio. Finally, we introduce a theoretical framework based on the entropy of multiplex ensembles to quantify the information stored in multiplex networks that would remain undetected if the single layers were analyzed in isolation.

  2. Weight Training Adds Up.

    ERIC Educational Resources Information Center

    Nutter, June

    1995-01-01

    Secondary level physical education teachers can have their students use math concepts while working out on the weight-room equipment. The article explains how students can reinforce math skills while weightlifting by estimating their strength, estimating their power, or calculating other formulas. (SM)

  3. Implicit Bias about Weight and Weight Loss Treatment Outcomes

    PubMed Central

    Carels, Robert A; Hinman, Nova G; Hoffmann, Debra A; Burmeister, Jacob M; Borushok, Jessica E.; Marx, Jenna M; Ashrafioun, Lisham

    2014-01-01

    Objectives The goal of the current study was to examine the impact of a weight loss intervention on implicit bias toward weight, as well as the relationship among implicit bias, weight loss behaviors, and weight loss outcomes. Additionally, of interest was the relationship among these variables when implicit weight bias was measured with a novel assessment that portrays individuals who are thin and obese engaged in both stereotypical and nonstereotypical health-related behaviors. Methods Implicit weight bias (stereotype consistent and stereotype inconsistent), binge eating, self-monitoring, and body weight were assessed among weight loss participants at baseline and post-treatment (N=44) participating in two weight loss programs. Results Stereotype consistent bias significantly decreased from baseline to post-treatment. Greater baseline stereotype consistent bias was associated with lower binge eating and greater self-monitoring. Greater post-treatment stereotype consistent bias was associated with greater percent weight loss. Stereotype inconsistent bias did not change from baseline to post-treatment and was generally unrelated to outcomes. Conclusion Weight loss treatment may reduce implicit bias toward overweight individuals among weight loss participants. Higher post-treatment stereotype consistent bias was associated with a higher percent weight loss, possibly suggesting that losing weight may serve to maintain implicit weight bias. Alternatively, great implicit weight bias may identify individuals motivated to make changes necessary for weight loss. PMID:25261809

  4. Group membership and social identity in addiction recovery.

    PubMed

    Buckingham, Sarah A; Frings, Daniel; Albery, Ian P

    2013-12-01

    Despite a growing interest in how group membership can positively impact health, little research has addressed directly the role social identity processes can have on recovery from addiction. Drawing on social identity theory and self-categorization theory, the present study investigated how recovery group membership can introduce a new social identity associated with recovery, compared to the social identity associated with addiction. We hypothesized that two processes--evaluative differentiation and identity preference--would be linked with higher self-efficacy and positive health outcomes (i.e., reduced relapse, lower levels of appetitive behavior, and elevated feelings of social connectedness [Study 2]). Study 1 recruited members (N = 61) from United Kingdom based mutual aid groups of Alcoholics Anonymous and Narcotics Anonymous. Study 2 recruited ex-smokers (N = 81) from online sources. In Study 1, evaluative differentiation was significantly related to lowered relapse and reduced appetitive behavior. Identity preference was related to higher levels of self-efficacy, which was related to months drug-free and reduced levels of appetitive behaviors. In Study 2, evaluative differentiation was related to identity preference. Identity preference was also related to higher self-efficacy, which in turn was related to lower relapse. Although exploratory, these results suggest that developing a social identity as a "recovering addict" or an "ex-smoker" and subsequently highlighting the difference between such identities may be a useful strategy for reducing relapse among people with problems associated with addictive behaviors.

  5. Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis

    NASA Astrophysics Data System (ADS)

    Wang, Qing-le; Zhang, Ke-jia

    2015-01-01

    Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for n participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements.

  6. The architecture of complex weighted networks

    PubMed Central

    Barrat, A.; Barthélemy, M.; Pastor-Satorras, R.; Vespignani, A.

    2004-01-01

    Networked structures arise in a wide array of different contexts such as technological and transportation infrastructures, social phenomena, and biological systems. These highly interconnected systems have recently been the focus of a great deal of attention that has uncovered and characterized their topological complexity. Along with a complex topological structure, real networks display a large heterogeneity in the capacity and intensity of the connections. These features, however, have mainly not been considered in past studies where links are usually represented as binary states, i.e., either present or absent. Here, we study the scientific collaboration network and the world-wide air-transportation network, which are representative examples of social and large infrastructure systems, respectively. In both cases it is possible to assign to each edge of the graph a weight proportional to the intensity or capacity of the connections among the various elements of the network. We define appropriate metrics combining weighted and topological observables that enable us to characterize the complex statistical properties and heterogeneity of the actual strength of edges and vertices. This information allows us to investigate the correlations among weighted quantities and the underlying topological structure of the network. These results provide a better description of the hierarchies and organizational principles at the basis of the architecture of weighted networks. PMID:15007165

  7. Do women differ from men on Alcoholics Anonymous participation and abstinence? A multi-wave analysis of treatment seekers

    PubMed Central

    Delucchi, Kevin

    2011-01-01

    Background Given the widespread use of Alcoholics Anonymous (AA) and other similar groups in the US and the increasing membership of women, the present paper compares women to men on their meeting attendance and AA-prescribed behaviors, factors associated with that AA participation, and tests how these relate to women’s and men’s abstinence across time. Methods All consecutive new admissions (age ≥ 18) from county-wide public and private alcohol and drug treatment programs representing the larger population of treatment seekers were approached to be in the study at treatment entry. Those consenting at baseline (n = 926) were sought for follow-up interviews 1, 3, 5 and 7 years later. Generalized linear models were used to test whether various help-seeking factors associated with AA participation differentially by gender and, controlling for AA and other confounders, whether women differ from men on abstinence. Results At each follow-up interview, women and men attended AA at similar rates and similarly practiced specific AA-behaviors, and they were alike on most factors associated with AA participation and abstention across time including abstinence goal, drink volume, negative consequences, prior treatment, and encouragement to reduce drinking. Relative to men, women with higher ASI drug severity were less likely to participate in AA. Though higher AA participation was a predictor of abstinence for both genders, males were less likely to be abstinent across time. Men were also more likely to reduce their AA participation across time. Conclusion These findings add to an emerging literature on how women compare to men on factors related to AA participation and subsequent drinking outcomes across time. Findings have clinical implications for service providers referring clients to such groups. PMID:21689121

  8. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID

  9. Mechanisms of Behavior Change in Alcoholics Anonymous: Does AA lead to better alcohol use outcomes by reducing depression symptoms?

    PubMed Central

    Kelly, John F.; Stout, Robert L.; Magill, Molly; Tonigan, J. Scott; Pagano, Maria E.

    2009-01-01

    Rationale Indices of negative affect, such as depression, have been implicated in stress-induced pathways to alcohol relapse. Empirically-supported continuing care resources, such as Alcoholics Anonymous (AA), emphasize reducing negative affect to reduce relapse risk, but little research has been conducted to examine putative affective mechanisms of AA’s effects. Method Using lagged, controlled, hierarchical linear modeling and mediational analyses this study investigated whether AA participation mobilized changes in depression symptoms and whether such changes explained subsequent reductions in alcohol use. Alcohol dependent adults (N = 1,706), receiving treatment as part of a clinical trial, were assessed at intake, 3, 6, 9, 12, and 15 months. Results Findings revealed elevated levels of depression compared to the general population, which decreased during treatment and then remained stable over follow-up. Greater AA attendance was associated with better subsequent alcohol use outcomes and decreased depression. Greater depression was associated with heavier and more frequent drinking. Lagged, mediation analyses revealed that the effects of AA on alcohol use was partially mediated by reductions in depression symptoms. However, this salutary effect on depression itself appeared to be explained by AA’s proximal effect on reducing concurrent drinking. Conclusions AA attendance was both concurrently and predictively associated with improved alcohol outcomes. Although AA attendance was additionally associated with subsequent improvements in depression, it did not predict such improvements over and above concurrent alcohol use. AA appears to lead both to improvements in alcohol use and psychological and emotional well-being, which, in turn, may reinforce further abstinence and recovery-related change. PMID:20102345

  10. The Weight of a Guilty Conscience: Subjective Body Weight as an Embodiment of Guilt

    PubMed Central

    Day, Martin V.; Bobocel, D. Ramona

    2013-01-01

    Guilt is an important social and moral emotion. In addition to feeling unpleasant, guilt is metaphorically described as a “weight on one's conscience.” Evidence from the field of embodied cognition suggests that abstract metaphors may be grounded in bodily experiences, but no prior research has examined the embodiment of guilt. Across four studies we examine whether i) unethical acts increase subjective experiences of weight, ii) feelings of guilt explain this effect, and iii) whether there are consequences of the weight of guilt. Studies 1–3 demonstrated that unethical acts led to more subjective body weight compared to control conditions. Studies 2 and 3 indicated that heightened feelings of guilt mediated the effect, whereas other negative emotions did not. Study 4 demonstrated a perceptual consequence. Specifically, an induction of guilt affected the perceived effort necessary to complete tasks that were physical in nature, compared to minimally physical tasks. PMID:23936041

  11. Weight stigma is stressful. A review of evidence for the Cyclic Obesity/Weight-Based Stigma model.

    PubMed

    Tomiyama, A Janet

    2014-11-01

    Weight stigma is highly pervasive, but its consequences are understudied. This review draws from theory in social psychology, health psychology, and neuroendocrinology to construct an original, generative model called the cyclic obesity/weight-based stigma (COBWEBS) model. This model characterizes weight stigma as a "vicious cycle" - a positive feedback loop wherein weight stigma begets weight gain. This happens through increased eating behavior and increased cortisol secretion governed by behavioral, emotional, and physiological mechanisms, which are theorized to ultimately result in weight gain and difficulty of weight loss. The purpose of this review is to evaluate the existing literature for evidence supporting such a model, propose ways in which individuals enter, fight against, and exit the cycle, and conclude by outlining fruitful future directions in this nascent yet important area of research.

  12. Heterogeneous edge weights promote epidemic diffusion in weighted evolving networks

    NASA Astrophysics Data System (ADS)

    Duan, Wei; Song, Zhichao; Qiu, Xiaogang

    2016-08-01

    The impact that the heterogeneities of links’ weights have on epidemic diffusion in weighted networks has received much attention. Investigating how heterogeneous edge weights affect epidemic spread is helpful for disease control. In this paper, we study a Reed-Frost epidemic model in weighted evolving networks. Our results indicate that a higher heterogeneity of edge weights leads to higher epidemic prevalence and epidemic incidence at earlier stage of epidemic diffusion in weighted evolving networks. In addition, weighted evolving scale-free networks come with a higher epidemic prevalence and epidemic incidence than unweighted scale-free networks.

  13. Anonymous authenticated communications

    DOEpatents

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  14. An Anonymous Referee Report

    SciTech Connect

    Tobin, J. G.

    2015-06-08

    This is a combined experimental and theoretical study of the compound UO2, UO2(NO3)2(H20)6 and UO0.75Pu0.25O2, using resonant inelastic x-ray scattering (RXIS), high resolution x-ray absorption (XAS) and LDA and LDA-U calculations.

  15. Anonymity Builds Artistic Confidence

    ERIC Educational Resources Information Center

    Lane, Susan L.

    2012-01-01

    The fear of embarrassment in middle- and high-school students often inhibits their attempts at drawing realistically. Many find it difficult to reproduce what they see accurately, and as a result, complain, act out or refuse to do the task in order to save face. In this article, the author describes a lesson that does three things: (1) it attempts…

  16. The Dangers of Anonymity

    ERIC Educational Resources Information Center

    Plagens, Peter

    2008-01-01

    Back in the 1970s, when the author was an art professor at California State University at Northridge, he had a colleague who absolutely would not say anything about anybody that he would not say to that person's face. Marvin Harden, the African-American artist, originally came to Los Angeles in the late 1950s from segregated Austin, Texas, to play…

  17. Reducing rotor weight

    SciTech Connect

    Cheney, M.C.

    1997-12-31

    The cost of energy for renewables has gained greater significance in recent years due to the drop in price in some competing energy sources, particularly natural gas. In pursuit of lower manufacturing costs for wind turbine systems, work was conducted to explore an innovative rotor designed to reduce weight and cost over conventional rotor systems. Trade-off studies were conducted to measure the influence of number of blades, stiffness, and manufacturing method on COE. The study showed that increasing number of blades at constant solidity significantly reduced rotor weight and that manufacturing the blades using pultrusion technology produced the lowest cost per pound. Under contracts with the National Renewable Energy Laboratory and the California Energy Commission, a 400 kW (33m diameter) turbine was designed employing this technology. The project included tests of an 80 kW (15.5m diameter) dynamically scaled rotor which demonstrated the viability of the design.

  18. Weighted guided image filtering.

    PubMed

    Li, Zhengguo; Zheng, Jinghong; Zhu, Zijian; Yao, Wei; Wu, Shiqian

    2015-01-01

    It is known that local filtering-based edge preserving smoothing techniques suffer from halo artifacts. In this paper, a weighted guided image filter (WGIF) is introduced by incorporating an edge-aware weighting into an existing guided image filter (GIF) to address the problem. The WGIF inherits advantages of both global and local smoothing filters in the sense that: 1) the complexity of the WGIF is O(N) for an image with N pixels, which is same as the GIF and 2) the WGIF can avoid halo artifacts like the existing global smoothing filters. The WGIF is applied for single image detail enhancement, single image haze removal, and fusion of differently exposed images. Experimental results show that the resultant algorithms produce images with better visual quality and at the same time halo artifacts can be reduced/avoided from appearing in the final images with negligible increment on running times. PMID:25415986

  19. Gain weighted eigenspace assignment

    NASA Technical Reports Server (NTRS)

    Davidson, John B.; Andrisani, Dominick, II

    1994-01-01

    This report presents the development of the gain weighted eigenspace assignment methodology. This provides a designer with a systematic methodology for trading off eigenvector placement versus gain magnitudes, while still maintaining desired closed-loop eigenvalue locations. This is accomplished by forming a cost function composed of a scalar measure of error between desired and achievable eigenvectors and a scalar measure of gain magnitude, determining analytical expressions for the gradients, and solving for the optimal solution by numerical iteration. For this development the scalar measure of gain magnitude is chosen to be a weighted sum of the squares of all the individual elements of the feedback gain matrix. An example is presented to demonstrate the method. In this example, solutions yielding achievable eigenvectors close to the desired eigenvectors are obtained with significant reductions in gain magnitude compared to a solution obtained using a previously developed eigenspace (eigenstructure) assignment method.

  20. Light weight aluminum optics

    NASA Astrophysics Data System (ADS)

    Catura, R. C.; Vieira, J. R.

    1985-09-01

    Light weight mirror blanks were fabricated by dip-brazing a core of low mass aluminum foam material to thin face sheets of solid aluminum. The blanks weigh 40% of an equivalent size solid mirror and were diamond turned to provide reflective surfaces. Optical interferometry was used to assess their dimensional stability over 7 months. No changes in flatness are observed (to the sensitivity of the measurements of a half wavelength of red light).