Science.gov

Sample records for anonymous hiv workplace

  1. Anonymous HIV workplace surveys as an advocacy tool for affordable private health insurance in Namibia

    PubMed Central

    2009-01-01

    Background With an estimated adult HIV prevalence of 15%, Namibia is in need of innovative health financing strategies that can alleviate the burden on the public sector. Affordable and private health insurances were recently developed in Namibia, and they include coverage for HIV/AIDS. This article reports on the efficacy of HIV workplace surveys as a tool to increase uptake of these insurances by employees in the Namibian formal business sector. In addition, the burden of HIV among this population was examined by sector. Methods Cross-sectional anonymous HIV prevalence surveys were conducted in 24 private companies in Namibia between November 2006 and December 2007. Non-invasive oral fluid-based HIV antibody rapid tests were used. Anonymous test results were provided to the companies in a confidential report and through presentations to their management, during which the advantages of affordable private health insurance and the available insurance products were discussed. Impact assessment was conducted in October 2008, when new health insurance uptake by these companies was evaluated. Results Of 8500 targeted employees, 6521 were screened for HIV; mean participation rate was 78.6%. Overall 15.0% (95% CI 14.2-15.9%) of employees tested HIV positive (range 3.0-23.9% across companies). The mining sector had the highest percentage of HIV-positive employees (21.0%); the information technology (IT) sector had the lowest percentage (4.0%). Out of 6205 previously uninsured employees, 61% had enrolled in private health insurance by October 2008. The majority of these new insurances (78%) covered HIV/AIDS only. Conclusion The proportion of HIV-positive formal sector employees in Namibia is in line with national prevalence estimates and varies widely by employment sector. Following the surveys, there was a considerable increase in private health insurance uptake. This suggests that anonymous HIV workplace surveys can serve as a tool to motivate private companies to provide

  2. HIV disclosure in the workplace.

    PubMed

    Degroote, S; Vogelaers, D; Koeck, R; Borms, R; De Meulemeester, L; Vandijck, D

    2014-06-01

    As HIV is currently a chronic and manageable disease, an increasing amount of people living with HIV (PLHIV) are (again) active on the labour market. Since research on this topic is scarce, this study aimed to explore experiences of PLHIV in the workplace, especially concerning disclosure and adherence to antiretroviral therapy. A questionnaire was developed and validated in collaboration with Sensoa (Flemish expertise centre for sexual health) and participants were recruited using flyers and announcements on websites. A total of 54 PLHIV completed the questionnaire, among whom 50 (92·6%) males. Half of the participants did not disclose their HIV status in the workplace, mostly due to being afraid of social or professional consequences. Those who disclosed, reported no changes in the workplace or even reported receiving more empathy. A minority of participants have to take antiretroviral medication at work and they reported no particular problems related to medication intake. Despite improved solidarity and information campaigns, many PLHIV still do not disclose their HIV status in the workplace, most frequently due to fear for discrimination. More actions are warranted, as well as addressing possible self-stigma. Adherence to antiretroviral therapy in the workplace posed little or no problems.

  3. Anonymous HIV testing: the impact of availability on demand in Arizona.

    PubMed Central

    Hirano, D; Gellert, G A; Fleming, K; Boyd, D; Englender, S J; Hawks, H

    1994-01-01

    The purpose of this study was to evaluate the impact of anonymous testing availability on human immunodeficiency virus (HIV) test demand in Arizona. Testing patterns before and after the introduction of anonymous testing were compared. Client knowledge of new test policy and delay in testing until an anonymous option was available were assessed. Test numbers among men who have sex with men showed a statistically significant increase after introduction of an anonymous testing option. Arizona continues to maintain anonymous testing availability. Public health agencies should consider how test policy may influence people's HIV test decisions. PMID:7998649

  4. Eliminating access to anonymous HIV antibody testing in North Carolina: effects on HIV testing and partner notification.

    PubMed

    Kassler, W J; Meriwether, R A; Klimko, T B; Peterman, T A; Zaidi, A

    1997-03-01

    Anonymous HIV testing may attract persons who might otherwise not be tested but may hinder partner notification. We evaluated the effects on North Carolina's HIV testing and partner notification programs of policy changes that eliminated and later restored anonymous testing in 82 counties. We used an interrupted time-series design to compare counties eliminating with counties retaining anonymous testing. We analyzed HIV testing and partner notification data from before, during, and after elimination of anonymous testing. After elimination of anonymous testing in 82 counties, the mean monthly level of testing (+/- SE) increased by 45%, or 548 (+/- 123) tests per month, while in 18 counties that retained anonymous testing, there was a 63% increase, or 802 (+/- 162) tests per month (p > .05). Among men of all races, testing increased by 16%, or 155 (+/- 35) tests per month, in counties that eliminated anonymous testing; and by 51%, or 305 (+/- 42) tests per month (p < .05), in counties that retained anonymous testing. After elimination of anonymous testing, both county types experienced similar increases in the rate of partners notified. However, partner notification was more successful if the index patient was tested confidentially; 2.7 times as many partners per index patient were notified and counseled. There was no effect on testing or on partner notification rates following restoration of anonymous testing. Substantial community opposition to eliminating anonymous testing was encountered. The policy change appeared to result in a slight decrease in testing among men and a slight increase in partners notified. Programs considering the elimination of anonymous testing should weigh these potential gains and losses, as well as the impact on relationships between the public health and advocacy communities

  5. Home Economists in the Workplace: Formulating HIV/AIDS Policy.

    ERIC Educational Resources Information Center

    Stanberry, Anne M.

    1991-01-01

    Reviews facts about human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS), HIV transmission, and prevention of HIV/AIDS; discusses risks for contracting HIV; reviews relevant legislation regarding the rights of employees, employers, and consumers; describes HIV/AIDS workplace policies and procedures; and presents implications…

  6. HIV test-seeking before and after the restriction of anonymous testing in North Carolina.

    PubMed Central

    Hertz-Picciotto, I; Lee, L W; Hoyo, C

    1996-01-01

    OBJECTIVES: This study assessed the impact on HIV test-seeking of North Carolina's restriction of anonymous testing to 18 of its 100 counties as of September 1, 1991. METHODS: Trends from 4 months prerestriction to the 16-month restriction period in counties retaining vs counties eliminating anonymous testing were compared. RESULTS: HIV testing increased throughout the state, but more rapidly where anonymous testing was retained than elsewhere: 64% vs 44%. These differences held for all sociodemographic subgroups and were most pronounced among adolescents and African Americans and other non-Whites. CONCLUSIONS: The data are consistent with a detrimental effect of elimination of anonymous testing, although confounding from differences in AIDS awareness or in repeat tests is possible. PMID:8876517

  7. Anonymous reporting of HIV infection: an evaluation of the HIV/AIDS surveillance system in Norway 1983-2000.

    PubMed

    Aavitsland, P; Nilsen, O; Lystad, A

    2001-01-01

    Several European countries are considering implementing surveillance systems for HIV infection, but questions remain regarding patient confidentiality. The population-based HIV/AIDS surveillance system in Norway integrates anonymous HIV case reports from laboratories and clinicians and named AIDS case reports. This evaluation includes a description of the system, evidence of system attributes, estimation of resources for system operations, and documentation of the system's usefulness. HIV case reports provide a far better picture of the epidemic than AIDS reports. The median delay between positive HIV test and reporting was 30 days (interquartile range 18-49 days). Completeness of demographic and epidemiologic information in the surveillance database ranges from 60 to 100%. Information on pre-AIDS mortality and emigration is incomplete. The system cost euro 25,200 in 1999. Results are published every week and used for planning of health care and prevention. We conclude that the Norwegian surveillance system with anonymous reporting of HIV cases is simple, inexpensive and flexible, and capable of providing a representative and timely overview that guides prevention. The system fulfils its objectives while respecting confidentiality and adhering to ethical principles. A similar system may be considered in other countries.

  8. [Public free anonymous HIV testing centers: cost analysis and financing options].

    PubMed

    Dozol, Adrien; Tribout, Martin; Labalette, Céline; Moreau, Anne-Christine; Duteil, Christelle; Bertrand, Dominique; Segouin, Christophe

    2011-01-01

    The services of general interest provided by hospitals, such as free HIV clinics, have been funded since 2005 by a lump sum covering all costs. The allocation of the budget was initially determined based on historical and declarative data. However, the French Ministry of Health (MoH) recently outlined new rules for determining the allocation of financial resources and contracting hospitals for each type of services of general interest provided. The aim of this study was to estimate the annual cost of a public free anonymous HIV-testing center and to assess the budgetary implications of new financing systems. Three financing options were compared: the historic block grant; a mixed system recommended by the MoH associating a lump sum covering the recurring costs of an average center and a variable part based on the type and volume of services provided; and a fee-for-services system. For the purposes of this retrospective study, the costs and activity data of the HIV testing clinic of a public hospital located in the North of Paris were obtained for 2007. The costs were analyzed from the perspective of the hospital. The total cost was estimated at 555,698 euros. Personnel costs accounted for 31% of the total costs, while laboratory expenses accounted for 36% of the total costs. While the estimated deficit was 292,553 euros under the historic system, the financial balance of the clinic was found to be positive under a fee-for-services system. The budget allocated to the HIV clinic under the system recommended by the MoH covers most of the current expenses of the HIV clinic while meeting the requirements of free confidential care.

  9. HIV risk practices by female sex workers according to workplace

    PubMed Central

    Damacena, Giseli Nogueira; Szwarcwald, Célia Landmann; de Souza, Paulo Roberto Borges

    2014-01-01

    OBJECTIVE To investigate differences in HIV infection- related risk practices by Female Sex Workers according to workplace and the effects of homophily on estimating HIV prevalence. METHODS Data from 2,523 women, recruited using Respondent-Driven Sampling, were used for the study carried out in 10 Brazilian cities in 2008-2009. The study included female sex workers aged 18 and over. The questionnaire was completed by the subjects and included questions on characteristics of professional activity, sexual practices, use of drugs, HIV testing, and access to health services. HIV quick tests were conducted. The participants were classified in two groups according to place of work: on the street or indoor venues, like nightclubs and saunas. To compare variable distributions by place of work, we used Chi-square homogeneity tests, taking into consideration unequal selection probabilities as well as the structure of dependence between observations. We tested the effect of homophily by workplace on estimated HIV prevalence. RESULTS The highest HIV risk practices were associated with: working on the streets, lower socioeconomic status, low regular smear test coverage, higher levels of crack use and higher levels of syphilis serological scars as well as higher prevalence of HIV infection. The effect of homophily was higher among sex workers in indoor venues. However, it did not affect the estimated prevalence of HIV, even after using a post-stratification by workplace procedure. CONCLUSIONS The findings suggest that strategies should focus on extending access to, and utilization of, health services. Prevention policies should be specifically aimed at street workers. Regarding the application of Respondent-Driven Sampling, the sample should be sufficient to estimate transition probabilities, as the network develops more quickly among sex workers in indoor venues. PMID:25119937

  10. HIV risk practices by female sex workers according to workplace.

    PubMed

    Damacena, Giseli Nogueira; Szwarcwald, Célia Landmann; Souza Júnior, Paulo Roberto Borges de

    2014-06-01

    OBJECTIVE To investigate differences in HIV infection- related risk practices by Female Sex Workers according to workplace and the effects of homophily on estimating HIV prevalence. METHODS Data from 2,523 women, recruited using Respondent-Driven Sampling, were used for the study carried out in 10 Brazilian cities in 2008-2009. The study included female sex workers aged 18 and over. The questionnaire was completed by the subjects and included questions on characteristics of professional activity, sexual practices, use of drugs, HIV testing, and access to health services. HIV quick tests were conducted. The participants were classified in two groups according to place of work: on the street or indoor venues, like nightclubs and saunas. To compare variable distributions by place of work, we used Chi-square homogeneity tests, taking into consideration unequal selection probabilities as well as the structure of dependence between observations. We tested the effect of homophily by workplace on estimated HIV prevalence. RESULTS The highest HIV risk practices were associated with: working on the streets, lower socioeconomic status, low regular smear test coverage, higher levels of crack use and higher levels of syphilis serological scars as well as higher prevalence of HIV infection. The effect of homophily was higher among sex workers in indoor venues. However, it did not affect the estimated prevalence of HIV, even after using a post-stratification by workplace procedure. CONCLUSIONS The findings suggest that strategies should focus on extending access to, and utilization of, health services. Prevention policies should be specifically aimed at street workers. Regarding the application of Respondent-Driven Sampling, the sample should be sufficient to estimate transition probabilities, as the network develops more quickly among sex workers in indoor venues.

  11. Barriers to workplace HIV testing in South Africa: a systematic review of the literature.

    PubMed

    Weihs, Martin; Meyer-Weitz, Anna

    2016-01-01

    Low workplace HIV testing uptake makes effective management of HIV and AIDS difficult for South African organisations. Identifying barriers to workplace HIV testing is therefore crucial to inform urgently needed interventions aimed at increasing workplace HIV testing. This study reviewed literature on workplace HIV testing barriers in South Africa. Pubmed, ScienceDirect, PsycInfo and SA Publications were systematically researched. Studies needed to include measures to assess perceived or real barriers to participate in HIV Counselling and Testing (HCT) at the workplace or discuss perceived or real barriers of HIV testing at the workplace based on collected data, provide qualitative or quantitative evidence related to the research topic and needed to refer to workplaces in South Africa. Barriers were defined as any factor on economic, social, personal, environmental or organisational level preventing employees from participating in workplace HIV testing. Four peer-reviewed studies were included, two with quantitative and two with qualitative study designs. The overarching barriers across the studies were fear of compromised confidentiality, being stigmatised or discriminated in the event of testing HIV positive or being observed participating in HIV testing, and a low personal risk perception. Furthermore, it appeared that an awareness of an HIV-positive status hindered HIV testing at the workplace. Further research evidence of South African workplace barriers to HIV testing will enhance related interventions. This systematic review only found very little and contextualised evidence about workplace HCT barriers in South Africa, making it difficult to generalise, and not really sufficient to inform new interventions aimed at increasing workplace HCT uptake.

  12. Factors associated with failure to return for HIV test results in a free and anonymous screening centre.

    PubMed

    Laanani, Moussa; Dozol, Adrien; Meyer, Laurence; David, Stéphane; Camara, Sékou; Segouin, Christophe; Troude, Pénélope

    2015-07-01

    Free and anonymous screening centres (CDAG: Centres de Depistage Anononyme et Gratuit) are public facilities set up for HIV infection diagnosis in France. Some people visiting CDAG fail to return for test results and are not informed of their serology. This study aimed to assess factors associated with failure to return for HIV test results. Patients visiting the Fernand-Widal CDAG (Paris) for an HIV test in January-February 2011 were eligible to take part in the study. Data were collected with an anonymous self-administered questionnaire. Factors associated with failure to return were assessed using logistic regression models. Of the 710 participants (participation rate 88%), 46 patients failed to return. Not specifying birthplace and not living in the region of Paris were associated with failure to return. Those who perceived no risk of HIV infection and those who felt they were more at risk than other people were both statistically associated with failure to return. Self-perceived risk seemed to be of chief concern for failure to return for HIV test results and should be considered during pre-test counselling. © The Author(s) 2014.

  13. Workplace wellness for HIV/AIDS-affected nurses in South Africa.

    PubMed

    Basson, Helena Aletta; Roets, Lizeth

    The development of a framework for a workplace wellness programme for HIV/AIDS infected and/or affected nurses in South Africa, who comprise registered nurses and midwives, enrolled staff nurses and auxiliary nurses. To identify and describe components for a framework of a workplace wellness programme. Registered nurses and midwives, enrolled staff nurses and auxiliary nurses (referred to as nurses) in the South African nursing workforce are confronted daily with HIV/AIDS in the workplace due to the high HIV/AIDS prevalence rate among sexually and economically active adult women between 15-49 years of age. The research explains how health and wellness could be promoted by instituting a workplace wellness programme. Quantitative descriptive research. The nurses emphasised the threat of HIV/AIDS and considered a workplace wellness programme a priority. A logic model underpinned the workplace wellness programme framework.

  14. A successful workplace program for voluntary counseling and testing and treatment of HIV/AIDS at Heineken, Rwanda.

    PubMed

    Collier, Alizanne C; Van der Borght, Stefaan F M; Rinke de Wit, Tobias; Rinke de Wit, Tobias F; Richards, Sarah C; Feeley, Frank G

    2007-01-01

    Heineken Breweries launched a workplace HIV/AIDS program at its Rwanda subsidiary in September 2001. By January 25, 2005, 736/2,595 eligible individuals had reported for counseling and HIV testing: 380/521 employees (72.9%), 254/412 spouses (61.7%), 99/1,517 children (6.5%), and 3/145 retired (2.0%). As a result, 109 HIV+ individuals were identified: 62 employees, 34 spouses, 12 children, and 1 retired. In September 2003 an anonymous HIV seroprevalence survey was performed with participation rates of 69.4% for employees, 58.2% for spouses, and 79.7% for adolescents. Using the survey result, the expected number of HIV+ employees was 71, which implies a program uptake of 87.1% (62/71) in this group. Of the identified 109 HIV+ beneficiaries, 42 were on highly active antiretroviral treatment (HAART). In November 2003 a qualitative study of awareness and health-seeking behavior of the Heineken Rwanda beneficiaries identified key principles contributing to the success of this program.

  15. Are you willing to treat patients with HIV/AIDS? An anonymous survey among staff and students of dental institution.

    PubMed

    Vijayalaxmi, Nimma; Reddy, Lavanya; Swapna, Lingam Amara; Reddy, Sudhakara; Ramesh, T; Padmareddy, M

    2014-09-01

    India is one of the largest and most populated country in the world, with over one billion inhabitants. Of this number, it is estimated that around 23.9 lakh people are currently suffering with HIV. People living with HIV/AIDS (PLWHA) require increasingly competent and compassionate health care, including oral health care. The present study was conducted with the objective of evaluating the response of dental health care professionals (staff and students) in willingness to provide treatment to HIV/AIDS patients and whether the training and education provided to them is sufficient to handle such patients, or whether there is necessity for advanced curriculum to be implemented. An anonymous survey with the permission from ethical committee of dental institution was conducted with the use self-administered questionnaire eliciting information on self-rated HIV/AIDS knowledge, attitudes, infection control practices, occupational risk perception and willingness to treat HIV/AIDS patients. An increase in level of knowledge was observed with the increase in year of study from first BDS to post graduation and MDS staff. It was observed that interns and post graduate students were willing to treat patients with HIV/AIDS. Staff of the institution showed greater concern to undergo training to provide efficient treatment to patients with HIV/AIDS. It was concluded that there was a positive attitude and willingness of staff and students to treat a patient suffering with HIV/AIDS. Also, there was willingness and interest of the staff and students of the dental institution to participate in training programmes to provide better and more efficient treatment to HIV/AIDS patients.

  16. Anonymous Partnerships among MSM and Transgender Women (TW) Recently Diagnosed with HIV and other STIs in Lima, Peru: An individual and dyad-level analysis

    PubMed Central

    Perez-Brumer, Amaya G.; Oldenburg, Catherine E.; Segura, Eddy R.; Sanchez, Jorge; Lama, Javier R.; Clark, Jesse L.

    2016-01-01

    Objectives Partner notification (PN) following STI diagnosis is a key strategy for controlling HIV/STI transmission. Anonymous partnerships are an important barrier to PN and often associated with high-risk sexual behaviour. Limited research has examined the profile of MSM and TW who engage in anonymous sex. To better understand anonymous partnership practices in Lima, Peru, we assessed participant- and partnership-level characteristics associated with anonymous sex among a sample of MSM and TW recently diagnosed with HIV/STI. Methods MSM and TW diagnosed with HIV/STI within the past month completed a cross-sectional survey regarding anticipated PN practices. Participants reported sexual partnership types and characteristics of up to 3 of their most recent partners. Using a Poisson generalised estimating equation (GEE) model we assessed participant- and partnership-level characteristics associated with anonymous partnerships. Results Among 395 MSM and TW with HIV/STI, 36.0% reported at least one anonymous sexual partner in the past three months (mean of 8.6 anonymous partners per participant; SD 17.0). Of the 971 partnerships reported, 118 (12.2%) were anonymous and the majority (84.8%) were with male partners, followed by 11.0% with female partners, and 4.2% with transgender/travesti partners. Partner-level characteristics associated with increased likelihood of having an anonymous partner included female (aPR 2.28, 95% CI 1.05 to 4.95, P=0.04) or transgender/travesti (aPR 4.03, 95% CI 1.51 to 10.78, P=0.006) partner gender. Conclusions By assessing both individual- and dyadic-level factors, these results represent an important step in understanding the complexity of partnership interactions and developing alternative partner notification strategies for Latin America. PMID:26912910

  17. Managing HIV at the workplace: An empirical study of HIV and HR managers in Singapore.

    PubMed

    Lim, Vivien K G

    2003-10-01

    Drawing from previous research on individual differences, AIDS, and concerns for face, the author developed and tested a model examining the predictors (knowledge of AIDS transmission, level of homophobia, and concern for face) of AIDS fear and its organizational outcomes (perceived organizational consequences of hiring people living with HIV and attitudes toward disclosure of HIV-related information at the workplace). Data were collected using mail survey. Structural equation modeling was used to examine the relationships among these variables for 160 human resource managers. All of the hypothesized relationships were empirically supported. Implications of the research findings for human resource practices are discussed. 2003 APA

  18. Prevalence of maternal HIV-1 infection in Thames regions: results from anonymous unlinked neonatal testing.

    PubMed

    Ades, A E; Parker, S; Berry, T; Holland, F J; Davison, C F; Cubitt, D; Hjelm, M; Wilcox, A H; Hudson, C N; Briggs, M

    1991-06-29

    To monitor the spread of human immunodeficiency virus (HIV) in the heterosexual population, residues of blood samples collected routinely on absorbent paper for neonatal screening (Guthrie cards) in NE, NW, and SW Thames Regions in England have been tested for antibodies to HIV-1 since June, 1988. 323,369 dried blood spots were analysed to end March, 1991. Prevalence of anti-HIV-1 in newborn babies has remained stable in outer London and non-metropolitan districts whereas prevalence in inner London has increased from 1 in 2000 in the 12 months beginning June, 1988, to 1 in 500 in the first 3 months of 1991. Either exponential or linear growth in the numbers of new seropositives could account for the results. That obstetricians were aware of maternal HIV infection in only 20% of infected pregnancies, indicates the extent to which HIV infection goes unrecognised in the heterosexual community.

  19. Low incidence of HIV infection in an anonymous HIV counselling and testing clinic cohort in Bangkok, Thailand despite high HIV prevalence and self-report of high-risk behaviour.

    PubMed

    Phanuphak, Nittaya; Paris, Robert; Colby, Donn; Pinyakorn, Suteeraporn; Souza, Mark; Teeratakulpisarn, Nipat; Chomchey, Nitiya; Sutthichom, Duanghathai; Sukjitpaiboonphol, Amornrat; Pankam, Tippawan; Kim, Jerome H; Ananworanich, Jintanat; Phanuphak, Praphan

    2015-04-01

    HIV counselling and testing (HCT) clinics have the potential to be entry points for recruiting populations at high risk for HIV infection for HIV prevention and treatment studies. Cohort data from key populations are crucial for HIV study site selection. This cohort study recruited clients at an HCT clinic in Bangkok, Thailand. HIV prevalence was assessed along with demographics, perception of risk and behavioural risk factors. Participants who were HIV negative at baseline were followed up every 4 months for up to 1 year to measure HIV incidence and changes in risk behaviour. A total of 992 subjects enrolled; median age was 30 years, 27% were men who have sex with men (MSM) and 8% were commercial sex workers (CSW). Baseline HIV prevalence was 10%. Factors positively associated with HIV infection were age >30 years, lower educational status and being MSM. Factors negatively associated with HIV infection were self-perception of minimal or moderate risk. Overall dropout rate was 49%, with 24% not returning after enrolment. HIV incidence was lower than expected at 0.50 per 100 person-years overall and 1.95 per 100 person-years for MSM. This HCT population had a high baseline HIV prevalence but a low incidence rate on follow-up. Overall retention in the cohort was poor and may have resulted from suboptimal reminders and characteristics of high-risk clients who use anonymous HIV testing services. MSM had higher HIV incidence and better retention than other high-risk groups.

  20. HIV testing in the workplace: clarifying the meaning of South Africa's Employment Equity Act.

    PubMed

    Heywood, M J

    2000-01-01

    This article clarifies the meaning of South Africa's Employment Equity Act, which includes HIV testing in the workplace. This historic piece of legislation is intended to promote equality and equal opportunity in the workplace. Among other things, the Act prohibits employers to conduct pre-employment HIV testing unless the Labor Court has given permission. Several interpretations have ensued which was seen as damaging to HIV prevention strategies in the workplace. Employers, likewise, have used these interpretations to justify a threat to withdraw from the Joint UN Program on the HIV/AIDS-Sponsored Greater Involvement of People Living with HIV/AIDS program. Similarly, arguments for HIV testing followed which were based on a fancifully narrow and literal reading of the section. This resulted to the literal interpretation of the Act that eventually made the contested sections unconstitutional and deprived employees of their fundamental rights to freedom and security, and access to health care services. A non-literal interpretation of the Act, on the other hand, does require the prohibition as applying only to ¿employer-initiated¿ HIV testing. One immediate remedy to the confusion would be for the Employment Equity Commission to publish a code of good practice on HIV testing in the workplace.

  1. The elimination of anonymous HIV testing: a case study in North Carolina.

    PubMed

    Castrucci, Brian C; Williams, Delbert E; Foust, Evelyn

    2002-11-01

    In May 1997, anonymous human immunodeficiency virus testing in publicly funded clinics was eliminated throughout North Carolina. There were concerns that this decision would disenfranchise testers with certain behavioral profiles. North Carolina's counseling and testing system was used to evaluate the effect of this policy change. A 10.3 percent decline in overall testing and a 21.7 percent decline among men who had sex with other men were identified in the year following the policy change. However, between 13 and 24 months after the policy change, the number of tests administered returned to near pre-policy levels. Understanding North Carolina's experience can assist others considering similar policy changes.

  2. Anonymous partnerships among MSM and transgender women (TW) recently diagnosed with HIV and other STIs in Lima, Peru: an individual-level and dyad-level analysis.

    PubMed

    Perez-Brumer, Amaya G; Oldenburg, Catherine E; Segura, Eddy R; Sanchez, Jorge; Lama, Javier R; Clark, Jesse L

    2016-02-24

    Partner notification (PN) following sexually transmitted disease (STI) diagnosis is a key strategy for controlling HIV/STI transmission. Anonymous partnerships are an important barrier to PN and often associated with high-risk sexual behaviour. Limited research has examined the profile of men who have sex with men (MSM) and transgender women (TW) who engage in anonymous sex. To better understand anonymous partnership practices in Lima, Peru, we assessed participant-level and partnership-level characteristics associated with anonymous sex among a sample of MSM and TW recently diagnosed with HIV/STI. MSM and TW diagnosed with HIV/STI within the past month completed a cross-sectional survey regarding anticipated PN practices. Participants reported sexual partnership types and characteristics of up to three of their most recent partners. Using a Poisson generalised estimating equation model, we assessed participant-level and partnership-level characteristics associated with anonymous partnerships. Among 395 MSM and TW with HIV/STI, 36.0% reported at least one anonymous sexual partner in the past 3 months (mean of 8.6 anonymous partners per participant; SD 17.0). Of the 971 partnerships reported, 118 (12.2%) were anonymous and the majority (84.8%) were with male partners, followed by 11.0% with female partners and 4.2% with transgender/travesti partners. Partner-level characteristics associated with increased likelihood of having an anonymous partner included female (adjusted prevalence ratio (aPR) 2.28, 95% CI 1.05 to 4.95, p=0.04) or transgender/travesti (aPR 4.03, 95% CI 1.51 to 10.78, p=0.006) partner gender. By assessing both individual-level and dyadic-level factors, these results represent an important step in understanding the complexity of partnership interactions and developing alternative PN strategies for Latin America. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Adoption of formal HIV and AIDS workplace policies: an analysis of industry/sector variations.

    PubMed

    Bakuwa, Rhoda

    2010-12-01

    Addressing HIV and AIDS is the responsibility of many stakeholders including private sector companies. However, increasing evidence reveals that the majority of companies around the world are yet to acknowledge and respond to HIV and AIDS as a workplace issue. One factor that has been identified in the literature as playing a role in determining whether a company responds to HIV and AIDS, or not, is the industry/sector in which a company operates. This study therefore sought to empirically examine whether in the context of Malawi there were significant variations in the adoption of formal HIV and AIDS workplace policies based on the industry/sector in which a company was operating, as well as analyse the dynamics underlying such variations. Using survey data collected from 152 randomly selected private sector companies in Malawi, the results of this study revealed significant variations in the adoption of HIV and AIDS workplace policies among companies operating in various sectors. Companies in the service sector were leading the adoption compared to companies in other sectors such as the trading sector. Furthermore, the evidence from this study showed that differences in staff participation in the activities of HIV and AIDS institutions may explain the industry/sector variations. These results provide an important avenue to scale up company responses to HIV and AIDS by intensifying staff participation in the activities of HIV and AIDS institutions. Such institutions appear to play a vital role of providing up to date HIV-and AIDS-related information upon which companies are able to develop a business case for responding to the epidemic.

  4. Prevalence of human immunodeficiency virus, hepatitis C virus, hepatitis B virus and syphilis among individuals attending anonymous testing for HIV in Luanda, Angola.

    PubMed

    Guimarães Nebenzahl, H; Lopes, A; Castro, R; Pereira, F

    2013-01-24

    Human immunodeficiency virus (HIV), hepatitis B virus (HBV), hepatitis C virus (HCV) and syphilis remain major infections around the world. In Angola there are about 166 000 individuals living with HIV, representing a prevalence of 1.98% in adults between 15 and 49 years of age. In a 2003 study in Luanda, 4.5% of pregnant women had antibodies to HIV and 8.1% to HBV, and 5.4% were infected with Treponema pallidum. Objectives. The aim of this study was to determine the prevalence of HIV-1 and 2, HBV, HCV and T. pallidum serological markers, and hence the prevalence of these infections, in individuals attending a sexually transmitted disease clinic in Luanda, Angola, and the burden of these infections in the Angolan population. Methods. Individuals attending a centre for anonymous testing for HIV were randomly included in the study. All samples were tested for HBV surface antigen (HBsAg), anti-HCV and anti-HIV-1 and 2 antibodies and antibodies to T. pallidum. Results. A total of 431 individuals (262 women and 169 men) were studied, of whom 10.0% (43/431) were seropositive for T. pallidum and 4.6% had active syphilis; 8.8% (38/431) were seropositive for HIV-1 and/or HIV-2 (of these, 78.9% were HIV-1-positive, 2.6% HIV-2-positive and 18.4% co-infected); 9.3% (40/431) were HBsAg-positive, while 8.1% (35/431) had antibodies to HCV. Of 102 patients with positive results, 26 (25.5%, or 6.0% of the total of 431 patients) were positive for more than one of the organisms studied. Rates of co-infection were as follows: 2.3% (10/431) for HIV/HBV, 0.9% (4/431) for HIV/HCV, and 0.9% (4/431) for HCV/HBV. Three individuals with active syphilis had viral co-infection, hepatitis B in 1 case and HIV in 2. Five individuals (1.2% of the total) were seropositive for three infections, HIV, hepatitis B and hepatitis C in 3 cases and HIV, hepatitis C and syphilis in 2. Conclusions. A high prevalence of co-infection with the infections studied was found in this population, including HIV

  5. HIV Risk Behaviours Differ by Workplace Stability Among Mexican Female Sex Workers With Truck Driver Clientele

    PubMed Central

    Chen, Nadine E.; Strathdee, Steffanie A.; Rangel, Gudelia; Patterson, Thomas L.; Uribe-Salas, Felipe J.; Rosen, Perth; Villalobos, Jorge; Brouwer, Kimberly C.

    2012-01-01

    Background In a study of female sex workers (FSWs) servicing truck driver clients in Mexican border cities, we evaluated differences in HIV/STI risk behaviours determined by workplace. Design and Methods Our study was cross-sectional and its population comprised 100 FSWs from Nuevo Laredo (US border) and 100 FSWs from Ciudad Hidalgo (Guatemalan border). The main outcome was primary place of sex work defined as unstable (street, vehicle, gas station, etc.) vs stable (bar, brothel, and hotel). Logistic regression was used to identify correlates associated with trading sex at unstable workplaces in the last month. Results Of the FSWs surveyed, 18% reported an unstable workplace. The majority of FSWs surveyed were young (<30 years), single, had <9th grade education, and had worked in the sex trade for a median of 4.9 years. After controlling for study site, FSWs with unstable vs stable workplaces were more likely to have a majority/all truck driver clientele, but were less likely to have visited a gynaecologist in the last year (OR 0.1, 95% CI 0.03-0.4) or ever had an HIV test (OR 0.1, 95% CI 0.06-0.3), and there was a trend towards lower condom use self-efficacy scores (OR 0.8 per unit increase, 95% CI 0.7-1.0). On multivariate regression, unstable workplace was associated with having majority/all truck driver clientele, being surveyed in Nuevo Laredo, and decreased odds of ever having an HIV test. Conclusions Among Mexican FSWs with truck driver clients, providing safe indoor spaces for sex work may help facilitate public health interventions that improve HIV/STI prevention and reproductive health outcomes. PMID:24724056

  6. AIDS/HIV Infection and the Workplace: NIDA Workgroup Report.

    ERIC Educational Resources Information Center

    National Inst. on Drug Abuse (DHHS/PHS), Rockville, MD.

    In October 1989, the Division of Applied Research of the National Institute on Drug Abuse (NIDA) convened a panel of experts to assess whether the basic principles and approaches that have been used in the development of workplace drug abuse programs and community acquired immune deficiency syndrome (AIDS) education programs can be applied to…

  7. HIV and AIDS in Workplace: The role of behaviour antecedents on behavioural intentions

    PubMed Central

    Dipeolu, I. O.

    2015-01-01

    their organisations had a workplace HIV and AIDS policy (p<0.05). Conclusions Although the respondents would tolerate staff with HIV/AIDS, their attitudinal disposition are indicative of limited knowledge about the mode of transmission and prevention of HIV including workplace policy on HIV and AIDS. Health education strategies such as training and workplace HIV/AIDS education are needed to address these shortcomings. PMID:26688605

  8. HIV and AIDS in Workplace: The role of behaviour antecedents on behavioural intentions.

    PubMed

    Dipeolu, I O

    2014-09-01

    workplace HIV and AIDS policy (p<0.05). Although the respondents would tolerate staff with HIV/AIDS, their attitudinal disposition are indicative of limited knowledge about the mode of transmission and prevention of HIV including workplace policy on HIV and AIDS. Health education strategies such as training and workplace HIV/AIDS education are needed to address these shortcomings.

  9. HIV / AIDS in the workplace: principles, planning, policy, programmes and project participation.

    PubMed

    Smart, R

    1999-01-01

    15 years ago, most business, labor, government, and nongovernment representatives would have had only a small idea of what AIDS was, and let alone why it should concern them. However, companies have since lost top managers, workers have lost colleagues, and considerable time, energy, and emotion have been spent upon issues of illness and loss. Entire families have collapsed, as companies struggle against a background of chronic poverty. The HIV/AIDS pandemic has forced a reconsideration of whether disease prevention and health promotion are business concerns. AIDS causes illness, disability, and death to workers, as well as severe economic and emotional disruptions to their families. It also increases the cost of doing business. As South Africa faces a large epidemic, business must take prompt and incisive action against AIDS. A list of 10 workplace principles is presented and a 3-stage process recommended to ensure optimal workplace HIV/AIDS/STD and tuberculosis policies and programs.

  10. Best practice workplace HIV/AIDS programmes in South Africa: A review of case studies and lessons learned

    PubMed Central

    2009-01-01

    ABSTRACT Background A group of experts attending a tripartite interregional meeting on best practices in HIV/AIDS workplace policies and programmes organised by the International Labour Organisation (ILO) in Geneva, Switzerland, identified 34 best practice workplace HIV programmes from across the world. Method The ten criteria that were used for reviewing best practice workplace HIV/AIDS programmes in South Africa include acceptability, accessibility, ethical soundness, perceived impact, relevance, appropriateness, innovativeness, efficiency, sustainability and replicability. Results More than one-third (35.3%) of the 34 best practice workplace interventions identified were found in businesses and industries in South Africa. This constitutes a significant and encouraging effort to deal with HIV/AIDS in the workplace. Approximately 16.7% of the best practice workplace HIV/AIDS interventions focused on policy and legal frameworks, 50% of these interventions focused on prevention, 16.7% provided links beyond the workplace and a further 16.7% were interventions that focused on knowledge and evidence. A third (33.3%) of practices were found in the mining industry, 16.7% in the motor industry, 16.7% from workers’ unions, and the rest (33.3%) were found in a sugar company, an electricity supply company, a pharmaceutical company and the ministry of Public Service and Administration. Conclusion It is encouraging that over one-third of all best practice workplace HIV interventions identified by the ILO experts were found in South Africa. The majority of these policies and programmes were focused on HIV prevention.

  11. The role of HIV/AIDS committees in effective workplace governance of HIV/AIDS in South African small and medium-sized enterprises (SMEs).

    PubMed

    Vaas, Jocelyn R

    2008-04-01

    The primary purpose of this study was to assess the role, status and scope of workplace HIV/AIDS committees as a means of effective workplace governance of the HIV/AIDS impact, and their role in extending social protective HIV/AIDS-related rights to employees. In-depth qualitative case studies were conducted in five South African small and medium-sized enterprises (SMEs) that were actively implementing HIV/AIDS policies and programmes. Companies commonly implemented HIV/AIDS policies and programmes through a workplace committee dedicated to HIV/AIDS or a generic committee dealing with issues other than HIV/ AIDS. Management, through the human resources department and the occupational health practitioner often drove initial policy formulation, and had virtually sole control of the HIV/AIDS budget. Employee members of committees were mostly volunteers, and were often production or blue collar employees, while there was a notable lack of participation by white-collar employees, line management and trade unions. While the powers of workplace committees were largely consultative, employee committee members often managed in an indirect manner to secure and extend social protective rights on HIV/AIDS to employees, and monitor their effective implementation in practice. In the interim, workplace committees represented one of the best means to facilitate more effective workplace HIV/AIDS governance. However, the increased demands on collective bargaining as a result of an anticipated rises in AIDS-related morbidity and mortality might prove to be beyond the scope of such voluntary committees in the longer term.

  12. A lottery incentive system to facilitate dialogue and social support for workplace HIV counselling and testing: A qualitative inquiry

    PubMed Central

    Weihs, Martin; Meyer-Weitz, Anna

    2014-01-01

    Abstract Despite South African mid-sized companies' efforts to offer HIV counselling and testing (HCT) in the workplace, companies report relatively poor uptake rates. An urgent need for a range of different interventions aimed at increasing participation in workplace HCT has been identified. The aim of this study was to explore qualitatively the influence of a lottery incentive system (LIS) as an intervention to influence shop-floor workers' workplace HIV testing behaviour. A qualitative study was conducted among 17 shop-floor workers via convenience sampling in two mid-sized South African automotive manufacturing companies in which an LIS for HCT was implemented. The in-depth interviews employed a semi-structured interview schedule and thematic analysis was used to analyse the data. The interviews revealed that the LIS created excitement in the companies and renewed employees' personal interest in HCT. The excitement facilitated social interactions that resulted in a strong group cohesion pertaining to HCT that mitigated the burden of HIV stigma in the workplace. Open discussions allowed for the development of supportive social group pressure to seek HCT as a collective in anticipation of a reward. Lotteries were perceived as a supportive and innovative company approach to workplace HCT. The study identified important aspects for consideration by companies when using an LIS to enhance workplace HIV testing. The significance of inter- and intra-player dialogue in activating supportive social norms for HIV testing in collectivist African contexts was highlighted. PMID:25023208

  13. A lottery incentive system to facilitate dialogue and social support for workplace HIV counselling and testing: a qualitative inquiry.

    PubMed

    Weihs, Martin; Meyer-Weitz, Anna

    2014-01-01

    Despite South African mid-sized companies' efforts to offer HIV counselling and testing (HCT) in the workplace, companies report relatively poor uptake rates. An urgent need for a range of different interventions aimed at increasing participation in workplace HCT has been identified. The aim of this study was to explore qualitatively the influence of a lottery incentive system (LIS) as an intervention to influence shop-floor workers' workplace HIV testing behaviour. A qualitative study was conducted among 17 shop-floor workers via convenience sampling in two mid-sized South African automotive manufacturing companies in which an LIS for HCT was implemented. The in-depth interviews employed a semi-structured interview schedule and thematic analysis was used to analyse the data. The interviews revealed that the LIS created excitement in the companies and renewed employees' personal interest in HCT. The excitement facilitated social interactions that resulted in a strong group cohesion pertaining to HCT that mitigated the burden of HIV stigma in the workplace. Open discussions allowed for the development of supportive social group pressure to seek HCT as a collective in anticipation of a reward. Lotteries were perceived as a supportive and innovative company approach to workplace HCT. The study identified important aspects for consideration by companies when using an LIS to enhance workplace HIV testing. The significance of inter- and intra-player dialogue in activating supportive social norms for HIV testing in collectivist African contexts was highlighted.

  14. Handbook for Peer Educators and Community Mobilisers Conducting HIV/AIDS Prevention Programmes in the Informal Sector Workplace

    ERIC Educational Resources Information Center

    Kagimu, Majid; Karama, Said; Mbabazi, Jackson; Mularira, Grace N.; Nakawuka, Minah; Kityo, Tom; Ssengonzi, Robert; Ssentongo, Chris; Walakira, Yusuf

    2004-01-01

    This handbook has been developed as a resource to be used by peer/community educators and mobilisers conducting HIV/AIDS prevention programmes in the informal sector workplaces and surrounding communities in Uganda. The handbook provides basic information on a range of topics on HIV and other sexually transmitted infections that can be used by…

  15. Workplace programmes for HIV and tuberculosis: a systematic review to support development of international guidelines for the health workforce.

    PubMed

    Yassi, Annalee; O'Hara, Lyndsay M; Lockhart, Karen; Spiegel, Jerry M

    2013-01-01

    The health service sector has a vital role to play in delivering human immunodeficiency virus (HIV) and tuberculosis (TB) prevention, treatment and care, yet evidence indicates that healthcare workers (HCWs) themselves lack adequate access to HIV and TB services. HCWs are also at increased risk from TB and other infectious diseases at work, and therefore accessing HIV services is particularly important. A systematic review was therefore conducted to inform the development of World Health Organization (WHO) guidelines to improve access to HIV and TB services, and specifically, to assess the evidence regarding providing such services through workplace-based programmes. We identified any study published since 1984 that addressed outcomes of interest as defined through multi-stakeholder consultations, and were related to workplace interventions in (1) the healthcare workplace and (2) any workplace that included HIV and/or TB diagnosis and/or treatment. Interventions focusing solely on primary prevention with no diagnostic or treatment services were excluded, as they were the subject of other guidelines. A minimum of two reviewers independently extracted data and assessed the articles against pre-set selection criteria; studies were also profiled and quality assessed by a minimum of two reviewers. Three studies met these criteria specifically for HCWs; all showed a preponderance of positive benefits, with minimal negative outcome. Seven studies met these criteria regarding workplace HIV and/or TB diagnosis and/or treatment from other sectors, public or private. Again, all showed positive results. The paucity of high-quality evidence in this field of research was itself an important finding, beckoning further research on workplace-based programmes for health workers. Nonetheless, while more well-designed intervention studies are definitely desirable, providing programmes for HCWs to obtain HIV and TB diagnosis and treatment at the workplace is supported by the literature

  16. Against anonymity.

    PubMed

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  17. Ethical dilemmas related to the HIV-positive person in the workplace.

    PubMed

    Botes, Annatjie; Otto, Marianne

    2003-05-01

    This study's objectives were: (1) to describe and explore the ethical dilemmas surrounding the HIV-positive person in the workplace in South Africa; and (2) to describe the Rational Interaction for Moral Sensitivity (RIMS) approach as a possible mechanism for solving these ethical dilemmas. A qualitative, exploratory and descriptive research design was used. The target populations were HIV-positive employees and occupational health nurses working for a South African company. Data collected through individual HIV-positive employee interviews and occupational health nurse workgroups were analysed. The ethical dilemmas were conceptualized and described within the theoretical framework of the principles of ethics, namely, autonomy, beneficence, justice and confidentiality. To elicit a solution to the dilemmas, the data were recontextualized using the RIMS approach, a group decision-making strategy designed for the business environment.

  18. Uptake of Workplace HIV Counselling and Testing: A Cluster-Randomised Trial in Zimbabwe

    PubMed Central

    Corbett, Elizabeth L; Dauya, Ethel; Matambo, Ronnie; Cheung, Yin Bun; Makamure, Beauty; Bassett, Mary T; Chandiwana, Steven; Munyati, Shungu; Mason, Peter R; Butterworth, Anthony E; Godfrey-Faussett, Peter; Hayes, Richard J

    2006-01-01

    Background HIV counselling and testing is a key component of both HIV care and HIV prevention, but uptake is currently low. We investigated the impact of rapid HIV testing at the workplace on uptake of voluntary counselling and testing (VCT). Methods and Findings The study was a cluster-randomised trial of two VCT strategies, with business occupational health clinics as the unit of randomisation. VCT was directly offered to all employees, followed by 2 y of open access to VCT and basic HIV care. Businesses were randomised to either on-site rapid HIV testing at their occupational clinic (11 businesses) or to vouchers for off-site VCT at a chain of free-standing centres also using rapid tests (11 businesses). Baseline anonymised HIV serology was requested from all employees. HIV prevalence was 19.8% and 18.4%, respectively, at businesses randomised to on-site and off-site VCT. In total, 1,957 of 3,950 employees at clinics randomised to on-site testing had VCT (mean uptake by site 51.1%) compared to 586 of 3,532 employees taking vouchers at clinics randomised to off-site testing (mean uptake by site 19.2%). The risk ratio for on-site VCT compared to voucher uptake was 2.8 (95% confidence interval 1.8 to 3.8) after adjustment for potential confounders. Only 125 employees (mean uptake by site 4.3%) reported using their voucher, so that the true adjusted risk ratio for on-site compared to off-site VCT may have been as high as 12.5 (95% confidence interval 8.2 to 16.8). Conclusions High-impact VCT strategies are urgently needed to maximise HIV prevention and access to care in Africa. VCT at the workplace offers the potential for high uptake when offered on-site and linked to basic HIV care. Convenience and accessibility appear to have critical roles in the acceptability of community-based VCT. PMID:16796402

  19. HIV/AIDS stigma at the workplace: exploratory findings from Pakistan.

    PubMed

    Bashir, Sajid

    2011-01-01

    People living with HIV/AIDS (PLHA) are stigmatised socially. They are devalued and considered like outcasts by having lesser opportunities for education, treatment and housing, and in an organisational context they get reduced opportunities of selection, promotion and income. The phenomena have been extensively researched in developed countries but limited literature addresses the situation in underdeveloped countries like Pakistan, which is also facing spread of the HIV/AIDS epidemic. There are a number of groups who are carrying the disease but the problems being faced by PLHA employed in different organisations have rarely been analysed. Stigma at the workplace can generate a number of negative outcomes. The present study considers two such outcomes among stigmatised PLHA. These outcomes are organisational cynicism and breach of psychological contract. A questionnaire was used to collect data from a sample of 174 PLHA, having a work experience after identification of the epidemic, working in different organisations across Pakistan. These PLHA were identified and recruited through a scattered record available with some government/non-government organisations operating in Pakistan to control HIV/AIDS. Findings of the study extend the knowledge about HIV/AIDS stigma indicating that PLHA are subjected to stigma, which is significantly associated with a breach of psychological contract and organisational cynicism. There is a need at governmental and organisational level as well to increase awareness about the disease and formulate policies to reduce stigma against PLHA working in different organisations.

  20. Workplace and HIV-related sexual behaviours and perceptions among female migrant workers.

    PubMed

    Yang, H; Li, X; Stanton, B; Fang, X; Lin, D; Mao, R; Liu, H; Chen, X; Severson, R

    2005-10-01

    Data from 1,543 female migrants working in eight occupational clusters in Beijing and Nanjing, China were analysed to examine the association of workplace with HIV-related behaviours and perceptions. For sexually experienced women (n = 666, 43.2%), those working in entertainment establishments or personal service (e.g., nightclubs, dancing halls, barbershops, beauty salons, massage parlours, etc.) engaged in risky sexual practices twice as frequently as those working in non-entertainment establishments (e.g. restaurants, stalls, domestic service, factories, etc.). About 10% of women in the entertainment establishments reported having sold sex, 30% having multiple sexual partners and 40% having sex with men with multiple sexual partners. The rate of consistent condom use was less than 15%. They also tended to have a higher level of perceptions of both peer risk involvement and positive expectancy of risk behaviours, and lower perceptions of severity of STDs and HIV. For women who were not sexually experienced, those working in 'stalls' or 'domestic service' tended to perceive higher peer risk involvement, less severity of HIV infection, and less effectiveness of protective behaviour. The occupational pattern of sexual risk behaviours and perceptions observed in the current study indicates employment conditions are associated with HIV risk. Intervention strategies should be tailored to address occupational-related factors.

  1. Workplace and HIV-related sexual behaviours and perceptions among female migrant workers

    PubMed Central

    YANG, H.; LI, X.; STANTON, B.; FANG, X.; LIN, D.; MAO, R.; LIU, H.; CHEN, X.; SEVERSON, R.

    2007-01-01

    Data from 1,543 female migrants working in eight occupational clusters in Beijing and Nanjing, China were analysed to examine the association of workplace with HIV-related behaviours and perceptions. For sexually experienced women (n = 666, 43.2%), those working in entertainment establishments or personal service (e.g., nightclubs, dancing halls, barbershops, beauty salons, massage parlours, etc.) engaged in risky sexual practices twice as frequently as those working in non-entertainment establishments (e.g. restaurants, stalls, domestic service, factories, etc.). About 10% of women in the entertainment establishments reported having sold sex, 30% having multiple sexual partners and 40% having sex with men with multiple sexual partners. The rate of consistent condom use was less than 15%. They also tended to have a higher level of perceptions of both peer risk involvement and positive expectancy of risk behaviours, and lower perceptions of severity of STDs and HIV. For women who were not sexually experienced, those working in ‘stalls’ or ‘domestic service’ tended to perceive higher peer risk involvement, less severity of HIV infection, and less effectiveness of protective behaviour. The occupational pattern of sexual risk behaviours and perceptions observed in the current study indicates employment conditions are associated with HIV risk. Intervention strategies should be tailored to address occupational-related factors. PMID:16120499

  2. Optimal Control of HIV/AIDS in the Workplace in the Presence of Careless Individuals

    PubMed Central

    2014-01-01

    A nonlinear dynamical system is proposed and qualitatively analyzed to study the dynamics of HIV/AIDS in the workplace. The disease-free equilibrium point of the model is shown to be locally asymptotically stable if the basic reproductive number, ℛ0, is less than unity and the model is shown to exhibit a unique endemic equilibrium when the basic reproductive number is greater than unity. It is shown that, in the absence of recruitment of infectives, the disease is eradicated when ℛ0 < 1, whiles the disease is shown to persist in the presence of recruitment of infected persons. The basic model is extended to include control efforts aimed at reducing infection, irresponsibility, and nonproductivity at the workplace. This leads to an optimal control problem which is qualitatively analyzed using Pontryagin's Maximum Principle (PMP). Numerical simulation of the resulting optimal control problem is carried out to gain quantitative insights into the implications of the model. The simulation reveals that a multifaceted approach to the fight against the disease is more effective than single control strategies. PMID:25097663

  3. Contrasting Reasons for Discontinuation of Antiretroviral Therapy in Workplace and Public-Sector HIV Programs in South Africa

    PubMed Central

    Kielmann, Karina; Charalambous, Salome; Karstaedt, Alan S.; Hamilton, Robin; La Grange, Lettie; Fielding, Katherine L.; Churchyard, Gavin J.; Grant, Alison D.

    2011-01-01

    Abstract We investigated reasons for clinical follow-up and treatment discontinuation among HIV-infected individuals receiving antiretroviral therapy (ART) in a public-sector clinic and in a workplace clinic in South Africa. Participants in a larger cohort study who had discontinued clinical care by the seventh month of treatment were traced using previously provided locator information. Those located were administered a semistructured questionnaire regarding reasons for discontinuing clinical follow-up. Participants who had discontinued antiretroviral therapy were invited to participate in further in-depth qualitative interviews. Fifty-one of 144 (35.4%) in the workplace cohort had discontinued clinical follow-up by the seventh month of treatment. The median age of those who discontinued follow-up was 46 years and median educational level was five years. By contrast, only 16.5% (44/267) of the public-sector cohort had discontinued follow-up. Among them the median age was 37.5 years and median education was 11 years. Qualitative interviews were conducted with 17 workplace participants and 10 public-sector participants. The main reasons for attrition in the workplace were uncertainty about own HIV status and above the value of ART, poor patient–provider relationships and workplace discrimination. In the public sector, these were moving away and having no money for clinic transport. In the workplace, efforts to minimize the time between testing and treatment initiation should be balanced with the need to provide adequate baseline counseling taking into account existing concepts about HIV and ART. In the public sector, earlier diagnosis and ART initiation may help to reduce early mortality, while links to government grants may reduce attrition. PMID:21214378

  4. Mortality and morbidity among HIV type-1-infected patients during the first 5 years of a multicountry HIV workplace programme in Africa.

    PubMed

    Van der Borght, Stefaan F; Clevenbergh, Philippe; Rijckborst, Henk; Nsalou, Paul; Onyia, Ngozi; Lange, Joep M; de Wit, Tobias F Rinke; Van der Loeff, Maarten F Schim

    2009-01-01

    This study aimed to evaluate the effectiveness of an HIV workplace programme in sub-Saharan Africa. The international brewing company, Heineken, introduced an HIV workplace programme in its African subsidiaries in 2001. Beneficiaries from 16 sites in 5 countries were eligible. HIV type-1 (HIV-1)-infected individuals were assessed clinically and immunologically, and started highly active antiretroviral therapy (HAART) if they had AIDS or had a CD4+ T-cell count <300 cells/microl. In this cohort, study patients were followed-up for vital status, new AIDS events, CD4+ T-cell count and haemoglobin. Over the first 5 years of the programme, 431 adults were found to be HIV-1-infected. The mortality rate among those not yet taking HAART was 2.6 per 100 person-years of observation (pyo). By October 2006, 249 patients had started HAART at a median CD4+ T-cell count of 170 cells/microl; 59 (23.7%) patients were in CDC stage C. Among patients on HAART, 25 died and 7 were lost to follow-up. The mortality rate was 3.7 per 100 pyo overall, 14 per 100 pyo in the first 16 weeks and 2.5 per 100 pyo thereafter (P < 0.0001). At 4 years after start of treatment, 89% of patients were known to be alive. The CD4+ T-cell count increased by a median of 153 and 238 cells/microl after 1 and 4 years of HAART, respectively. In this HIV workplace programme in sub-Saharan Africa, long-term high survival was achieved.

  5. [Clinical assessment of the risk of Human Immunodeficiency virus (HIV) infection in the population consulting an anonymous and free screening center].

    PubMed

    Derancourt, C; Merle, C; Godeau, H; Vignon, F; Lemoussu, C; Verraes Derancourt, S; Bernard, P

    2004-01-01

    The anonymous and free AIDS screening centers were developed in France in 1987 to incite the general population to undergo screening for HIV infection. The aim of this paper was to conduct a prospective study describing the principle characteristics and level of risk of those consulting a center in the Year 1999. A face to face physician-consultant questionnaire was proposed to all the consultants that Year. It included 20 questions regrouped in general characteristics of the subject, number of previous screenings, reason for screening, type of risk taken, date of last risk taken, and number of sexual partners during the past 12 Months and throughout their life without the use of a condom. Two thousand six hundred seventy-eight persons consulted (sex ratio=1) aged a mean of 25.8 Years. The men were older than the women (respectively 27 versus 24.6; p<0.05). The reason for screening was a decision made by the couple in 44.6 p. 100, an unprotected sexual relationship in 47.6 p. 100 another reason in 7.6 p. 100 and drug abuse in 0.2 p. 100 of cases. The sex mode declared was heterosexual in 94.5 p. 100 and homo or bisexual in 5.4 p. 100. The majority of those consulting (66.2 p. 100) had had between 0 and 2 partners during the past 12 Months; 66 p. 100 had had more than 10 during their life without using a condom. The assessment of the global risk by the physician was: very high in 1 p. 100, high in 2.5 p. 100, moderate in 13.3 p. 100, low in 70.7 p. 100 and nil in 12.5 p. cent. Five HIV infections were diagnosed, all in persons at high or very high risk. These results should stimulate the radical differentiation of the management of persons consulting according to the level of risk identified by the medical questionnaire.

  6. Quasi-Anonymous Channels

    DTIC Science & Technology

    2003-01-01

    QUASI- ANONYMOUS CHANNELS Ira S. Moskowitz Center for High Assurance Computer Systems - Code 5540 Naval Research Laboratory, Washington, DC...Assurance Computer Systems - Code 5540 Naval Research Laboratory, Washington, DC 20375, USA Abstract Although both anonymity and covert...channels are part of the larger topic of information hiding, there also exists an intrinsic linkage between anonymity and covert channels. This linkage

  7. Anonymity in Voting Revisited

    NASA Astrophysics Data System (ADS)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  8. An Anonymity Revocation Technology for Anonymous Communication

    NASA Astrophysics Data System (ADS)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  9. Deniable Anonymous Group Authentication

    DTIC Science & Technology

    2014-02-13

    anonymity under the DDH assumption in the random oracle model. Forward Anonymity: We extend the anonymity property to situations in which an adversary...Hellman ( DDH ) assump- tions hold, that is, any probabilistic polynomial algorithm solves the DL problem and the DDH problem respectively only with a...use Aanon as a subroutine to another probabilistic polynomial time adversary Addh that solves the DDH problem with non-negligible probability. Addh

  10. Anonymous Atomic Transactions,

    DTIC Science & Technology

    1996-07-01

    We show here an example of a protocol that satisfies anonymity properties while providing strong ACID (atomic, consistent, isolated, durable...transactional properties, resolving an open question. Blinded signatures are used to certify an anonymous asymmetric key which authorizes the use of a...key is spent. We show here an example of a protocol that satisfies anonymity properties while providing strong ACID (atomic, consistent, isolated

  11. Proxies for Anonymous Routing

    DTIC Science & Technology

    1996-01-01

    Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Proxies for Anonymous Routing, 12th Annual Computer Security Applications Conference...San Diego, CA, December 9-13, 1996. Proxies for Anonymous Routing Michael G. Reed, Paul F. Syverson, and David M. Goldschlag Naval Research Laboratory...implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both

  12. Quantum anonymous voting with anonymity check

    NASA Astrophysics Data System (ADS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-02-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  13. True Anonymity Without Mixes

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail message have been used in the Internet for several years by senders of e-mail messages who do not wish to disclose their identity. Unfortunately, the degree of anonymity provided by this paradigm is limited and fragile. First, the messages sent are not truly anonymous but pseudo-anonymous since one of the mixes, at least, always knows the sender's identity. Secondly, the strength of the system to protect the sender's identity depends on the ability and the willingness of the mixes to keep the secret. If the mixes fail, the sender/'s anonymity is reduced to pieces. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet where the anonymous message is sent from a PDA which uses dynamically assigned temporary, non-personal, random IP and MAC addresses. Anonymous E-cash is used to pay for the service.

  14. Profiles of men-who-have-sex-with-men seeking anonymous voluntary HIV counseling and testing at a community-based centre in Malaysia.

    PubMed

    Koh, K C; Kamarulzaman, A

    2011-12-01

    Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur.

  15. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  16. A decade of an HIV workplace programme in armed conflict zones; a social responsibility response of the International Committee of the Red Cross.

    PubMed

    Du Mortier, Stéphane; Mukangu, Silas; Sagna, Charles; Nyffenegger, Laurent; Aebischer Perone, Sigiriya

    2016-01-01

    The International Committee of the Red Cross (ICRC) works in fragile States and in armed conflict zones. Some of them are affected by the HIV pandemic. Within the framework of its social responsibility programme concerning HIV affecting its staff members, the organization has implemented an HIV workplace programme since 2004. We carried out a retrospective analysis over 10 years. Data collected were initially essentially qualitative and process-oriented, but were complemented over the years by data on annual voluntary counselling and testing (VCT) uptake and on direct annual costs covering awareness, testing and antiretroviral therapy. The number of people covered by the programme grew from none in 2003 to 4,438 in 2015, with an increase in annual VCT uptake over the years increasing from 376 persons (14 %) in 2007 to 2,663 in 2015 (60 %). Over the years, the services were expanded from awareness raising to bringing VCT to the workplace, as well as offering testing and health coverage of other conditions and innovative approaches to facing challenges linked to situations of violence. Within its social responsibility framework, the ICRC has shown the importance and feasibility of a workplace HIV programme in conflict zones. A sustainable workplace programme in these conflict settings requires constant adaptation, with regular follow-up given the relatively high turnover of staff, and ensuring sustainable stocks of condoms and antiretroviral drugs.

  17. Long-term voluntary counseling and testing (VCT) uptake dynamics in a multicountry HIV workplace program in sub-Saharan Africa.

    PubMed

    Van der Borght, Stefaan F; Schim van der Loeff, Maarten F; Clevenbergh, Philippe; Kabarega, Jean Pierre; Kamo, Emmanuel; van Cranenburgh, Katinka; Rijckborst, Henk; Lange, Joep M; Rinke de Wit, Tobias F

    2010-02-01

    High uptake of HIV voluntary counseling and testing (VCT) services is important for the success of HIV workplace programs in sub-Saharan Africa. From 2001 onwards, Heineken, a multinational brewing company, implemented a comprehensive HIV prevention and treatment program for employees and their dependents of its African subsidiaries. Confidential in-house VCT is part of this program. VCT uptake dynamics over time, and factors associated with early uptake were studied. Between September 2001 and December 2007, 9723 adult beneficiaries were tested for HIV in 14 company sites in five African countries. Three hundred and seventy (3.8%) of tested persons were infected with HIV-1. During the first 12 months 1412 tests were done, compared to 8311 tests in the subsequent years. The annual average uptake of testing among eligible persons varied between 15 and 32%. The coverage was higher among female compared to male employees, and higher among female compared to male spouses. Distinct peaks in uptake were linked to specific local events. HIV-1 infected persons were significantly more likely to be tested in the early period. The proportion of HIV-1 infected persons among testees was 8.8% in the first 12 months compared to 3.0% in the subsequent period (p<0.001). HIV-1 infected persons diagnosed in the early period were in a more advanced clinical stage, and had a significantly lower CD4 count than those tested later (median CD4 count 227 vs. 314 cells/microl; p=0.002). In this workplace program, HIV-1 infected individuals came earlier for an HIV test than uninfected people, and people with advanced infection came earlier than those with less advanced disease. Employees' spouses are harder to reach than employees and extra efforts should be undertaken to reach them as well. Uptake of HIV testing can be actively influenced by educational or promotional activities.

  18. Working It Out: Workplace Experiences of Individuals with HIV and Individuals with Cancer.

    ERIC Educational Resources Information Center

    Fesko, Sheila Lynch

    1999-01-01

    Thirty-two individuals with cancer or HIV (human immunodeficiency virus) were interviewed concerning their employment related experiences and concerns. Findings indicated that the decision to tell their supervisor and/or co-workers about their health status varied substantially between individuals with HIV and those with cancer. All study…

  19. Workplace discrimination and HIV/AIDS: the national EEOC ADA research project.

    PubMed

    Conyers, Liza; Boomer, K B; McMahon, Brian T

    2005-01-01

    This article utilizes data from the Equal Employment Opportunity Commission's Integrated Mission System database to document the levels of employment discrimination involving individuals with HIV/AIDS. The researchers explore the theory that the nature of HIV/AIDS related employment discrimination is rooted in deeper stigmatization than discrimination against other disability groups. Researchers compare and contrast key demographic characteristics of Charging Parties and Respondents involved in HIV/AIDS related allegations of discrimination and their proportion of EEOC merit resolutions to those of persons with other physical, sensory, and neurological impairments. Findings indicate that, in contrast to the general disability group, HIV/AIDS was more likely to be male, ethnic minorities, between the ages of 25-44, in white collar jobs, in the South and West and to work for businesses with 15 to 100 employees. Additionally, the allegations in HIV/AIDS were more likely to receive merit resolution from the EEOC by a large difference of ten percent.

  20. Anonymous Quantum Communication

    NASA Astrophysics Data System (ADS)

    Brassard, Gilles; Broadbent, Anne; Fitzsimons, Joseph; Gambs, Sébastien; Tapp, Alain

    We introduce the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).

  1. [Opinion of undergraduate health sciences students towards ethical issues related to HIV-positive persons in schools, workplaces and health centers].

    PubMed

    Apellaniz, Alfonso; Manzanaro, Ricardo

    2012-01-01

    To describe the opinion of undergraduate health sciences students in the Basque Country universities (UPV/EHU) regarding ethical issues related to HIV-positive persons in schools, workplaces and health centers. Our population consisted of medical, nursing and dental undergraduate students attending UPV/EHU. An opinion survey was conducted among students attending lectures, on a randomly selected date in 2002-2003. The questionnaire included several items on ethical conflicts related to HIV-positive persons in different settings. Item responses consisted of a Likert-type scale with five possible levels of agreement (from "strongly disagree" to "strongly agree"), as well as the option "I do not want to answer/I have no opinion about this". 529 completed questionnaires were collected. 69% of respondents reported total disagreement with refusing to admit HIV+ students to primary schools, and 77% with dismissal of HIV+ workers. Approximately 90% of respondents felt managers should be aware of the HIV+ status of their employees. 78% of the students did not report disagreement with having HIV+ schoolmates in classrooms. Respondents generally disagreed with employment limitations for HIV+ health care workers, 60% strongly disagreed with health workers refusing to treat HIV+ persons, 69% considered that HIV testing should be compulsory for health workers, and 55% that health workers should know their patients' HIV status. In general terms, our students are against social and employment limitations targeting HIV+ persons, but favor disclosure of HIV status in schools and health centres. Copyright belongs to the Societat Catalana de Seguretat i Medicina del Treball.

  2. [Incidence of HIV infection in consultants reviewed after a first negative test in an anonymous and free screening center at the Institut Pasteur of Cambodia, 1996-1999].

    PubMed

    Kruy, S L; Glaziou, P; Flye Sainte Marie, F; Buisson, Y

    2001-12-01

    A retrospective study was performed to determine the incidence of HIV seroconversion among repeat consultants attending the voluntary testing and counselling centre of the Institut Pasteur of Cambodia as well as factors associated with HIV seroconversion. From 1996 to 1999, 5541 repeat consultants were selected for the study. Exclusion criteria included being aged under 15 years, having initially tested positive or inconclusive and a time span of fewer than 30 days since the last test. In all, 276 persons had seroconverted to HIV, giving an incidence rate of 5.56 per 100 person-years. The seroconversion rate declined from 8.46% in 1996, to 3.06% in 1999 (chi 2 test for trend, p = 10(-5)). Among the risk factors analysed, 3 were significantly associated with lack of seroconversion: being a student (RR = 0.53, p = 0.032) or a civil servant (RR = 0.63, p = 0.012) and systematic condom use with causal partners (RR = 0.37, p = 10(-5)). The decline of HIV seroconversion among repeat consultants attending the VCT centre over the study period may reflect changes in risk behaviour and the beneficial impact of counselling.

  3. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  4. Teaching Business Students about HIV and AIDS in the Workplace: Curriculum and Resources

    ERIC Educational Resources Information Center

    Miller, Alan N.

    2008-01-01

    The significant and increasing number of people in the U.S. and global work-forces who are infected with HIV or who have AIDS must be managed differently from those who are not infected and those who have other life-threatening diseases. Business schools can prepare their MBA students to effectively, legally, and compassionately manage people with…

  5. Primary antiretroviral drug resistance in newly human immunodeficiency virus-diagnosed individuals testing anonymously and confidentially.

    PubMed

    Markovitz, Amanda R; Thibault, Christina S; Brandauer, Peter W; Buskin, Susan E

    2011-06-01

    The purpose of this study was to determine if anonymous and confidential testers differ in recency of human immunodeficiency virus (HIV) infection at time of testing and prevalence of antiretroviral drug (ARV) resistance. We examined data from the Centers for Disease Control and Prevention-sponsored Antiretroviral Drug Resistance Testing project, which performed genotypic testing on leftover HIV diagnostic serum specimens of confidentially and anonymously tested ARV-naïve persons newly diagnosed with HIV in Colorado (n = 365 at 11 sites) and King County, Washington (n = 492 at 44 sites). The serologic testing algorithm for recent HIV seroconversion was used to classify people as likely to have been recently infected or not. Type of testing, anonymous or confidential, was not significantly associated with either timing of HIV testing by serologic testing algorithm for recent HIV seroconversion or resistance rates. Mutations conferring any level of ARV resistance were present in 17% of testers, and high-level resistance mutations were present in 10%. Anonymous testers were significantly more likely to have CD4+ counts >500 cells per mm(3) (45% vs. 28%; p = 0.018), indicative of an early infection. This study indicates that anonymous testers have demographic differences relative to confidential HIV testers but were not more likely to exhibit drug resistance. Findings related to when in the course of disease anonymous testers are tested are inconsistent, but anonymous testers had higher CD4 counts, which indicates early testing and is consistent with other studies.

  6. Covert Channels and Anonymizing Networks

    DTIC Science & Technology

    2003-10-30

    Covert Channels and Anonymizing Networks Ira S. Moskowitz Center for High Assurance Computer Systems Naval Research Laboratory Washington, DC 20375...ABSTRACT There have long been threads of investigation into covert channels, and threads of investigation into anonymity , but these two closely related...channel capacity and anonymity , and poses more questions than it answers. Even this preliminary work has proven difficult, but in this investigation lies

  7. Anonymous Connections and Onion Routing

    DTIC Science & Technology

    1998-01-01

    Anonymous Connections and Onion Routing Michael G. Reed, Paul F. Syverson, and David M. Goldschlag Naval Research Laboratory Abstract Onion Routing...eavesdropping and trac analysis. Onion routing’s anonymous connections are bidirectional and near real- time, and can be used anywhere a socket connection...can be used. Any identifying information must be in the data stream carried over an anonymous connec- tion. An onion is a data structure that is

  8. Harm reduction measures and injecting inside prison versus mandatory drugs testing: results of a cross sectional anonymous questionnaire survey. The European Commission Network on HIV Infection and Hepatitis in Prison.

    PubMed Central

    Bird, A. G.; Gore, S. M.; Hutchinson, S. J.; Lewis, S. C.; Cameron, S.; Burns, S.

    1997-01-01

    OBJECTIVES: (a) To determine both the frequency of injecting inside prison and use of sterilising tablets to clean needles in the previous four weeks; (b) to assess the efficiency of random mandatory drugs testing at detecting prisoners who inject heroin inside prison; (c) to determine the percentage of prisoners who had been offered vaccination against hepatitis B. DESIGN: Cross sectional willing anonymous salivary HIV surveillance linked to a self completion risk factor questionnaire. SETTING: Lowmoss prison, Glasgow, and Aberdeen prison on 11 and 30 October 1996. SUBJECTS: 293 (94%) of all 312 inmates at Lowmoss and 146 (93%) of all 157 at Aberdeen, resulting in 286 and 143 valid questionnaires. MAIN OUTCOME MEASURES: Frequency of injecting inside prison in the previous four weeks by injector inmates who had been in prison for at least four weeks. RESULTS: 116 (41%) Lowmoss and 53 (37%) Aberdeen prisoners had a history of injecting drug use but only 4% of inmates (17/395; 95% confidence interval 2% to 6%) had ever been offered vaccination against hepatitis B. 42 Lowmoss prisoners (estimated 207 injections and 258 uses of sterilising tablets) and 31 Aberdeen prisoners (229 injections, 221 uses) had injected inside prison in the previous four weeks. The prisons together held 112 injector inmates who had been in prison for more than four weeks, of whom 57 (51%; 42% to 60%) had injected in prison in the past four weeks; their estimated mean number of injections was 6.0 (SD 5.7). Prisoners injecting heroin six times in four weeks will test positive in random mandatory drugs testing on at most 18 days out of 28. CONCLUSIONS: Sterilising tablets and hepatitis B vaccination should be offered to all prisoners. Random mandatory drugs testing seriously underestimates injector inmates' harm reduction needs. PMID:9233321

  9. On Backward-Style Anonymity Verification

    NASA Astrophysics Data System (ADS)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  10. HIV/AIDS Basics

    MedlinePlus

    ... Partner Spotlight Awareness Days Get Tested Find an HIV testing site near you. Enter ZIP code or ... AIDS Get Email Updates on AAA Anonymous Feedback HIV/AIDS Media Infographics Syndicated Content Podcasts Slide Sets ...

  11. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  12. HIV testing and attitudes among the working-age population of Japan: annual health checkups may offer an effective way forwards

    PubMed Central

    ISHIMARU, Tomohiro; WADA, Koji; SMITH, Derek R

    2015-01-01

    In Japan, Voluntary Counselling and Testing (VCT) for HIV has been recommended for people concerned about their infection risk, especially those in high-risk groups. Although HIV awareness has declined in this country somewhat during recent years, the number of newly-infected cases has been increasing. The purpose of the current study therefore, was to determine the prevalence of HIV testing, individuals’ reasons for being tested, and the overall acceptance of HIV testing among working-age Japanese. We utilized an anonymous, nationwide survey which was administered to a total of 3,055 participants aged 20–69 yr. The lifetime prevalence of HIV testing was 14% (2% within the past year). A gap was observed between a prior history of HIV testing and willingness to be tested in future (32%) or willingness to be tested during health checkups in the workplace (41%). HIV testing appears to have only been conducted among a limited number of working-age Japanese adults, even though some reported a willingness to be tested. Opportunities for VCT during workplace health checkups might offer an immediate and positive way forwards in the fight against HIV; however, privacy protection for test results and the acceptance of HIV-positive employees should be carefully considered in the workplace. PMID:26423333

  13. HIV testing and attitudes among the working-age population of Japan: annual health checkups may offer an effective way forwards.

    PubMed

    Ishimaru, Tomohiro; Wada, Koji; Smith, Derek R

    2016-01-01

    In Japan, Voluntary Counselling and Testing (VCT) for HIV has been recommended for people concerned about their infection risk, especially those in high-risk groups. Although HIV awareness has declined in this country somewhat during recent years, the number of newly-infected cases has been increasing. The purpose of the current study therefore, was to determine the prevalence of HIV testing, individuals' reasons for being tested, and the overall acceptance of HIV testing among working-age Japanese. We utilized an anonymous, nationwide survey which was administered to a total of 3,055 participants aged 20-69 yr. The lifetime prevalence of HIV testing was 14% (2% within the past year). A gap was observed between a prior history of HIV testing and willingness to be tested in future (32%) or willingness to be tested during health checkups in the workplace (41%). HIV testing appears to have only been conducted among a limited number of working-age Japanese adults, even though some reported a willingness to be tested. Opportunities for VCT during workplace health checkups might offer an immediate and positive way forwards in the fight against HIV; however, privacy protection for test results and the acceptance of HIV-positive employees should be carefully considered in the workplace.

  14. HIV-related knowledge, attitudes and practice among health care workers in Montenegro.

    PubMed

    Gledović, Zorana; Rakočević, Božidarka; Mugoša, Boban; Grgurević, Anita

    2015-03-01

    The objective of the present study was to assess HIV-related knowledge, attitudes, and practice of health care workers (HCWs) in Montenegro. A cross-sectional study was conducted in the University Clinical Centre of Montenegro in Podgorica. A self-administered anonymous questionnaire was used for data collecting. Out of 526 HCWs, 422 were included in the survey and response rate was 80%. An insufficient level of knowledge on HIV transmission and the risk after exposure was observed generally, although the knowledge was better in physicians compared to other HCWs categories. A rather high proportion of HCWs showed inappropriate attitude regarding the need of HIV testing of all hospitalized patients (64.7%) and obligation of HIV+ patient to report his/her HIV status (88.9%) in order to practice universal precaution. Additionally, 6.2% HCWs would refuse to treat an HIV+ patient. More than a half (55.7%) of study participants were educated in HIV/AIDS and 15.9% of them were HIV tested. Majority of HCWs (67.5%) always applied universal precautions during their daily work with patients. In spite of applying protective devices, number of accidents was great. A continuous education is necessary to increase the level of knowledge of HCWs about the risk of infection at the workplace. This would potentially influence the modification of their attitudes regarding HIV patients and improve prevention at the workplace. Continuous research regarding the professional risk would provide better health and safety among medical staff.

  15. Anonymity and Historical-Anonymity in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  16. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  17. Active voluntary counseling and testing with integrated CD4 count service can enhance early HIV testing and early CD4 count measurement: experiences from the Thai Red Cross Anonymous Clinic in Bangkok, Thailand.

    PubMed

    Phanuphak, Nittaya; Pattanachaiwit, Supanit; Pankam, Tippawan; Pima, Warabhorn; Avihingsanon, Anchalee; Teeratakulpisarn, Nipat; Phanuphak, Praphan

    2011-03-01

    Low CD4 count at antiretroviral therapy initiation is common both in developed and developing countries. Active voluntary counseling and testing (VCT) center with integrated CD4 count service may facilitate early HIV testing and CD4 count measurement. We analyzed data from clients who had HIV testing at our VCT center between June 1, 2006 to May 31, 2009. HIV testing was provided through routine VCT, health check-up, nutrition, and sexual health services. CD4 count measurement was available in the clinic. The first CD4 count and duration between HIV diagnosis and the first CD4 count measurement were extracted from the database along with available demographic data. Among 19,525 Thai clients who had HIV testing, 2580 clients (13.2%) were tested HIV positive for the first time. CD4 count measurement was performed in 73.3% of HIV-positive clients and 91.4% of these occurred within the first month of HIV diagnosis. Median first CD4 count was 287.0 (IQR = 114.0-434.3) cells per cubic millimeter, 62% had CD4 count <350 cells per cubic millimeter. As HIV programs are moving toward earlier initiation of antiretroviral therapy, efforts are needed to promote "early HIV testing" among general population with different levels of HIV risks and to enhance "early CD4 count measurement" after HIV diagnosis.

  18. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  19. Association of Knowledge of HIV and Other Factors with Individuals’ Attitudes toward HIV Infection: A National Cross-Sectional Survey among the Japanese Non-Medical Working Population

    PubMed Central

    Wang, Guoqin; Wada, Koji; Hoshi, Keika; Sasaki, Nanae; Ezoe, Satoshi; Satoh, Toshihiko

    2013-01-01

    Background The stigma of and discrimination because of HIV has been described as the most important obstacle to prevention and treatment efforts. The purpose of this study was to investigate negative attitudes and prejudice toward HIV among the Japanese non-medical working population and to explore contributing factors. Methods An online anonymous nationwide survey involving approximately 3,000 individuals was conducted in Japan. Questions ranged from background information and HIV knowledge to individuals’ attitudes towards HIV infection in the workplace. Descriptive statistics and logistic regression were applied for analysis. Results Thirty-three percent of participants feared transmission of HIV from infected colleagues, 34% tended to avoid contact with them and 40% had prejudiced opinions about HIV infection. Despite a relatively high level of knowledge of HIV/AIDS overall (11.9±3.3 from 15 points), only 50% of individuals were aware of some issues. Greater knowledge was associated with less negative attitudes towards HIV infection (OR 0.39, 95% CI 0.31–0.48 for prejudiced opinion, high compared with low level of knowledge), whereas greater health consciousness was inversely related to attitude (OR 1.97, 95% CI 1.50–2.58 for prejudiced opinion, high compared with low health consciousness). Conclusion Knowledge neutralizes peoples’ negative attitudes towards HIV infection, whereas greater health consciousness may worsen them. Educational programs should balance knowledge with health consciousness to improve the efficacy of HIV interventions. PMID:23874644

  20. k-Times Anonymous Authentication

    NASA Astrophysics Data System (ADS)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  1. Workplace Violence

    MedlinePlus

    ... violence such as physical assaults, or threatening or violent behavior, are a growing problem in the workplace. ... experience workplace violence. Encourages prompt reporting of all violent incidents and recordkeeping of incidents to assess risk ...

  2. Application of EU tissue and cell directive screening protocols to anonymous oocyte donors in western Ukraine: data from an Irish IVF programme.

    PubMed

    Walsh, A P H; Omar, A B; Collins, G S; Murray, G U; Walsh, D J; Salma, U; Sills, E Scott

    2010-01-01

    Anonymous oocyte donation in the EU proceeds only after rigorous screening designed to ensure gamete safety. If anonymous donor gametes originating from outside EU territory are used by EU patients, donor testing must conform to the same standards as if gamete procurement had occurred in the EU. In Ireland, IVF recipients can be matched to anonymous donors in the Ukraine (a non-EU country). This investigation describes the evolution of anonymous oocyte donor screening methods during this period and associated results. Data were reviewed for all participants in an anonymous donor oocyte IVF programme from 2006 to 2009, when testing consistent with contemporary EU screening requirements was performed on all Ukrainian oocyte donors. HIV and hepatitis tests were aggregated from 314 anonymous oocyte donors and 265 recipients. The results included 5,524 Ukrainian women who were interviewed and 314 of these entered the programme (5.7% accession rate). Mean age of anonymous oocyte donors was 27.9 years; all had achieved at least one delivery. No case of hepatitis or HIV was detected at initial screening or at oocyte procurement. This is the first study of HIV and hepatitis incidence specifically among Ukrainian oocyte donors. We find anonymous oocyte donors to be a low-risk group, despite a high background HIV rate. Following full disclosure of the donation process, most Ukrainian women wishing to volunteer as anonymous oocyte donors do not participate. Current EU screening requirements appear adequate to maintain patient safety in the context of anonymous donor oocyte IVF.

  3. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  4. More Anonymous Onion Routing Through Trust

    DTIC Science & Technology

    2009-07-01

    attempt to compromise his anonymity . How should he take this trust into account when he selects his paths? 2.1. The model To make this question concrete...It also does not take into account the total effect of an adversary’s actions on a user’s anonymity , such as the analysis performed in [24]. The...More Anonymous Onion Routing Through Trust Aaron Johnson Computer Science Department Yale University New Haven, CT 06520 USA aaron.johnson@yale.edu

  5. LIRA: Lightweight Incentivized Routing for Anonymity

    DTIC Science & Technology

    2013-02-01

    accountability that plagues PAR and XPAY, wherein anonymity inherently de- creases as the ability to detect cheaters improves. Ngan et al. propose a...LIRA: Lightweight Incentivized Routing for Anonymity Rob Jansen Aaron Johnson U.S. Naval Research Laboratory {rob.g.jansen, aaron.m.johnson...prob- lems stemming from a lack of incentives for volunteers to contribute. Insufficient capacity limits scalability and harms the anonymity of its

  6. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    Protocols using Anonymous Connections: Mobile Applications Michael G. Reed, Paul F. Syverson, and David M. Goldschlag ? Naval Research Laboratory...Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take...encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari

  7. HIV and employment.

    PubMed

    McGoldrick, C

    2012-06-01

    According to 2009 statistics, the human immunodeficiency virus (HIV) infected an estimated 86,500 individuals within the UK, although around one-quarter were unaware of their infection. In the majority of cases, it is now considered a long-term controllable but incurable infection. Indeed, most HIV-positive individuals are able to work. Employment is across most, if not all, workforce sectors and protection against workplace discrimination is provided by the Equality Act 2010. Issues including confidentiality, workplace adjustments, vaccinations and travel restrictions may be relevant to the occupational health of HIV-positive workers. There are special considerations concerning HIV-infected health care workers, including avoidance of performing exposure-prone procedures. Prevention of HIV acquisition in the workplace is relevant to a diverse range of occupational environments, and HIV post-exposure prophylaxis should be considered after potential HIV exposure incidents. If a worker contracts HIV by occupational means, financial help may be available.

  8. The Role of Anonymity in Peer Assessment

    ERIC Educational Resources Information Center

    Li, Lan

    2017-01-01

    This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students' performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students…

  9. Anonymity in Classroom Voting and Debating

    ERIC Educational Resources Information Center

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  10. Legal Issues in Anonymity and Pseudonymity.

    ERIC Educational Resources Information Center

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  11. Self-tallying quantum anonymous voting

    NASA Astrophysics Data System (ADS)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  12. Legal Issues in Anonymity and Pseudonymity.

    ERIC Educational Resources Information Center

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  13. The Role of Anonymity in Peer Assessment

    ERIC Educational Resources Information Center

    Li, Lan

    2017-01-01

    This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students' performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students…

  14. Dentistry and HIV/AIDS related stigma

    PubMed Central

    Elizondo, Jesus Eduardo; Treviño, Ana Cecilia; Violant, Deborah

    2015-01-01

    OBJECTIVE To analyze HIV/AIDS positive individual’s perception and attitudes regarding dental services. METHODS One hundred and thirty-four subjects (30.0% of women and 70.0% of men) from Nuevo León, Mexico, took part in the study (2014). They filled out structured, analytical, self-administered, anonymous questionnaires. Besides the sociodemographic variables, the perception regarding public and private dental services and related professionals was evaluated, as well as the perceived stigma associated with HIV/AIDS, through a Likert-type scale. The statistical evaluation included a factorial and a non-hierarchical cluster analysis. RESULTS Social inequalities were found regarding the search for public and private dental professionals and services. Most subjects reported omitting their HIV serodiagnosis and agreed that dentists must be trained and qualified to treat patients with HIV/AIDS. The factorial analysis revealed two elements: experiences of stigma and discrimination in dental appointments and feelings of concern regarding the attitudes of professionals or their teams concerning patients’ HIV serodiagnosis. The cluster analysis identified three groups: users who have not experienced stigma or discrimination (85.0%); the ones who have not had those experiences, but feel somewhat concerned (12.7%); and the ones who underwent stigma and discrimination and feel concerned (2.3%). CONCLUSIONS We observed a low percentage of stigma and discrimination in dental appointments; however, most HIV/AIDS patients do not reveal their serodiagnosis to dentists out of fear of being rejected. Such fact implies a workplace hazard to dental professionals, but especially to the very own health of HIV/AIDS patients, as dentists will not be able to provide them a proper clinical and pharmaceutical treatment. PMID:26538100

  15. Dentistry and HIV/AIDS related stigma.

    PubMed

    Elizondo, Jesus Eduardo; Treviño, Ana Cecilia; Violant, Deborah

    2015-01-01

    To analyze HIV/AIDS positive individual's perception and attitudes regarding dental services. One hundred and thirty-four subjects (30.0% of women and 70.0% of men) from Nuevo León, Mexico, took part in the study (2014). They filled out structured, analytical, self-administered, anonymous questionnaires. Besides the sociodemographic variables, the perception regarding public and private dental services and related professionals was evaluated, as well as the perceived stigma associated with HIV/AIDS, through a Likert-type scale. The statistical evaluation included a factorial and a non-hierarchical cluster analysis. Social inequalities were found regarding the search for public and private dental professionals and services. Most subjects reported omitting their HIV serodiagnosis and agreed that dentists must be trained and qualified to treat patients with HIV/AIDS. The factorial analysis revealed two elements: experiences of stigma and discrimination in dental appointments and feelings of concern regarding the attitudes of professionals or their teams concerning patients' HIV serodiagnosis. The cluster analysis identified three groups: users who have not experienced stigma or discrimination (85.0%); the ones who have not had those experiences, but feel somewhat concerned (12.7%); and the ones who underwent stigma and discrimination and feel concerned (2.3%). We observed a low percentage of stigma and discrimination in dental appointments; however, most HIV/AIDS patients do not reveal their serodiagnosis to dentists out of fear of being rejected. Such fact implies a workplace hazard to dental professionals, but especially to the very own health of HIV/AIDS patients, as dentists will not be able to provide them a proper clinical and pharmaceutical treatment.

  16. Consultation on AIDS and the workplace.

    PubMed

    1988-12-01

    The 1988 Consultation on Acquired Immunodeficiency Syndrome (AIDS) and the Workplace, organized by the World Health Organization (WHO), addressed 3 issues: 1) risk factors associated with human immunodeficiency virus (HIV) infection in the workplace, 2) the response of businesses and workers to the AIDS epidemic, and 3) use of the workplace for AIDS education. There is no evidence to suggest that HIV can be transmitted by casual, person-to-person contact in the workplace. The central policy issue for businesses concerns protection of the human rights of workers with HIV infection. Most workers with HIV/AIDS want to continue working as long as they are able to, and they should be enabled to contribute their creativity and productivity in a supportive occupational setting. Consistent policies and procedures should be developed at national and enterprise levels before HIV-related questions arise in the workplace. Such policies should be communicated to all concerned, continually reviewed in the light of scientific and epidemiologic evidence, monitored for their successful implementation, and evaluated for their effectiveness. Pre-employment HIV/AIDS screening, whether for assessment of fitness to work or for insurance purposes, should not be required and raises serious concerns about discrimination. Moreover, there should be no obligation on the worker's part to inform his or her employer if HIV infection develops. Information and educational activities at the workplace are essential to create the climate of collective responsibility and mutual understanding required to protect individuals with HIV or AIDS from stigmatization and discrimination by co-workers, employers or clients, and unions.

  17. A flexible approach to distributed data anonymization.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets.

  18. [Anonymous birth and neonaticide in Tyrol].

    PubMed

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  19. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  20. Comments on ``Anonymous Reviews'' From D. Fisher

    NASA Astrophysics Data System (ADS)

    Fisher, David

    I'd like to suggest that the recent letters complaining about reviewers' anonymity are on the wrong track. What we need is more anonymity, not less: we need double-blind mandatory anonymity. The main argument proposed so far is the unfairness of not being able to confront the reviewers' criticisms. But you don't need to know who someone is to be able to argue against their ideas. Reviewers' reports are spelled out clearly and can be rebutted without getting into personalities.

  1. Anonymity in P2P Systems

    NASA Astrophysics Data System (ADS)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  2. Stationary Anonymous Sequential Games with Undiscounted Rewards.

    PubMed

    Więcek, Piotr; Altman, Eitan

    Stationary anonymous sequential games with undiscounted rewards are a special class of games that combine features from both population games (infinitely many players) with stochastic games. We extend the theory for these games to the cases of total expected reward as well as to the expected average reward. We show that in the anonymous sequential game equilibria correspond to the limits of those of related finite population games as the number of players grows to infinity. We provide examples to illustrate our results.

  3. Anon-Pass: Practical Anonymous Subscriptions.

    PubMed

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  4. Hepatitis C and HIV

    MedlinePlus

    ... Changes Find Care & Treatment You and Your Provider Discrimination from Providers Locating HIV/AIDS Services Addressing the ... Dating and Marriage Family Planning Mixed-Status Couples Discrimination Legal Issues Workplace Issues Federal Resources Federal Programs ...

  5. Hepatitis B and HIV

    MedlinePlus

    ... Changes Find Care & Treatment You and Your Provider Discrimination from Providers Locating HIV/AIDS Services Addressing the ... Dating and Marriage Family Planning Mixed-Status Couples Discrimination Legal Issues Workplace Issues Federal Resources Federal Programs ...

  6. Anon-Pass: Practical Anonymous Subscriptions

    PubMed Central

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  7. Performance evaluation of various K- anonymity techniques

    NASA Astrophysics Data System (ADS)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  8. Workplace Literacy.

    ERIC Educational Resources Information Center

    Howden, Gale

    The Palm Beach Post newspaper in Florida provides a workplace literacy program with six classes in three programs: adult basic education; English for speakers of other languages; and high school equivalency in preparation for a General Educational Development diploma. Employees receive work-release time or are paid to attend class. Class size is…

  9. Changing Workplace.

    ERIC Educational Resources Information Center

    1999

    These four papers are from a symposium on changing workplaces. "Women Entrepreneurs: Maintaining Business Success through Human Resource Development" (Dominic G. Kamau , Gary N. McLean, Alexander Ardishvili) investigates contributions of human resource development (HRD) to business success and reports the following: (1) women can be…

  10. Changing Workplace.

    ERIC Educational Resources Information Center

    1998

    This document contains four papers from a symposium on the changing workplace and its relationship to human resource development (HRD). In "Globalization, Immigration and Quality of Life Dynamics for Reverse Brain Drains" (Ben-Chieh Liu, Maw Lin Lee, Hau-Lien), the factors responsible for the brain drain from Taiwan to the United States…

  11. Changing Workplace.

    ERIC Educational Resources Information Center

    1999

    These four papers are from a symposium on changing workplaces. "Women Entrepreneurs: Maintaining Business Success through Human Resource Development" (Dominic G. Kamau , Gary N. McLean, Alexander Ardishvili) investigates contributions of human resource development (HRD) to business success and reports the following: (1) women can be…

  12. Changing Workplace.

    ERIC Educational Resources Information Center

    1998

    This document contains four papers from a symposium on the changing workplace and its relationship to human resource development (HRD). In "Globalization, Immigration and Quality of Life Dynamics for Reverse Brain Drains" (Ben-Chieh Liu, Maw Lin Lee, Hau-Lien), the factors responsible for the brain drain from Taiwan to the United States…

  13. Health-care workers' perspectives on workplace safety, infection control, and drug-resistant tuberculosis in a high-burden HIV setting.

    PubMed

    Zelnick, Jennifer R; Gibbs, Andrew; Loveday, Marian; Padayatchi, Nesri; O'Donnell, Max R

    2013-08-01

    Drug-resistant tuberculosis (TB) is an occupational hazard for health-care workers (HCWs) in South Africa. We undertook this qualitative study to contextualize epidemiological findings suggesting that HCWs' elevated risk of drug-resistant TB is related to workplace exposure. A total of 55 HCWs and 7 hospital managers participated in focus groups and interviews about infection control (IC). Participants discussed caring for patients with drug-resistant TB, IC measures, occupational health programs, also stigma and support in the workplace. Key themes included: (i) lack of resources that hinders IC, (ii) distrust of IC efforts among HCWs, and (iii) disproportionate focus on individual-level personal protections, particularly N95 masks. IC programs should be evaluated, and the impact of new policies to rapidly diagnose drug-resistant TB and decentralize treatment should be assessed as part of the effort to control drug-resistant TB and create a safe workplace.

  14. Comments on “Anonymous reviews”

    NASA Astrophysics Data System (ADS)

    Okal, Emille A.

    I would like to add the triple perspective of a now-retired editor (GRL, 1993-19997), a reviewer and author to the ongoing debate in Eos about anonymous versus signed reviews.As an editor, I did not keep precise statistics, but my recollection would be that a little under (perhaps 40%) of the more than 3000 reviews I handled were signed. While some sort of "trend" expectedly existed between glowing reviews and signed ones, the correlation would probably not have passed a statistical test. By and large, my reviewers, whether or not they waived anonymity, were a professional and responsible pool, and the kind of personal and potentially unethical antagonisms described by Myrl Beck was the rare exception, rather than the rule, among anonymous reviews. The careful editor should be able to recognize this attitude in the tone and style of the review, and through comparison with other reviews of the same paper.

  15. Academic freedom, public reactions, and anonymity.

    PubMed

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims.

  16. Workplace Design

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The Anthropometric Source Book was developed based on Johnson Space Center project of anthropometry, the study of the size, shape and motion characteristics of the human body. Designed primarily for use by NASA, the military services and aerospace contractors, the book was also intended to help non-aerospace engineers, architects, and others engaged in design of clothing, equipment and workplaces. An example of its use by Eastman Kodak Company is the company's application of the data to design efficient, productive and comfortable workplaces for employees in the Rochester, NY processing laboratories. The sourcebook was used to determine such dimensions as leg space, work surface height and thickness, employee reach distances, proper height for computer terminal screen, seat height and knee space.

  17. Structure Preserving Anonymization of Router Configuration Data

    DTIC Science & Technology

    2009-04-01

    regular expressions, and robustly coping with more than 200 versions of the configuration language. Conventional tools and techniques are poorly suited...regular expressions, and robustly coping with more than 200 versions of the configuration language. Conventional tools and techniques are poorly...configuration language, so conventional compiler tools and techniques are poorly suited to the problem. Third, the anonymization needs to support a

  18. Minimizing risk in anonymous egg donation.

    PubMed

    Ahuja, K K; Simons, E G; Nair, S; Rimington, M R; Armar, N A

    2003-11-01

    Assisted conception carries with it known and putative medical and surgical risks. Exposing healthy women to these risks in order to harvest eggs for donation when a safer alternative exists is morally and ethically unacceptable. Egg sharing minimizes risk and provides a source of eggs for donation. Anonymity protects all parties involved and should not be removed.

  19. In Defence of Anonymity: Rejoining the Criticism

    ERIC Educational Resources Information Center

    Kelly, Anthony

    2009-01-01

    This article is a response to the growing criticisms of the British Educational Research Association (BERA) and Economic and Social Research Council (ESRC) ethical guidelines on anonymity and pseudonymity as default positions for participants in qualitative educational research. It discusses and responds to those criticisms under four…

  20. Narcotics Anonymous: Understanding the "Bridge of Recovery."

    ERIC Educational Resources Information Center

    Ronel, Natti

    1998-01-01

    Narcotics Anonymous (NA) is investigated as a subculture of recovery bridging the drug subculture and the prevailing culture. A phenomenological study of NA in Israel is reported. Innovation, cultural conflict, the value of recovery and its norms, supporting social mechanisms, limitations of the program, and intercultural attributes are…

  1. Narcotics Anonymous: Understanding the "Bridge of Recovery."

    ERIC Educational Resources Information Center

    Ronel, Natti

    1998-01-01

    Narcotics Anonymous (NA) is investigated as a subculture of recovery bridging the drug subculture and the prevailing culture. A phenomenological study of NA in Israel is reported. Innovation, cultural conflict, the value of recovery and its norms, supporting social mechanisms, limitations of the program, and intercultural attributes are…

  2. Altruism and anonymity: A behavioral analysis.

    PubMed

    Locey, Matthew L; Rachlin, Howard

    2015-09-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting - the rate at which increases in social distance decrease value to the participant - was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Anonymization server system for DICOM images

    NASA Astrophysics Data System (ADS)

    Suzuki, H.; Amano, M.; Kubo, M.; Kawata, Y.; Niki, N.; Nishitani, H.

    2007-03-01

    We have developed an anonymization system for DICOM images. It requires consent from the patient to use the DICOM images for research or education. However, providing the DICOM image to the other facilities is not safe because it contains a lot of personal data. Our system is a server that provides anonymization service of DICOM images for users in the facility. The distinctive features of the system are, input interface, flexible anonymization policy, and automatic body part identification. In the first feature, we can use the anonymization service on the existing DICOM workstations. In the second feature, we can select a best policy fitting for the Protection of personal data that is ruled by each medical facility. In the third feature, we can identify the body parts that are included in the input image set, even if the set lacks the body part tag in DICOM header. We installed the system for the first time to a hospital in December 2005. Currently, the system is working in other four facilities. In this paper we describe the system and how it works.

  4. Altruism and Anonymity: A Behavioral Analysis

    PubMed Central

    Locey, Matthew L.; Rachlin, Howard

    2015-01-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting – the rate at which increases in social distance decrease value to the participant – was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  5. Parents Anonymous Chairperson-Sponsor Manual.

    ERIC Educational Resources Information Center

    Parents Anonymous, Inc., Redondo Beach, CA.

    Presented is a manual which focuses on the Chairperson-Sponsor relationship of Parents Anonymous (PA), an organization for helping parents with child abuse problems. Brief sections cover the following topics: Jolly and Leonard (the cases of two people, one an abusive mother and the other a psychiatric social worker, involved in PA); the basic…

  6. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  7. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity

    PubMed Central

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender’s anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided. PMID:27832105

  8. A knowledge, attitudes, beliefs and practices (KABP) survey on HIV infection and AIDS among doctors and dental surgeons in Singapore.

    PubMed

    Chan, R; Khoo, L; Goh, C L; Lam, M S

    1997-09-01

    An anonymous postal questionnaire survey studying the knowledge, attitudes, beliefs and practices on human immunodeficiency virus (HIV) infection was conducted among all registered medical and dental practitioners in Singapore in 1996. In all, 1523 replies were received, yielding a response rate of 29.3%. The level of knowledge regarding transmission and prevention was generally good, although there were a number who believed that HIV could be transmitted by the respiratory and oral routes. However, knowledge regarding diagnosis and medical management was unsatisfactory. Although a large majority felt they had the ethical obligation to treat HIV patients, only half of them indicated their willingness to do so if they were given the choice. The majority (62.3%) supported the idea of routine preoperative HIV testing for patients, but fewer (40%) supported mandatory HIV testing for health care workers. Dentists seemed more sensitive to issues involving transmission in the workplace, and 95% of them practised universal precautions. Continuing medical education on HIV infection is required to improve and maintain the level of knowledge and competency of doctors and dentists in Singapore.

  9. Privacy, anonymity and subjectivity in genomic research.

    PubMed

    McGonigle, Ian; Shomron, Noam

    2016-01-14

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues.

  10. Medical document anonymization with a semantic lexicon.

    PubMed Central

    Ruch, P.; Baud, R. H.; Rassinoux, A. M.; Bouillon, P.; Robert, G.

    2000-01-01

    We present an original system for locating and removing personally-identifying information in patient records. In this experiment, anonymization is seen as a particular case of knowledge extraction. We use natural language processing tools provided by the MEDTAG framework: a semantic lexicon specialized in medicine, and a toolkit for word-sense and morpho-syntactic tagging. The system finds 98-99% of all personally-identifying information. PMID:11079980

  11. Anonymous donation: a transplant center's experience.

    PubMed

    Mitzel, Heather; Snyders, Michele

    2002-06-01

    As demands for organs increase, transplant centers are now considering alternative resources. This paper looks at the experiences of one kidney transplant center as it developed its anonymous donor protocol. The authors review the historical use of living donors and discuss why the program initially considered this type of donor. The team members and the decision-making process are identified, including ethical dilemmas confronted by the team. Finally, the protocol and anticipated concerns are presented.

  12. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  13. Remote Electronic Voting with Revocable Anonymity

    NASA Astrophysics Data System (ADS)

    Smart, Matt; Ritter, Eike

    We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea of revocable anonymity in electronic voting, on the grounds of it being a legal requirement in the United Kingdom, and show a method of proving the validity of a ballot to a verifier in zero knowledge, by extension of known two-candidate proofs.

  14. A 2-Round Anonymous Veto Protocol

    NASA Astrophysics Data System (ADS)

    Hao, Feng; Zieliński, Piotr

    The dining cryptographers network (or DC-net) is a seminal technique devised by Chaum to solve the dining cryptographers problem — namely, how to send a boolean-OR bit anonymously from a group of participants. In this paper, we investigate the weaknesses of DC-nets, study alternative methods and propose a new way to tackle this problem. Our protocol, Anonymous Veto Network (or AV-net), overcomes all the major limitations of DC-nets, including the complex key setup, message collisions and susceptibility to disruptions. While DC-nets are unconditionally secure, AV-nets are computationally secure under the Decision Diffie-Hellman (DDH) assumption. An AV-net is more efficient than other techniques based on the same public-key primitives. It requires only two rounds of broadcast and the least computational load and bandwidth usage per participant. Furthermore, it provides the strongest protection against collusion — only full collusion can breach the anonymity of message senders.

  15. Anonymous Peer Assessment of Medication Management Reviews

    PubMed Central

    Ryan, Greg; Woulfe, Jim; Bartimote-Aufflick, Kathryn

    2010-01-01

    Objectives To investigate whether pharmacy students' anonymous peer assessment of a medication management review (MMR) was constructive, consistent with the feedback provided by an expert tutor, and enhanced the students' learning experience. Design Fourth-year undergraduate pharmacy students were randomly and anonymously assigned to a partner and participated in an online peer assessment of their partner's MMR. Assessment An independent expert graded a randomly selected sample of the MMR's using a schedule developed for the study. A second expert evaluated the quality of the peer and expert feedback. Students also completed a questionnaire and participated in a focus group interview. Student peers gave significantly higher marks than an expert for the same MMR; however, no significant difference between the quality of written feedback between the students and expert was detected. The majority of students agreed that this activity was a useful learning experience. Conclusions Anonymous peer assessment is an effective means of providing additional constructive feedback on student performance on the medication review process. Exposure to other students' work and the giving and receiving of peer feedback were perceived as valuable by students. PMID:20798808

  16. Anonymous Fireman v. City of Willoughby.

    PubMed

    1991-12-13

    The United States District Court, Eastern District of Ohio, upheld the City of Willoughby's policy of mandatory testing of firefighters and paramedics for HIV. Although the HIV test was performed on blood which had already been drawn for annual physicals, the separate chemical analysis required by the test constituted a Fourth Amendment "search." The court determined that the search was reasonable because: (1) firefighters and paramedics have diminished expectations of privacy because they are highly-regulated public employees; (2) the city has a compelling interest in protecting the public from contraction and transmission of HIV by firefighters and paramedics, and in preventing the spread of HIV; (3) firefighters and paramedics are at high risk of contracting and transmitting HIV to the public. The court concluded that psychological concerns surrounding an employee who tests positive do not raise constitutional privacy issues, because other serious diseases revealed by blood tests present similar concerns.

  17. A Model of Onion Routing With Provable Anonymity

    DTIC Science & Technology

    2006-08-30

    Yale University Department of Computer Science A Model of Onion Routing with Provable Anonymity Aaron Johnson YALEU/DCS/TR-1368 August 30, 2006...2006 2. REPORT TYPE 3. DATES COVERED 00-08-2006 to 00-08-2006 4. TITLE AND SUBTITLE A Model of Onion Routing with Provable Anonymity 5a... Anonymity Aaron Johnson∗ Department of Computer Science Yale University New Haven, CT ajohnson@cs.yale.edu Abstract Onion routing is a scheme for anonymous

  18. Study on Privacy Protection Algorithm Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    FeiFei, Zhao; LiFeng, Dong; Kun, Wang; Yang, Li

    Basing on the study of K-Anonymity algorithm in privacy protection issue, this paper proposed a "Degree Priority" method of visiting Lattice nodes on the generalization tree to improve the performance of K-Anonymity algorithm. This paper also proposed a "Two Times K-anonymity" methods to reduce the information loss in the process of K-Anonymity. Finally, we used experimental results to demonstrate the effectiveness of these methods.

  19. 64 FR 11360 - Evaluation of Parents AnonymousSUPSM/SUP

    Federal Register 2010, 2011, 2012, 2013, 2014

    1999-03-08

    ... Justice Office of Juvenile Justice and Delinquency Prevention Evaluation of Parents Anonymous SM ; Notice... Anonymous SM AGENCY: Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention... Anonymous SM program. The purpose of the evaluation is to assess the implementation and effectiveness of...

  20. A Model of Onion Routing with Provable Anonymity

    NASA Astrophysics Data System (ADS)

    Feigenbaum, Joan; Johnson, Aaron; Syverson, Paul

    Onion routing is a scheme for anonymous communication that is designed for practical use. Until now, however, it has had no formal model and therefore no rigorous analysis of its anonymity guarantees. We give an IO-automata model of an onion-routing protocol and, under possibilistic definitions, characterize the situations in which anonymity and unlinkability are guaranteed.

  1. Workplace Health and Safety.

    ERIC Educational Resources Information Center

    Massachusetts Career Development Inst., Springfield.

    This booklet is one of six texts from a workplace literacy curriculum designed to assist learners in facing the increased demands of the workplace. It is a short guide to workplace health and safety issues, laws, and regulations, especially in Massachusetts. Topics covered include the following: (1) safety issues--workplace ergonomics, the…

  2. HIV/AIDS Case Managers and Client HIV Status Disclosure: Perceived Client Needs, Practices, and Services

    ERIC Educational Resources Information Center

    Kalichman, Seth C.; Klein, Susan J.; Kalichman, Moira O.; O'Connell, Daniel A.; Freedman, Jay A.; Eaton, Lisa; Cain, Demetria

    2007-01-01

    People living with HIV/AIDS often need assistance in deciding whether or how to disclose their HIV status to others, and case managers are in a unique position to offer this assistance. The current study surveyed 223 case managers providing services to people living with HIV/AIDS in New York State. The survey was conducted anonymously, and case…

  3. HIV/AIDS Case Managers and Client HIV Status Disclosure: Perceived Client Needs, Practices, and Services

    ERIC Educational Resources Information Center

    Kalichman, Seth C.; Klein, Susan J.; Kalichman, Moira O.; O'Connell, Daniel A.; Freedman, Jay A.; Eaton, Lisa; Cain, Demetria

    2007-01-01

    People living with HIV/AIDS often need assistance in deciding whether or how to disclose their HIV status to others, and case managers are in a unique position to offer this assistance. The current study surveyed 223 case managers providing services to people living with HIV/AIDS in New York State. The survey was conducted anonymously, and case…

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  5. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  6. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    NASA Astrophysics Data System (ADS)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  7. Privacy Vulnerability of Published Anonymous Mobility Traces

    DOE PAGES

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; ...

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less

  8. Anonymity: An Impediment to Performance in Healthcare

    PubMed Central

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are “Always” or “Often” able to identify which care team is responsible for their patients, while 79% of nurses reported that they either “Often” or “Sometimes” page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either “Rarely” or “Never” able to recognize, by face and name, attending level providers. Residents were “Rarely” or “Never” recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  9. Privacy Vulnerability of Published Anonymous Mobility Traces

    SciTech Connect

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; Rao, Nageswara S. V.

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.

  10. Concerns of occupational HIV infection among surgical Staff in the light of anti-HIV sero-status and the distribution of Δ32 allele of the CCR5 gene: a cross-sectional study.

    PubMed

    Gańczak, Maria; Korzeń, Marcin; Owsianka, Barbara; Szych, Zbigniew

    2015-01-01

    Surgical staff might be considered at most risk of accidental viral infection due to their higher exposure to blood. To evaluate surgical staff concerns about occupational HIV infection, to determine contributing factors, to assess their sero-status regarding this pathogen, and the frequency of the Δ32 allele of the CCR5 gene. With the use of a self-administered anonymous questionnaire a cross-sectional sero-survey was conducted from February 2009-January 2010 among doctors/nurses from the surgical/ gynaecological wards of 16 randomly selected hospitals in Western Pomerania, Poland. Fear level was measured by the use of the VAS scale (range 0-10). Serum samples were tested by ELISA. Genotyping was performed using a PCR-AFLP assay. Response rate 84.9%; 427 participants, 88.3% females; 84.8% nurses, 15.2% doctors (median age 42 years, range 22-61 years). More than two thirds of respondents (67.2%) overestimated HIV single exposure risk. The median level of occupational HIV fear was 6.67. The prevalence of anti-HIV was 0.0% (95%CI: 0-0.9%); 1.2% (95%CI: 0.5%-2.9%) of participants were homozygotes Δ32/Δ32. The stepwise regression model revealed that job category (nurse) was associated with HIV fear (p<0.001). The risk of contracting occupational HIV infection remains low; no anti-HIV positive individuals were found among surgical staff, one in one hundred were resistant to HIV infection. Staff members, especially nurses, were much concerned with acquiring an occupational HIV infection, possibly due to the lack of knowledge on single exposure risk. Educational actions and better access to specialists which would help surgical staff in managing anxiety at the workplace is urgently needed.

  11. Why do we still find anonymous ESTs?

    PubMed

    Cirera, S; Winterø, A K; Fredholm, M

    2000-08-01

    During recent years, there has been an exponential rise in the number of sequences accessible in the public databases. Despite this, a high percentage of partial sequences of cDNA (ESTs) submitted to the databases remain unrecognized (anonymous ESTs). This lack of similarities could be explained by several hypotheses: i) a different part of the transcript is present in the GenBank; ii) the transcript represents a novel gene not yet isolated in other species; iii) alternative splicing of the same gene in different species; iv) inaccurate sequence data; and/or v) the sequence of the transcript has diverged to the extent that it is not recognized as an ortholog. In the present study we selected a sample of 20 ESTs from a pool of 656 anonymous pig small intestine ESTs in order to investigate the possible cause for the lack of similarities with database entries. To test the significant hypotheses we carried out total sequencing of each insert along with zoo-blot and Northern-blot analysis. Extended analyses of the 20 ESTs showed significant matches to seven existing database entries, whereas 13 still did not show significant hits. The results are discussed in the context of the hypothesis listed above.

  12. Anonymization of Longitudinal Electronic Medical Records

    PubMed Central

    Tamersoy, Acar; Loukides, Grigorios; Nergiz, Mehmet Ercan; Saygin, Yucel; Malin, Bradley

    2013-01-01

    Electronic medical record (EMR) systems have enabled healthcare providers to collect detailed patient information from the primary care domain. At the same time, longitudinal data from EMRs are increasingly combined with biorepositories to generate personalized clinical decision support protocols. Emerging policies encourage investigators to disseminate such data in a deidentified form for reuse and collaboration, but organizations are hesitant to do so because they fear such actions will jeopardize patient privacy. In particular, there are concerns that residual demographic and clinical features could be exploited for reidentification purposes. Various approaches have been developed to anonymize clinical data, but they neglect temporal information and are, thus, insufficient for emerging biomedical research paradigms. This paper proposes a novel approach to share patient-specific longitudinal data that offers robust privacy guarantees, while preserving data utility for many biomedical investigations. Our approach aggregates temporal and diagnostic information using heuristics inspired from sequence alignment and clustering methods. We demonstrate that the proposed approach can generate anonymized data that permit effective biomedical analysis using several patient cohorts derived from the EMR system of the Vanderbilt University Medical Center. PMID:22287248

  13. Yahtzee: An Anonymized Group Level Matching Procedure

    PubMed Central

    Jones, Jason J.; Bond, Robert M.; Fariss, Christopher J.; Settle, Jaime E.; Kramer, Adam D. I.; Marlow, Cameron; Fowler, James H.

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being “leaked” or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records. PMID:23441156

  14. [Workplace mobbing].

    PubMed

    Soljan, Ivana; Josipović-Jelić, Zeljka; Jelić Kis, I Anita

    2008-03-01

    Workplace mobbing is a hostile and unethical communication, systematically aimed from one or more individuals towards mostly one individual, who are forced into a helpless position and are held in it by constant bullying. This article describes some of the most important characteristics of mobbing: offensive behaviour, organizational and non-organizational causes of this behaviour, the victim and the consequences. Modern business environment is complex, dynamic, volatile, and requires better ability to adjust. Constant changes are a part of organizational reality, but they also produce an ideal environment for all kinds of conflicts. Conflicts are inevitable in every organization, but the task of its management is to identify them and resolve before they affect the workforce, productivity and costs. The idea is to avert psychological abuse and aberrant behaviour such as mobbing which that may cause physical and mental disorders. Mobbing is a problem of the modern society; as a violation of human rights it is relatively new and unrecognised in Croatia. Abuse is mostly psychological: it affects the victim's health and life, quality of work, productivity, profitability, and may lead to significant economic losses in the community. Mobbing can be averted by joint forces that would involve employee and management, medical and legal professionals, and even community as a whole. The more an organization pursues excellence based on trust and business ethics, the higher the probability that mobbing will be averted or stopped.

  15. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  16. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    ERIC Educational Resources Information Center

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  17. [Use of illicit substances in the workplace].

    PubMed

    Lhermitte, M; Frimat, P; Labat, L; Haguenoer, J-M

    2012-01-01

    The development of addictive behaviors is a source of worry and concern for workplace and occupational physicians. To estimate the prevalence of behaviors, two types of surveys can be carried out: self-assessment surveys and biological testing in the workplace. For the latter, when a settlement is within the company, the prevalence is often lower compared to those enterprises that have not adapted this policy. Very few investigations have been published in France to date. Data published by the United Nations Office against Drugs and Crime (UNODC) shows a stable consumption of illicit substances in recent years. They reported consumption in the world among the general population (all subjects aged 15 to 64). For France, were described a prevalence estimated in 2005 to 8.6%, 0.6% and 0.2% for cannabis, cocaine and amphetamine derivatives, respectively, and in 2007 to 4.6% for opiates. Some prevalence in the workplace have been reported in Europe in chemical, petrochemical, metallurgical, automotive, in the transport sector and in medical and military fields. However, it appears that few surveys in the workplace have been published in France, this lack may be explained by a desire for anonymity on the subject at the level of company management and doctors work that focus on individual support with the problem of addiction. Screening for illicit substances is necessary because these psychotropic substances affect alertness and pose risks in the workplace, especially such that the association cannabis-alcohol further increases the risk. Knowledge of consumption is, moreover, an important factor in job security. It may be acquired if reliable methods, inexpensive to allow routine screening. Publication of results will reveal the extent of the problem and implement more effective campaigns of information and prevention in the workplace. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  18. A sociocultural history of Alcoholics Anonymous.

    PubMed

    Trice, H M; Staudenmeier, W J

    1989-01-01

    Alcoholics Anonymous (AA) has not only helped numerous alcoholics, it has also influenced the current generation's view of, and response to, the alcoholic. This chapter describes the emergence of AA and analyzes its successful growth. During the period of reduced alternatives for helping the alcoholic, AA began and soon flourished, helped by favorable publicity, committed members, and AA publications. We argue that its founder, Bill W., played a crucial role as a charismatic leader and that AA found a unique organizational solution to the problem of charismatic succession, a solution that helped AA maintain growth and stability beyond the life of its founder. This chapter also reviews the social response to AA including early research on AA, the generally favorable response to AA, criticism of AA, and the widespread imitation of AA by other problem area groups.

  19. The k-Anonymity Problem Is Hard

    NASA Astrophysics Data System (ADS)

    Bonizzoni, Paola; Della Vedova, Gianluca; Dondi, Riccardo

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization recently proposed is the k-anonymity. This approach requires that the rows in a table are clustered in sets of size at least k and that all the rows in a cluster are related to the same tuple, after the suppression of some records. The problem has been shown to be NP-hard when the values are over a ternary alphabet, k = 3 and the rows length is unbounded. In this paper we give a lower bound on the approximation of two restrictions of the problem, when the records values are over a binary alphabet and k = 3, and when the records have length at most 8 and k = 4, showing that these restrictions of the problem are APX-hard.

  20. De profundis: spiritual transformations in Alcoholics Anonymous.

    PubMed

    Forcehimes, Alyssa A

    2004-05-01

    The mechanism of change in Alcoholics Anonymous is described as "spiritual transformation." A.A. acknowledges that such transformation can occur gradually; however, nearly all of the examples presented in the Big Book of A.A. involve discrete and sudden experiences that resemble the phenomenon of quantum change. The sequence offered describes how spiritual transformations transpire. The sequence begins with hitting bottom, recognition of inability to control the problem. A feeling of contrition follows, describing not only sorrow for the present state, but also desire for a new way. The final step is the act of surrendering one's will to a higher power. The de profundis sequence sets the process of spiritual transformation in motion, offering stabilization to sobriety.

  1. Design of Anonymous Attribute Authentication Mechanism

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  2. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    PubMed

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  3. Reconstructing Spatial Distributions from Anonymized Locations

    SciTech Connect

    Horey, James L; Forrest, Stephanie; Groat, Michael

    2012-01-01

    Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many real-world scenarios.

  4. Depression in the Workplace

    MedlinePlus

    ... You are here Home » Depression In The Workplace Depression In The Workplace Clinical depression has become one ... will die by suicide vi . Employees' Attitudes Towards Depression Often times a depressed employee will not seek ...

  5. Deploying Low-Latency Anonymity: Design Challenges and Social Factors

    DTIC Science & Technology

    2007-10-01

    Page 1 of 807-1226-2439.txt Printed: 12/16/08 Dec 16 4:39:54 PM Printed For: Kate Green Deploying Low-Latency Anonymity : Design Challenges and Social...Security & Privacy, September/October 2007 (Vol. 5, No. 5), pp. 83-87 Anonymous communication systems hide conversations against unwanted observations...Deploying an anonymous communications infrastructure presents surprises unlike those found in other types of systems. For example, given that

  6. Anonymity and Covert Channels in Simple Timed Mix-firewalls

    DTIC Science & Technology

    2004-01-01

    Anonymity and Covert Channels in Simple Timed Mix- rewalls? Richard E. Newman1, Vipan R. Nalla1, and Ira S. Moskowitz2 1 CISE Department University...Washington, DC 20375 moskowitz@itd.nrl.navy.mil Abstract. Traditional methods for evaluating the amount of anonymity a orded by various Mix con...gurations have depended on either measur- ing the size of the set of possible senders of a particular message (the anonymity set size), or by measuring the

  7. Divisible E-Cash Systems Can Be Truly Anonymous

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Gouget, Aline

    This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2 L that he can parceled and spend anonymously and unlinkably. We present the construction of a security tag that allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a binary tree structure without using a trusted third party. This is the first divisible e-cash scheme that provides both full unlinkability and anonymity without requiring a trusted third party.

  8. The impact of leadership hubs on the uptake of evidence-informed nursing practices and workplace policies for HIV care: a quasi-experimental study in Jamaica, Kenya, Uganda and South Africa.

    PubMed

    Edwards, Nancy; Kaseje, Dan; Kahwa, Eulalia; Klopper, Hester C; Mill, Judy; Webber, June; Roelofs, Susan; Harrowing, Jean

    2016-08-03

    district improvements in workplace policies and quality assurance in Jamaica, but these were primarily due to a decline in scores in the control group. There were modest improvements in clinical practices, workplace policies and quality assurance in South Africa (pre-post) (clinical practices of self-pre 0.67 (95 % CI, 0.62, 0.72) versus post 0.78 (95 % CI, 0.73-0.82), p = 0.002; workplace policies-pre 0.82 (95 % CI, 0.70, 0.85) versus post 0.87 (95 % CI, 0.84, 0.90), p = 0.001; quality assurance-pre 0.72 (95 % CI, 0.67, 0.77) versus post 0.84 (95 % CI, 0.80, 0.88)). There were statistically significant improvements in scores for nurses stigmatising patients (Jamaica reports of not stigmatising-pre-post intervention 33.9 versus 62.4 %, pre-post control 54.7 versus 64.4 %, p = 0.002-and Kenya pre-post intervention 35 versus 51.6 %, pre-post control 34.2 versus 47.8 %, p = 0.006) and for nurses being stigmatised (Kenya reports of no stigmatisation-pre-post intervention 23 versus 37.3 %, pre-post control 15.4 versus 27 %, p = 0.004). Multivariate results for Kenya and Jamaica were non-significant. Twelve hubs were established; 11 were active at follow-up. Hub members (n = 34) reported significant improvements in their capacity to address care gaps. Leadership hubs, comprising nurses and other stakeholders committed to change and provided with capacity building can collectively identify issues and act on strategies that may improve practice and policy. Overall, hubs did not provide the necessary force to improve the uptake of evidence-informed HIV care in their districts. If hubs are to succeed, they must be integrated within district health authorities and become part of formal, legal organisations that can regularise and sustain them.

  9. Constituting the Workplace Curriculum

    ERIC Educational Resources Information Center

    Billett, Stephen

    2006-01-01

    This paper advances some bases for a workplace curriculum. These are premised on conceptions of curriculum as intents directed to individual's progression towards full and effective workplace performance, yet whose enactment is shaped by workplace factors and is ultimately experienced by workers as learners. So whether the intentions will be…

  10. Unions and Workplace Reorganization.

    ERIC Educational Resources Information Center

    Nissen, Bruce, Ed.

    The 11 chapters in this book focus on "The New American Workplace" and assess its adequacy or inadequacy as a guide for the U.S. labor movement in relation to new work systems. "Unions and Workplace Reorganization" (Bruce Nissen) introduces the subject. "The New American Workplace: A Labor Perspective" (AFL-CIO Committee on the Evolution of Work,…

  11. Unions and Workplace Reorganization.

    ERIC Educational Resources Information Center

    Nissen, Bruce, Ed.

    The 11 chapters in this book focus on "The New American Workplace" and assess its adequacy or inadequacy as a guide for the U.S. labor movement in relation to new work systems. "Unions and Workplace Reorganization" (Bruce Nissen) introduces the subject. "The New American Workplace: A Labor Perspective" (AFL-CIO Committee on the Evolution of Work,…

  12. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    NASA Astrophysics Data System (ADS)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  13. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    PubMed

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  14. Part of the Job? Workplace Violence in Massachusetts Social Service Agencies

    ERIC Educational Resources Information Center

    Zelnick, Jennifer R.; Slayter, Elspeth; Flanzbaum, Beth; Butler, Nanci Ginty; Domingo, Beryl; Perlstein, Judith; Trust, Carol

    2013-01-01

    Workplace violence is a serious and surprisingly understudied occupational hazard in social service settings. The authors of this study conducted an anonymous, Internet-based survey of Massachusetts social service agencies to estimate the incidence of physical assault and verbal threat of violence in social service agencies, understand how social…

  15. Part of the Job? Workplace Violence in Massachusetts Social Service Agencies

    ERIC Educational Resources Information Center

    Zelnick, Jennifer R.; Slayter, Elspeth; Flanzbaum, Beth; Butler, Nanci Ginty; Domingo, Beryl; Perlstein, Judith; Trust, Carol

    2013-01-01

    Workplace violence is a serious and surprisingly understudied occupational hazard in social service settings. The authors of this study conducted an anonymous, Internet-based survey of Massachusetts social service agencies to estimate the incidence of physical assault and verbal threat of violence in social service agencies, understand how social…

  16. Lack of HIV Testing and Awareness of HIV Infection among Men Who Have Sex with Men, Beijing, China

    ERIC Educational Resources Information Center

    Choi, Kyung-Hee; Lui, Hui; Guo, Yaqi; Han, Lei; Mandel, Jeffrey S.

    2006-01-01

    In China, men who have sex with men (MSM) are at high risk for HIV. However, little is known about their HIV testing behavior. From September 2001 to January 2002, we recruited 482 men through social networks and MSM venues. We conducted HIV testing and counseling, and anonymous, standardized face-to-face interviews. Eighty-two percent of…

  17. Lack of HIV Testing and Awareness of HIV Infection among Men Who Have Sex with Men, Beijing, China

    ERIC Educational Resources Information Center

    Choi, Kyung-Hee; Lui, Hui; Guo, Yaqi; Han, Lei; Mandel, Jeffrey S.

    2006-01-01

    In China, men who have sex with men (MSM) are at high risk for HIV. However, little is known about their HIV testing behavior. From September 2001 to January 2002, we recruited 482 men through social networks and MSM venues. We conducted HIV testing and counseling, and anonymous, standardized face-to-face interviews. Eighty-two percent of…

  18. Anonymous statistical methods versus cryptographic methods in epidemiology.

    PubMed

    Quantin; Allaert; Dusserre

    2000-11-01

    Sensitive data are most often indirectly identifiable and so need to be rendered anonymous in order to ensure privacy. Statistical methods to provide anonymity require data perturbation and so generate data processing difficulties. Encryption methods, while preserving confidentiality, do not require data modification.

  19. An Applet-based Anonymous Distributed Computing System.

    ERIC Educational Resources Information Center

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  20. [Sexual behavior characteristics of clients attending the Israel AIDS Task Force anonymous clinic in Tel Aviv].

    PubMed

    Bar-On, Yaeli; Perry, Zvi H; Nof, Einav; Shiber, Asher; Risenberg, Klaris; Ben Zion, Itzhak

    2014-09-01

    Until now, research on sexual behavior and HIV in Israel has been carried out mainly on the general population, and focused primarily on defining populations at risk, without adequate consideration given to the reasons bringing these populations to be tested, and their specific sexual behaviors. In Israel, one can choose whether to take an HIV test in confidential centers (giving one's name under medical confidentiality) or in anonymous centers (Israel AIDS Task Force in Tel Aviv and Beer Sheva, Levinsky Clinic in Tel Aviv and Haparsim Clinic in Haifa]. At least 21% of the clients of the anonymous testing centers in Israel belong to a high risk population in contrast to 2.6% in confidential clinics, and so, in this study, we hypothesize that characterization of sexual behavior patterns in anonymous testing centers might enable us to better characterize sexual behavior patterns in high risk populations. In this cross-sectional study, we used questionnaires distributed in the clinics by the Israel AIDS Task Force in order to characterize their clinic's clients. The questionnaires were completed by the Israel AIDS Task Force consultants during the consultation period at which the anonymous test was performed. Data collected included: gender, age, testing history, specific sexual behaviors and reasons for applying for the current test. A total of 926 questionnaires were collected; 29.9% of them were of female patients. The average age was 29.47 years (1±8.66]; 21.3% of the clients were men who have sex with men [MSM]; only 2.3% of the clients belonged to other high risk populations. In all groups, the majority of the patients reported high risk sexual behavior (any sexual contact without a condom) and the average age for the first test was much higher than the average age of first sexual intercourse common in Israel. Women reported more participation in unprotected vaginal intercourse than heterosexual men, and a substantial part of MSM reported performing unprotected

  1. Measuring treatment process variables in Alcoholics Anonymous.

    PubMed

    Allen, J P

    2000-04-01

    Alcoholism treatment research has traditionally focused on direct questions of efficacy, such as is a particular intervention better than no treatment or is one treatment more effective than another. Recent projects, however, have also attempted to identify variables explaining why treatments vary in their effects. Many of these variables relate to the process of treatment itself or changes that may occur within the patients. Clinicians also need to continuously monitor progress of patients in engaging in behaviors supportive of long-term sobriety and how well the values and behaviors fostered by the particular treatment regimen are being incorporated into daily life. Measurement of process variables may assist in both regards. In the last decade several psychometric instruments have been developed to elucidate the processes involved in Alcoholic Anonymous (AA), a key adjunct of most formal alcoholism programs in the United States. These instruments measure dimensions such as involvement in AA, completion of steps, and adoption of values encouraged by AA. Six such measures are summarized here and several fruitful topics for future research on the measures are suggested.

  2. Utility-aware anonymization of diagnosis codes.

    PubMed

    Loukides, G; Gkoulalas-Divanis, A

    2013-01-01

    The growing need for performing large-scale and low-cost biomedical studies has led organizations to promote the reuse of patient data. For instance, the National Institutes of Health in the US requires patient-specific data collected and analyzed in the context of Genome-Wide Association Studies (GWAS) to be deposited into a biorepository and broadly disseminated. While essential to comply with regulations, disseminating such data risks privacy breaches, because patients genomic sequences can be linked to their identities through diagnosis codes. This work proposes a novel approach that prevents this type of data linkage by modifying diagnosis codes to limit the probability of associating a patients identity to their genomic sequence. Our approach employs an effective algorithm that uses generalization and suppression of diagnosis codes to preserve privacy and takes into account the intended uses of the disseminated data to guarantee utility. We also present extensive experiments using several datasets derived from the Electronic Medical Record (EMR) system of the Vanderbilt University Medical Center, as well as a large-scale case-study using the EMRs of 79K patients, which are linked to DNA contained in the Vanderbilt University biobank. Our results verify that our approach generates anonymized data that permit accurate biomedical analysis in tasks including case count studies and GWAS.

  3. Comment on ``Anonymous Reviews'' From D. Forel

    NASA Astrophysics Data System (ADS)

    Forel, David

    I recently read four letters against anonymous reviews (see references below) and zero letters for. I feel the need to add one to zero. When I started reviewing manuscripts, I had the ethical choice of whether to sign my name. After some thought, I decided I would not. Today I feel the same for the same reason: I do not want people to think about who I am; I want them to think about what I write. R.E. Criss and A.M. Hofmeister would have me throw off my ``cloak of secrecy- the costume of crooks.'' Would seeing my face make my argument clearer or is it an excuse to judge the messenger ? A while back, I spent two years as an associate editor. During that time, I signed my name because I felt people had the right to know who was passing judgment. In this, I agree with A. McBirney? ``A fundamental rule of our justice system holds that one who is being judged has the right to confront his accusers.'' As a lowly reviewer, I did not feel I passed judgment; I felt I was contributing to the discussion.

  4. Anonymous predictive testing for Huntington's disease in the United States.

    PubMed

    Visintainer, C L; Matthias-Hagen, V; Nance, M A

    2001-01-01

    The widespread use of a predictive genetic test for Huntington's disease (HD) since 1993 has brought to the forefront issues regarding genetic privacy. Although the possibility of anonymous genetic testing has been discussed, its use in the United States has not been described previously. We review the experiences of 11 genetics specialists with anonymous predictive testing for HD. We found that more men than women requested anonymous testing, for reasons that more often related to personal privacy than to insurance or discrimination concerns. A number of approaches to anonymity were used, and genetics specialists varied in the degree to which they were comfortable with the process. A number of legal, medical, and practical questions are raised, which will require resolution if anonymous testing is to be performed with a greater frequency in the future.

  5. AIDS in the Workplace: A Training for Managers and Supervisors. District of Oregon.

    ERIC Educational Resources Information Center

    Tyree, Jimmy L.

    This document provides a summary of "AIDS in the Workplace for Court Managers," a 3-hour seminar that was presented to the District of Oregon. The document begins with a summary of the seminar goals and objectives, which included the following: reduce fears and anxieties about HIV/AIDS in the workplace; provide information about the…

  6. [HIV/AIDS and law in Hungary].

    PubMed

    Julesz, Máté

    2016-11-01

    The legal aspects of HIV/AIDS are mirrored by the statistical data. The aim of the author is to show the effect of HIV/AIDS on today's Hungarian society. Analysis of data issued by the National Center for Epidemiology in Hungary and those to be found in the professional literature, as well as analysis of the Hungarian legal practice. Hungarian courts tend to impose a lighter punishment on a perpetrator diagnosed with AIDS than on a healthy perpetrator. According to the data issued by the Hungarian Epidemiological Center, in 1985, 16 HIV-contaminated persons were registered in Hungary; in 1995, 81, in 2005, 107, whilst in 2015, 201 HIV-contaminated persons were registered in Hungary. In 2005, 10 of the 107 HIV-contaminated persons were anonymous, whilst, in 2015, 37 of the 201 HIV-contaminated persons were anonymous. According to the known data of not anonymous HIV-contaminated persons, the number of males predominates largely over the number of females and this has been the case during the past decades. In Hungary, only a small proportion of the HIV-contaminated persons have died: the number of males predominates over the number of females. As to HIV/AIDS, latency poses problems in the field of healthcare prevention and legal prevention. It seems to be important to protect data relating to healthcare, though the data protection should not impede the prevention of HIV/AIDS. Orv. Hetil., 2016, 157(47), 1884-1890.

  7. Ethical considerations of providers and clients on HIV testing campaigns in Burkina Faso

    PubMed Central

    2014-01-01

    Background Campaigns have been conducted in a number of low HIV prevalence African settings, as a strategy to expand HIV testing, and it is important to assess the extent to which individual rights and quality of care are protected during campaigns. In this article we investigate provider and client perceptions of ethical issues, including whether they think that accessibility of counseling and testing sites during campaigns may hinder confidentiality. Methods To examine how campaigns have functioned in Burkina Faso, we undertook a qualitative study based on individual interviews and focus group discussions with 52 people (providers and clients tested during or outside campaigns and individuals never tested). Thematic analysis was performed on discourse about perceptions and experiences of HIV-testing campaigns, quality of care and individual rights. Results Respondents value testing accessibility and attractiveness during campaigns; clients emphasize convenience, ripple effect, the sense of not being alone, and the anonymity resulting from high attendance. Confronted with numerous clients, providers develop context-specific strategies to ensure consent, counseling, confidentiality and retention in the testing process, and they adapt to workplace arrangements, local resources and social norms. Clients appreciate the quality of care during campaigns. However, new ethical issues arise about confidentiality and accessibility. Confidentiality of HIV-status may be jeopardized due to local social norms that encourage people to share their results with others, when HIV-positive people may not wish to do so. Providers’ ethical concerns are consistent with WHO norms known as the ‘5 Cs,’ though articulated differently. Clients and providers value the accessibility of testing for all during campaigns, and consider it an ethical matter. The study yields insights on the way global norms are adapted or negotiated locally. Conclusions Future global recommendations for HIV

  8. Ethical considerations of providers and clients on HIV testing campaigns in Burkina Faso.

    PubMed

    Desclaux, Alice; Ky-Zerbo, Odette; Somé, Jean-François; Obermeyer, Carla Makhlouf

    2014-10-16

    Campaigns have been conducted in a number of low HIV prevalence African settings, as a strategy to expand HIV testing, and it is important to assess the extent to which individual rights and quality of care are protected during campaigns. In this article we investigate provider and client perceptions of ethical issues, including whether they think that accessibility of counseling and testing sites during campaigns may hinder confidentiality. To examine how campaigns have functioned in Burkina Faso, we undertook a qualitative study based on individual interviews and focus group discussions with 52 people (providers and clients tested during or outside campaigns and individuals never tested). Thematic analysis was performed on discourse about perceptions and experiences of HIV-testing campaigns, quality of care and individual rights. Respondents value testing accessibility and attractiveness during campaigns; clients emphasize convenience, ripple effect, the sense of not being alone, and the anonymity resulting from high attendance. Confronted with numerous clients, providers develop context-specific strategies to ensure consent, counseling, confidentiality and retention in the testing process, and they adapt to workplace arrangements, local resources and social norms. Clients appreciate the quality of care during campaigns. However, new ethical issues arise about confidentiality and accessibility. Confidentiality of HIV-status may be jeopardized due to local social norms that encourage people to share their results with others, when HIV-positive people may not wish to do so. Providers' ethical concerns are consistent with WHO norms known as the '5 Cs,' though articulated differently. Clients and providers value the accessibility of testing for all during campaigns, and consider it an ethical matter. The study yields insights on the way global norms are adapted or negotiated locally. Future global recommendations for HIV testing and counseling campaigns should

  9. Global Trends in Workplace Learning

    ERIC Educational Resources Information Center

    Lee, Lung-Sheng; Lai, Chun-Chin

    2012-01-01

    The paradigm of human resource development has shifted to workplace learning and performance. Workplace can be an organization, an office, a kitchen, a shop, a farm, a website, even a home. Workplace learning is a dynamic process to solve workplace problems through learning. An identification of global trends of workplace learning can help us to…

  10. Lower Your Sexual Risk of HIV

    MedlinePlus

    ... Changes Find Care & Treatment You and Your Provider Discrimination from Providers Locating HIV/AIDS Services Addressing the ... Dating and Marriage Family Planning Mixed-Status Couples Discrimination Legal Issues Workplace Issues Federal Resources Federal Programs ...

  11. How Do You Get HIV or AIDS?

    MedlinePlus

    ... Changes Find Care & Treatment You and Your Provider Discrimination from Providers Locating HIV/AIDS Services Addressing the ... Dating and Marriage Family Planning Mixed-Status Couples Discrimination Legal Issues Workplace Issues Federal Resources Federal Programs ...

  12. Defining ’Anonymity’ in Networked Communication, Version 1

    DTIC Science & Technology

    2011-12-01

    Anonymity ”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448...December  2011         Support   for   anonymous   communication   in   hostile   environments   is   the   main...fact  that  the  word  is  regularly   encountered   in   common   parlance,   “ anonymity ”   is  

  13. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  14. A Review of Alcoholics Anonymous/Narcotics Anonymous Programs for Teens

    PubMed Central

    Sussman, Steve

    2014-01-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed. PMID:20164105

  15. Importance of an Early HIV Antibody Differentiation Immunoassay for Detection of Dual Infection with HIV-1 and HIV-2.

    PubMed

    Zbinden, Andrea; Dürig, Roland; Shah, Cyril; Böni, Jürg; Schüpbach, Jörg

    2016-01-01

    HIV-2 is primarily endemic in West Africa and India, however, in time of global migration, a possible HIV-2 infection or co-infection with HIV-1 should be recognized right at the time of HIV diagnosis, in order to enable optimized antiretroviral treatment. Laboratory HIV testing consists of a combined HIV1/2/O antibody + antigen screening test and subsequent confirmation and type differentiation by a serological test formatted as a multi-line or multi-spot assay. CDC has proposed a revised alternative HIV diagnostic strategy which, in case of a reactive result in a combined HIV1/2/O antibody + antigen screening test, comprises an HIV-1 nucleic acid test (NAT) for HIV confirmation instead of an antibody differentiation immunoassay (ADI). Only a negative NAT must be further investigated by an ADI, thus saving expenses for ADI in most instances. We have investigated this alternative strategy with respect to its recognition of dual HIV-1 and HIV-2 infection. Anonymized data of HIV notifications of patients newly diagnosed with HIV in Switzerland between 2007 and 2014 were analysed retrospectively. In a total of 4'679 notifications, we found 35 HIV-2 infections, 9 (25.7%) of which were dually infected with HIV-1. In 7 of the 9 dual HIV-1 and HIV-2 infections, HIV-1 RNA testing at the time of HIV diagnosis was positive with concentrations from 102 to 94'300 copies/mL plasma. HIV-1 RNA data were not available for the other two cases. The alternative CDC strategy would have missed the concomitant HIV-2 infection in at least 7, but probably even more, of the 9 dually infected patients, as the detectable HIV-1 RNA would have precluded a supplemental ADI. Early ADI is mandatory for diagnosis of dual HIV-1/HIV-2 infection and guidance of appropriate therapy.

  16. [Association between psychosocial work environment and workplace bullying among office workers].

    PubMed

    Hua, Y J; Dai, J M; Gao, J L; Lu, X Y; Liu, J Y; Fu, H

    2016-04-20

    To assess the prevalence of bullying in companies and health care center and identify the association between psychosocial environment and workplace bullying. A total of 847 employees at in business building companies and 146 employees at one community health service center were invited to this survey by cluster sampling during October to December 2014, using anonymous questionnaires including the general demographic information, job characteristics, job stress core scale, the social capital scale, and NAQ-R. The rate of targets of bullying in the two kinds of workplaces were 13.1% and 5.6% respectively. Workplace bullying was associated with employee's education level(χ(2)=11.17, P=0.019)and the area his or her families live in(χ(2)=5.66, P=0.017). In addition, workplace bullying was significantly associated with psychosocial work environment. Job demand was positively correlated with workplace bullying (OR=2.24, 95% CI=1.34~3.74), and workplace social support was negatively associated with workplace bullying (OR= 0.33, 95% CI=0.18~0.60). Workplace bullying can be reduced by adjusting certain working conditions that negatively affect employees who are susceptible to being bullied, giving their individual and job characteristic. Moreover, workplace bullying could also be reduced if job demands are limited and job control and social capital are increased.

  17. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    PubMed

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  18. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity

    SciTech Connect

    Shue, Craig A; Gupta, Prof. Minaxi

    2010-01-01

    Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active or passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.

  19. Workplace Discrimination, A Picture of Hope and Concern. Global Report.

    ERIC Educational Resources Information Center

    World of Work, 2003

    2003-01-01

    An International Labour Organisation report finds that workplace discrimination is a persistent global problem. Although sex discrimination is most prevalent, discrimination in racial, HIV/AIDS, disability, religious, and age categories is rising. Progress is uneven, and inequalities within groups are widening. (SK)

  20. Workplace Discrimination, A Picture of Hope and Concern. Global Report.

    ERIC Educational Resources Information Center

    World of Work, 2003

    2003-01-01

    An International Labour Organisation report finds that workplace discrimination is a persistent global problem. Although sex discrimination is most prevalent, discrimination in racial, HIV/AIDS, disability, religious, and age categories is rising. Progress is uneven, and inequalities within groups are widening. (SK)

  1. Authentic Attributes with Fine-Grained Anonymity Protection

    DTIC Science & Technology

    2000-01-01

    on-line advertising rm DoubleClick and consumer data company Abacus Direct was \\the most danger- ous assault against anonymity on the Internet since...registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...Brother, Big `Fun’ at Amazon", Wired News, Aug. 25, 1999. www.wired.com/news/news/ business /story/21417.html [18] David Mazieres and M. Frans Kaashoek. \\The

  2. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    DTIC Science & Technology

    2014-02-01

    informatik.hu-berlin.de Abstract—Tor is a distributed onion -routing network used for achieving anonymity and resisting censorship online. Because of...users daily and transferring roughly 3 GiB/s in aggregate [4]. Tor uses onion routing [5] to route clients’ traffic through a circuit of geo...2014, San Diego, CA. 14. ABSTRACT Tor is a distributed onion -routing network used for achieving anonymity and resisting censorship online. Because of

  3. Scalable Anonymous Group Communication in the Anytrust Model

    DTIC Science & Technology

    2012-04-10

    nets messaging phase was high and not a significant improvement over the shuffle alone. Herbivore [31] makes low latency guar- antees (100s of...practical anonymity systems such as Tor [16] or Herbivore [31], where a small number of “wrong” choices—e.g., the choice of entry and exit relay in Tor—can...of-service attacks makes them largely impractical. Herbivore [31] attempts to make DC-nets more scalable, but it provides unconditional anonymity only

  4. Anonymization of DICOM electronic medical records for radiation therapy.

    PubMed

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert; Halloran, Andy; Zhang, Rui

    2014-10-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a cancer clinic. In addition to this we were unable to find a commercial software tool that met the minimum requirements for anonymization and preservation of data integrity for radiation therapy research. The purpose of this study was to develop a prototype software code to meet the requirements for the anonymization of radiation therapy treatment plans and to develop a way to validate that code and demonstrate that it properly anonymized treatment plans and preserved data integrity. We extended an open-source code to process all relevant PHI and to allow for the automatic anonymization of multiple EMRs. The prototype code successfully anonymized multiple treatment plans in less than 1min/patient. We also tested commercial optical character recognition (OCR) algorithms for the detection of burned-in text on the images, but they were unable to reliably recognize text. In addition, we developed and tested an image filtering algorithm that allowed us to isolate and redact alpha-numeric text from a test radiograph. Validation tests verified that PHI was anonymized and data integrity, such as the relationship between DICOM unique identifiers (UID) was preserved.

  5. Proactive Copyright: Workplace Compliance

    ERIC Educational Resources Information Center

    Butler, Rebecca P.; Parker, Preston

    2009-01-01

    Oftentimes, copyright is addressed in the workplace only after a blatant infringement is discovered or a cease-and-desist letter is received. Then, too, some workplaces may feel that they are immune to copyright issues due to their educational nature; while private organizations, businesses, and industry may feel that the term "fair use" will…

  6. Workplace Education Guide, 1999.

    ERIC Educational Resources Information Center

    Massachusetts State Dept. of Education, Boston.

    These eight chapters share diverse experiences, lessons, and tips gleaned by the Massachusetts Workplace Literacy Consortium. "Workplace Needs Analysis (WNA)" (Harneen Chernow, Emily Singer, Jenny Lee Utech) focuses on the Worker Education Program's (WEP's) strategy, including tools, access, interviews and focus groups, presenting findings to the…

  7. Combating Workplace Ageism.

    ERIC Educational Resources Information Center

    Reio, Thomas G., Jr.; Sanders-Reio, Joanne

    1999-01-01

    Age discrimination in the workplace is widespread and often based on stereotypes. Research has demonstrated that older workers learn and perform well. Adult educators should eliminate ways in which educational practices perpetuate ageism, raise awareness of it in the workplace, and help older workers continue learning. (SK)

  8. Workplace ESL Teachers Manual.

    ERIC Educational Resources Information Center

    Reyes, Andy F.

    The manual is intended for teachers in workplace English-as-a-Second-Language (ESL) programs, and contains ideas and techniques that both experienced and less experienced teachers in a wide variety of workplace ESL classes might find helpful. Sections address the following topics: (1) helpful hints for creating a successful educational environment…

  9. Canadian Chefs' Workplace Learning

    ERIC Educational Resources Information Center

    Cormier-MacBurnie, Paulette; Doyle, Wendy; Mombourquette, Peter; Young, Jeffrey D.

    2015-01-01

    Purpose: This paper aims to examine the formal and informal workplace learning of professional chefs. In particular, it considers chefs' learning strategies and outcomes as well as the barriers to and facilitators of their workplace learning. Design/methodology/approach: The methodology is based on in-depth, face-to-face, semi-structured…

  10. Workplace Readiness Guide.

    ERIC Educational Resources Information Center

    Crocker, Judith; Tibbetts, John; Sherman, Renee; Dlott, Michael

    This document is intended to help local adult education programs evaluate their programs to assess their capability of designing and delivering a specific workplace education program requested by an employer. The guide begins with an introductory section that discusses the following topics: differences between workplace programs and typical…

  11. Canadian Chefs' Workplace Learning

    ERIC Educational Resources Information Center

    Cormier-MacBurnie, Paulette; Doyle, Wendy; Mombourquette, Peter; Young, Jeffrey D.

    2015-01-01

    Purpose: This paper aims to examine the formal and informal workplace learning of professional chefs. In particular, it considers chefs' learning strategies and outcomes as well as the barriers to and facilitators of their workplace learning. Design/methodology/approach: The methodology is based on in-depth, face-to-face, semi-structured…

  12. Proactive Copyright: Workplace Compliance

    ERIC Educational Resources Information Center

    Butler, Rebecca P.; Parker, Preston

    2009-01-01

    Oftentimes, copyright is addressed in the workplace only after a blatant infringement is discovered or a cease-and-desist letter is received. Then, too, some workplaces may feel that they are immune to copyright issues due to their educational nature; while private organizations, businesses, and industry may feel that the term "fair use" will…

  13. Intervention as Workplace Learning

    ERIC Educational Resources Information Center

    Elkjaer, Bente; Nickelsen, Niels Christian Mossfeldt

    2016-01-01

    Purpose: The purpose of this paper is to illustrate how workplace interventions may benefit from a simultaneous focus on individuals' learning and knowledge and on the situatedness of workplaces in the wider world of changing professional knowledge regimes. This is illustrated by the demand for evidence-based practice in health care.…

  14. Intervention as Workplace Learning

    ERIC Educational Resources Information Center

    Elkjaer, Bente; Nickelsen, Niels Christian Mossfeldt

    2016-01-01

    Purpose: The purpose of this paper is to illustrate how workplace interventions may benefit from a simultaneous focus on individuals' learning and knowledge and on the situatedness of workplaces in the wider world of changing professional knowledge regimes. This is illustrated by the demand for evidence-based practice in health care.…

  15. Speaking of workplace bullying.

    PubMed

    Dzurec, Laura Cox; Bromley, Gail E

    2012-01-01

    Despite the increasing frequency of its reported incidence, especially in health care practice and education settings, workplace bullying seems to defy victims' clear understanding of its effects on them personally and to challenge their ability to provide cogent explanations about those effects to others. Especially, when it is subtle, as is the case in much of workplace bullying, the experience is emotionally confusing to its victims, and its inherent behaviors often seem absurd to those who have not lived through them firsthand. Moreover, the outwardly innocuous behaviors of subtle workplace bullying can yield long-term disorder for victims' coworkers and for employing organizations. Aptly capturing the mechanism of operation of workplace bullying, the concept of catastrophization may provide language to support understanding of victims' personal experiences of subtle workplace bullying and support administrators in recognizing bullying's paradoxical and long-term effects.

  16. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  17. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  18. Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification

    PubMed Central

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification. PMID:23675490

  19. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  20. HIV epidemiology and trends in a large national manufacturing company in South Africa, 2001-2006.

    PubMed

    Evian, Clive

    2008-11-01

    This paper presents epidemiological data from ongoing HIV-prevalence surveillance in a large South African manufacturing company located in various provinces, as well as one location in Swaziland. A survey of the workforce in 12 of the manufacturer's business units (BUs) throughout these locations was carried out in 2001-2003, and each was repeated three years later, in 2004-2006. The company is typical of manufacturing in South Africa, in that it is labour-intensive, male-dominated, and has high proportions of semi-skilled and unskilled employees. The surveys were anonymous, cross-sectional and unlinked. The workforce was stratified at the level of analysis by workplace, geographical location, job status (permanent or contract), job skill level, and age group. In 2001/3 a total of 5 177 permanent employees, representing 76% of those on duty at the time, plus 1 966 contract employees were surveyed. In 2004/6, 5 445 permanent employees, representing 81% of those on duty, and 2 688 contract employees were surveyed. HIV prevalence in the 2004/6 survey ranged from 0.9-30.7% throughout the 12 BUs, with a mean of 15.4%, showing an increase from the previous mean of 13% prevalence in the 2001/3 survey of the same locations (p = 0.0001). Differences in HIV prevalence across the BUs were determined by geographical location and the profile of the workforce. Similar proportions of contract employees were found to be HIV-positive in the initial survey and repeat survey (23% and 24.5%, respectively). HIV prevalence was inversely proportionate to permanent employees' job skill level. The 2004/6 data show lowest HIV prevalence in the upper-management category (3.6%) and highest prevalence in the unskilled category (22.6%). HIV prevalence did not increase in the upper- and middle-management categories but increased significantly in the skilled (p = 0.02), semi-skilled (p < 0.001) and unskilled (p < 0.001) job categories. HIV prevalence was similar among contract employees and

  1. Enabling Genomic-Phenomic Association Discovery without Sacrificing Anonymity

    PubMed Central

    Heatherly, Raymond D.; Loukides, Grigorios; Denny, Joshua C.; Haines, Jonathan L.; Roden, Dan M.; Malin, Bradley A.

    2013-01-01

    Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data. PMID:23405076

  2. Anonymous and Confidential Communications from an IP Addressless Computer

    NASA Astrophysics Data System (ADS)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on a mediating computer interposed between the sender and the receiver of an e-mail message have been used for several years by senders of e-mail messages who do not wish to disclose their identity to the receivers. In this model, the strength of the system to protect the identity of the sender depends on the ability and willingness of the mediator to keep the secret. In this paper, we propose a novel approach for sending truly anonymous message over the Internet which does not depend on a third party. Our idea departs from the traditional approach by sending the anonymous messages from an Internet wireless and addressless computer, such as a Personal Digital Assistant (PDA) bridged to the Internet by a Mobile Support Station (MSS).

  3. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  4. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  5. Collecting substance use data with an anonymous mailed survey.

    PubMed

    Trinkoff, A M; Storr, C L

    1997-10-25

    Because mailed surveys minimize personal contact, they are useful for collecting sensitive data on substance use, as long as the problems of achieving adequate response rates can be conquered. To address these issues, we report on an anonymous mailed survey of substance use with a 78% response rate, including data collection and survey methods. Analysis of sociodemographic effects on responding found certain groups required additional contacts. Substance use estimates were not affected by non-response bias, suggesting that anonymous mailed surveys can be a feasible means of collecting data on substance use.

  6. Anonymizing patient genomic data for public sharing association studies.

    PubMed

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  7. Details for Manuscript Number SSM-D-07-01816R2 “Stigma in the workplace: Employer attitudes about people with HIV in Beijing, Hong Kong, and Chicago”

    PubMed Central

    Angell, Beth; Lam, Chow; Corrigan, Patrick

    2008-01-01

    Studies of HIV stigma in China are becoming more prevalent, but these studies have seldom involved direct cross-cultural comparisons. Moreover, although researchers consider employers to be a key power group whose practices can significantly impact the adjustment and recovery of people with HIV, the attitudes of employers in China towards people with HIV have rarely been studied. The present study sought to investigate employers’ attitudes and hiring practices towards people with HIV across three culturally and linguistically distinct cities: Chicago, Beijing, and Hong Kong. One hundred employers from a broad spectrum of firm types were interviewed across the three cities, and their qualitative data were analyzed for information about the processes behind employer practices in hiring people with HIV. Employers from all three cities showed reluctance to hire people with HIV, but this trend was most pronounced with employers from Beijing and Hong Kong. Concerns about biological contagion were apparent in all three cities. Social contagion, or the belief that people with HIV could morally corrupt those around them, was a particular concern of employers from Beijing and Hong Kong. The concerns about hiring people with HIV in Hong Kong and Beijing may be related to specific cultural dynamics related to loss of ‘face’, level of contact and knowledge about people with HIV, and the psychological interconnectedness between people in society. In sum, employers in all three cities showed concerns about hiring people with HIV, but at the same time, their attitudes about discriminating against people with HIV differed widely across the cities. PMID:18760869

  8. Employment discrimination and HIV stigma: survey results from civil society organisations and people living with HIV in Africa.

    PubMed

    Sprague, Laurel; Simon, Sara; Sprague, Courtenay

    2011-01-01

    The article presents findings from three surveys of people living with HIV (PLHIV) and civil society organisations about the experience of employment discrimination and stigma in the workplace. The work seeks to contribute to efforts by businesses and other organisations to effectively respond to the HIV epidemic within the world of work, and to deepen our understanding of the ways in which HIV stigma and employment discrimination persist in the workplace. The findings of global and regional surveys indicate the existence of high levels of employment discrimination based on HIV status worldwide, including forced disclosure of HIV status, exclusion in the workplace, refusals to hire or promote, and terminations of people known to be living with HIV. The survey findings show that employment discrimination based on HIV status is experienced in all African subregions. Country-level surveys conducted in Kenya and Zambia indicated that PLHIV face marked barriers to employment, including discrimination in hiring, loss of promotions, and termination because of HIV status. Additionally, large variances were found in the degree of support versus discrimination that employees living with HIV in those two countries received following their disclosure. The discussion emphasises the importance of the workplace as a site for intervention and behaviour change. To address this, we introduce a conceptual framework - the employment continuum - that maps multiple points of entry within the workplace to address HIV-related stigma and discrimination. Additional recommendations include: actions to ensure equal opportunity in hiring for PLHIV; ensuring that HIV testing is voluntary, never mandatory, and that disclosure is not necessary for employment; ensuring confidentiality of HIV status; communicating and enforcing HIV-related antidiscrimination policies; establishing support groups in the workplace; providing safe and confidential processes for resolving complaints of employment

  9. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  10. Anonymity in Blended Learning: Who Would You like to Be?

    ERIC Educational Resources Information Center

    Miyazoe, Terumi; Anderson, Terry

    2011-01-01

    This paper examines the learning outcomes associated with implementing discussion forums and blog writings using pseudonyms in blended learning. Although anonymity or masking one's identity has been used as a teaching strategy designed to induce higher writing production and lowering anxiety in face-to-face writing instruction, little research has…

  11. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    PubMed

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  12. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    ERIC Educational Resources Information Center

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  13. Social distance and anonymity modulate fairness consideration: An ERP study.

    PubMed

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-08-21

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity.

  14. Social distance and anonymity modulate fairness consideration: An ERP study

    PubMed Central

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  15. Policy-Aware Sender Anonymity in Location-Based Services

    ERIC Educational Resources Information Center

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  16. K-Anonymous Multi-party Secret Handshakes

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai; Yung, Moti

    Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers have proposed a set of secret handshake schemes based on different assumptions about the credentials used: from one-time credentials to the more general PKI-like credentials. In this paper, we concentrate on k-anonymous secret handshake schemes based on PKI-like infrastructures. More specifically, we deal with the k-anonymous m-party (m > 2) secret handshake problem, which is significantly more involved than its two-party counterpart due to the following: When an honest user hand-shakes with m - 1 parties, it must be assured that these parties are distinct; otherwise, under the mask of anonymity a dishonest participant may clone itself in a single handshake session (i.e., assuming multiple personalities).

  17. The Impact of Anonymization for Automated Essay Scoring

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  18. Anonymously Productive and Socially Engaged While Learning at Work

    ERIC Educational Resources Information Center

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  19. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    ERIC Educational Resources Information Center

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  20. Anonymous Reviews: Self-serving, Counterproductive, and Unacceptable

    NASA Astrophysics Data System (ADS)

    Beck, Myrl E., Jr.

    Recently, I became involved in an incident in which a manuscript was rejected on the advise of two anonymous reviewers and an anonymous Associate Editor. This re-activated my long-standing disgust at the entire system of anonymous reviews and pushed me-finally-into doing something about it. A few weeks or months ago, I read a similar protest, somewhere-one much more persuasive than I am likely to write-but my high-mileage brain has misplaced its provenance. Consider this a ``high-five'' to that misplaced author. The system of reviewing is supposed to filter out junk science and provide useful feedback to authors of non-junk science who have submitted work that can be improved. These are honest, commendable endeavors that can be accomplished quite comfortably out in the open. Concealment, on the other hand, permits and invites all manner of dishonorable motives-not least of which is laziness-to creep in. Offhand I can think of four reasons for remaining anonymous in a review, none valid.

  1. Preventing Active Timing Attacks in Low-Latency Anonymous Communication

    DTIC Science & Technology

    2010-04-26

    Nambiar and Wright [28] use redundancy in the host lookup of Salsa to protect against route capture. Interestingly, an analysis by Mittal and Borisov...Symposium (PET 2007), pages 167–183, 2007. 28. Arjun Nambiar and Matthew Wright. Salsa : a structured approach to large-scale anonymity. In

  2. Who Goes There? Staying Anonymous on the Internet

    ERIC Educational Resources Information Center

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  3. The Impact of Anonymization for Automated Essay Scoring

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  4. Who Goes There? Staying Anonymous on the Internet

    ERIC Educational Resources Information Center

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  5. Reversible anonymization of DICOM images using automatically generated policies.

    PubMed

    Onken, Michael; Riesmeier, Jörg; Engel, Marcel; Yabanci, Adem; Zabel, Bernhard; Després, Stefan

    2009-01-01

    Many real-world applications in the area of medical imaging like case study databases require separation of identifying (IDATA) and non-identifying (MDATA) data, specifically those offering Internet-based data access. These kinds of projects also must provide a role-based access system, controlling, how patient data must be organized and how it can be accessed. On DICOM image level, different image types support different kind of information, intermixing IDATA and MDATA in a single object. To separate them, it is possible to reversibly anonymize DICOM objects by substituting IDATA by a unique anonymous token. In case that later an authenticated user needs full access to an image, this token can be used for re-linking formerly separated IDATA and MDATA, thus resulting in a dynamically generated, exact copy of the original image. The approach described in this paper is based on the automatic generation of anonymization policies from the DICOM standard text, providing specific support for all kinds of DICOM images. The policies are executed by a newly developed framework based on the DICOM toolkit DCMTK and offer a reliable approach to reversible anonymization. The implementation is evaluated in a German BMBF-supported expert network in the area of skeletal dysplasias, SKELNET, but may generally be applicable to related projects, enormously improving quality and integrity of diagnostics in a field focused on images. It performs effectively and efficiently on real-world test images from the project and other kind of DICOM images.

  6. Student Feedback, Anonymity, Observable Change and Course Barometers.

    ERIC Educational Resources Information Center

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  7. 18. Historic American Buildings Survey. Portion of an anonymous watercolor ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Historic American Buildings Survey. Portion of an anonymous watercolor painting of Fort McHenry bombardment of 1814. Peale Museum, Baltimore. View of southeast bastion and sally port. - Fort McHenry National Monument & Historic Shrine, East Fort Avenue at Whetstone Point, Baltimore, Independent City, MD

  8. Anonymously Productive and Socially Engaged While Learning at Work

    ERIC Educational Resources Information Center

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  9. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    ERIC Educational Resources Information Center

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  10. [Workplace-related anxiety, workplace phobia and disorders of participation].

    PubMed

    Muschalla, B; Linden, M

    2009-06-01

    Work is an important domain of life. It is therefore clear that problems at the workplace and mental disorders will have negative interactions. Job-related anxieties are of special importance as any workplace causes or intensifies anxiety by its very nature. A common final pathway of mental disorders in general and workplace-related anxieties in particular is workplace phobia. Similarly to agoraphobia, it is characterised by panic when approaching or even thinking of the stimulus, in this case the workplace. Workplace phobia has serious negative consequences for the further course of illness. It impairs the ability to work, and can lead to sick leave and early retirement. It requires special therapeutic interventions. This paper describes workplace-related anxieties and workplace phobia and gives a conceptual framework for their understanding.

  11. Workplace in fluency management: factoring the workplace into fluency management.

    PubMed

    Cassar, M C; Neilson, M D

    1997-01-01

    This article addresses competency-based standards and guidelines for the involvement of speech-language pathologists in the workplace of clients who stutter. It advocates broadening customary practices in stuttering treatment and suggests that speech-language pathologists should extend their scope of service delivery to the workplace. It presents a sequence for the collaborative involvement of the employer and other workplace members and proposes strategies for evaluating workplace based fluency programs. Issues of fluency management, transfer, maintenance, and efficacy are discussed in the workplace context. Also addressed is workplace communication as well as such factors as stereotypes, discrimination, and resistance to change which may impinge on workplace intervention. It is argued that structured intervention, transfer, and generalization within a collaborative workplace framework facilitates best practice for the fluency clinician and more appropriate outcomes for the diversity of clients who stutter.

  12. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  13. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    PubMed

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  14. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    ERIC Educational Resources Information Center

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  15. SA's workplace programmes still poor, study finds.

    PubMed

    Mason, B

    1995-08-01

    In South Africa, a survey was conducted of 24 agencies that implement workplace HIV/AIDS programs to determine the range of programs, services, and resources offered by these agencies and the extent to which the programs observe generally-accepted strategies for AIDS and the workplace. The agencies were from the public sector (50%), the private sector (33%), and nongovernmental organizations (17%). Most of the programs consulted management but did not consult employee representatives at all levels. About 33% tried to talk to trade unions and fewer actually contacted them. Even though about 66% claimed to have provided peer educator training courses, most participants were health personnel, human resources personnel, or supervisors rather than peers of most employees. Most agencies either provided directly or facilitated access to resources (e.g., condoms and printed educational materials). Some agencies provided HIV testing and counseling. Almost 50% of agencies claimed that their audiovisual and printed materials were targeted to certain groups, yet none used evaluated media. More than 50% of agencies offered consultation on policy issues but few companies used this service. Less than 50% included follow-up as part of their program. 30-40% acknowledged the importance of follow-up and either advocated it to the companies or provided it on request. A formal evaluation of program effectiveness had been conducted of only one program. Less than 50% of programs claimed that informal evaluations of their programs had been done. A major reason for not conducting a formal evaluation was cost. These findings show that programs tend not to follow the generally-accepted strategies of AIDS and the workplace programs. Decision makers in management and in trade unions need to become familiar with guidelines for effective AIDS programs so they can make informed choices about programs and services. They should see that the company complies with those guidelines by insisting on a

  16. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    PubMed

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  17. Workplace abuse: finding solutions.

    PubMed

    Christmas, Kate

    2007-01-01

    The atmosphere within the work setting speaks volumes about your culture, and is often a primary factor in recruitment and retention (or turnover) of staff. Workplace tension and abuse are significant contributing factors as to why nurses are exiting workplaces--and even leaving the profession. Abuse can take many forms from inappropriate interpersonal communication to sexual harassment and even violence. Administrators should adopt a zero tolerance policy towards abusive communication. Addressing peer behavior is essential, but positive behavior must also be authentically modeled from the CNO and other nursing leaders. Raising awareness and holding individuals accountable for their behavior can lead to a safer and more harmonious work environment.

  18. The ethics of feedback of HIV test results in population-based surveys of HIV infection.

    PubMed

    Maher, Dermot

    2013-12-01

    Population-based disease prevalence surveys raise ethical questions, including whether participants should be routinely told their test results. Ethical guidelines call for informing survey participants of any clinically relevant finding to enable appropriate management. However, in anonymous surveys of human immunodeficiency virus (HIV) infection, participants can "opt out" of being given their test results or are offered the chance to undergo voluntary HIV testing in local counselling and testing services. This is aimed at minimizing survey participation bias. Those who opt out of being given their HIV test results and who do not seek their results miss the opportunity to receive life-saving antiretroviral therapy. The justification for HIV surveys without routine feedback of results to participants is based on a public health utility argument: that the benefits of more rigorous survey methods - reduced participation bias - outweigh the benefits to individuals of knowing their HIV status. However, people with HIV infection have a strong immediate interest in knowing their HIV status. In consideration of the ethical value of showing respect for people and thereby alleviating suffering, an argument based on public health utility is not an appropriate justification. In anonymous HIV surveys as well as other prevalence surveys of treatable conditions in any setting, participation should be on the basis of routine individual feedback of results as an integral part of fully informed participation. Ensuring that surveys are ethically sound may stimulate participation, increase a broader uptake of HIV testing and reduce stigmatization of people who are HIV-positive.

  19. Collaborative Workplace Development: An Overview.

    ERIC Educational Resources Information Center

    Folinsbee, Sue; Jurmo, Paul

    This booklet, which is intended for educators, human resource specialists, and others responsible for training and education and workplace development, presents principles of good practice and steps for planning and implementing collaborative workplace development initiatives. A collaborative method of workplace development is detailed that…

  20. Participation in alcoholics anonymous: intended and unintended change mechanisms.

    PubMed

    Owen, Patricia L; Slaymaker, Valerie; Tonigan, J Scott; McCrady, Barbara S; Epstein, Elizabeth E; Kaskutas, Lee Ann; Humphreys, Keith; Miller, William R

    2003-03-01

    This article is a compilation of the information presented at a symposium at the 2001 RSA Meeting in Montreal, Canada. The presentations were: (1) Maintaining change after conjoint behavioral alcohol treatment for men: the role of involvement with Alcoholics Anonymous, by Barbara S. McCrady and Elizabeth E. Epstein; (2) Changing AA practices and outcomes: Project MATCH 3-year follow-up, by J. Scott Tonigan; (3) Life events and patterns of recovery of AA-exposed adults and adolescents, by Patricia L. Owen and Valerie Slaymaker; (4) Social networks and AA involvement as mediators of change, by Lee Ann Kaskutas and Keith Humphreys; and (5) What do we know about Alcoholics Anonymous? by William R. Miller, discussant.

  1. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    PubMed Central

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  2. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  3. ARX - A Comprehensive Tool for Anonymizing Biomedical Data

    PubMed Central

    Prasser, Fabian; Kohlmayer, Florian; Lautenschläger, Ronald; Kuhn, Klaus A.

    2014-01-01

    Collaboration and data sharing have become core elements of biomedical research. Especially when sensitive data from distributed sources are linked, privacy threats have to be considered. Statistical disclosure control allows the protection of sensitive data by introducing fuzziness. Reduction of data quality, however, needs to be balanced against gains in protection. Therefore, tools are needed which provide a good overview of the anonymization process to those responsible for data sharing. These tools require graphical interfaces and the use of intuitive and replicable methods. In addition, extensive testing, documentation and openness to reviews by the community are important. Existing publicly available software is limited in functionality, and often active support is lacking. We present ARX, an anonymization tool that i) implements a wide variety of privacy methods in a highly efficient manner, ii) provides an intuitive cross-platform graphical interface, iii) offers a programming interface for integration into other software systems, and iv) is well documented and actively supported. PMID:25954407

  4. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  5. Workplace Counseling Tools.

    ERIC Educational Resources Information Center

    Kirk, James J.; Woody, Connie; Burns, Naomi; Howard, Sherrie; Rice, Misty

    This publication describes counseling approaches supervisors and human resource professionals can use to help marginal employees become better adjusted and more productive in the workplace. Three case studies are also provided for training purposes. The counseling tools are as follows: (1) Adlerian counseling, involving the belief that humans'…

  6. Mathematics in Masons' Workplace

    ERIC Educational Resources Information Center

    Moreira, Darlinda; Pardal, Eugénia

    2012-01-01

    This paper presents masons' professional practices, which are related to mathematics. It aims to contribute to the area of adult mathematics education and to enlarge knowledge about how mathematics is used at the workplace. Methodologically it was followed an ethnographic approach. The key informants of the study were four masons aged between 40…

  7. Workplace Diversity Issues.

    ERIC Educational Resources Information Center

    1999

    This document contains three symposium papers on workplace diversity issues. "Expanding Theories of Career Development: Adding the Voices of African American Women in the White Academy" (Mary V. Alfred) questions the validity of existing career development models for women and minority groups and examines the professional development of…

  8. Informal Workplace Learning.

    ERIC Educational Resources Information Center

    1999

    The first of the four papers in this symposium, "Re-conceptualizing Marsick and Watkins' Model of Informal and Incidental Learning in the Workplace" (Maria Cseh, Karen E. Watkins, Victoria J. Marsick) describes the use of a revised model to encompass the learning perspectives of small business owner-managers who work in the volatile…

  9. Workplace Pedagogic Practices.

    ERIC Educational Resources Information Center

    Billett, Stephen

    2002-01-01

    Discusses findings of an investigation of a model of guided workplace learning in a large processing plant. The model is composed of three interdependent planes: (1) everyday participation at work; (2) guided learning for work; and (3) guided learning for transfer. (Contains 18 references.) (JOW)

  10. Communication in the Workplace.

    ERIC Educational Resources Information Center

    Shmerling, Leah

    Based on the National Communication Skills Modules taught at the TAFE (Technical and Further Education) level in Australia, this book is designed to enhance written and oral business communication skills. It covers interpersonal skills, teamwork, and presentation skills in six chapters on the following topics: workplace communication, writing…

  11. Diversity in the Workplace.

    ERIC Educational Resources Information Center

    1996

    This document contains three papers presented at a symposium on diversity in the workplace moderated by Sandra Johnson at the 1996 conference of the Academy of Human Resource Development (AHRD). "Diversity and Development: An Assessment of Equal Opportunities and the Role of HRD in the Police Service" (Rashmi Biswas, Penny Dick) examines…

  12. Multilingualism in European Workplaces

    ERIC Educational Resources Information Center

    Gunnarsson, Britt-Louise

    2014-01-01

    This state-of-the-art article includes a review of past and recent studies on multilingualism at work in European environments. One aim is to provide the reader with a cross-cultural picture of workplace studies on various languages in Europe, another to discuss both positive and problem-based accounts of multilingualism at work. The overview…

  13. Communication in the Workplace.

    ERIC Educational Resources Information Center

    Shmerling, Leah

    Based on the National Communication Skills Modules taught at the TAFE (Technical and Further Education) level in Australia, this book is designed to enhance written and oral business communication skills. It covers interpersonal skills, teamwork, and presentation skills in six chapters on the following topics: workplace communication, writing…

  14. Improving Schoolteachers' Workplace Learning

    ERIC Educational Resources Information Center

    Hodkinson, Heather; Hodkinson, Phil

    2005-01-01

    This paper is set in the context where there is a policy emphasis on teacher learning and development in a number of countries as a means towards school improvement. It reports on a longitudinal research project about the workplace learning of English secondary school teachers, carried out between 2000 and 2003. This was part of a Teaching and…

  15. Telecommunications in the Workplace.

    ERIC Educational Resources Information Center

    Burt, Lorna; Lewandowski, Carol

    This guide is intended for use in conducting an eight-session workplace literacy course that will help employees in the manufacturing and service industries acquire necessary job-specific telephone usage skills. The instructional materials included in the guide are designed to teach students to accomplish the following: use professional answering…

  16. Workplace Literacy Demonstration Project.

    ERIC Educational Resources Information Center

    Kissack, Tessie Saenz, Comp.; Clymer-Spradling, Carol, Ed.

    A model workplace literacy program is described that was designed to upgrade the basic skills of adult workers and developed by El Paso Community College in partnership with J&J Register Company, a Texas division of Philips Industries with approximately 300 workers. Pre-assessment results indicated that about 95 percent of the workers had…

  17. Marketing Manual: Workplace Literacy.

    ERIC Educational Resources Information Center

    Fanshawe Coll., Strathroy (Ontario).

    This manual applies marketing concepts and methods, selling techniques and principles to the workplace literacy program for the purpose of assisting individuals involved in promoting and selling these programs. Part I provides a rationale for marketing and discusses the following: the role of the sponsor in marketing, market versus marketing,…

  18. Shaping an ethical workplace.

    PubMed

    Gallagher, S M

    1998-12-01

    Ethical choices in business are often troublesome because business ethics are not simply an extension of personal ethics. Moral standards learned from private experiences may not translate to the business world. This article analyzes choices in the workplace and offer suggestions to move toward more ethical business practices.

  19. Changing Families, Changing Workplaces

    ERIC Educational Resources Information Center

    Bianchi, Suzanne M.

    2011-01-01

    American families and workplaces have both changed dramatically over the past half-century. Paid work by women has increased sharply, as has family instability. Education-related inequality in work hours and income has grown. These changes, says Suzanne Bianchi, pose differing work-life issues for parents at different points along the income…

  20. Multilingualism in European Workplaces

    ERIC Educational Resources Information Center

    Gunnarsson, Britt-Louise

    2014-01-01

    This state-of-the-art article includes a review of past and recent studies on multilingualism at work in European environments. One aim is to provide the reader with a cross-cultural picture of workplace studies on various languages in Europe, another to discuss both positive and problem-based accounts of multilingualism at work. The overview…

  1. Informal Workplace Learning.

    ERIC Educational Resources Information Center

    1999

    The first of the four papers in this symposium, "Re-conceptualizing Marsick and Watkins' Model of Informal and Incidental Learning in the Workplace" (Maria Cseh, Karen E. Watkins, Victoria J. Marsick) describes the use of a revised model to encompass the learning perspectives of small business owner-managers who work in the volatile…

  2. Workplace Diversity Issues.

    ERIC Educational Resources Information Center

    1999

    This document contains three symposium papers on workplace diversity issues. "Expanding Theories of Career Development: Adding the Voices of African American Women in the White Academy" (Mary V. Alfred) questions the validity of existing career development models for women and minority groups and examines the professional development of…

  3. Can Anonymous Posters on Medical Forums be Reidentified?

    PubMed Central

    Bobicev, Victoria; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-01-01

    Background Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. Objective The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. Methods The messages were labeled by nicknames of the forum participants. We evaluated the system’s performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Results Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Conclusions Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post

  4. Taxonomy for and Analysis of Anonymous Communications Networks

    DTIC Science & Technology

    2009-03-01

    Internet culture. In societies throughout history, anonymity has always been a pervasive, dichotomous issue. For instance, millionaires differ on...dubious dogma as well as abusive, illegal activity. AFIT/DCS/ENG/09-08 - 2 - In the boundless digital world and global society of the Internet...with respect to preventing physical assault, but as newer business models and media coverage started to significantly affect society , intrusion into

  5. Self-disclosure. Reconciling psychoanalytic psychotherapy and alcoholics anonymous philosophy.

    PubMed

    Mallow, A J

    1998-01-01

    Therapists working in the addictions field and practicing from a psychoanalytic psychodynamic framework are often confronted with the patient's need to know, the demand for therapist self-disclosure. Consistent with Alcoholics Anonymous (AA) principles, many patients state that they cannot be helped unless the therapist is revealing of their personal background. This paper discusses the theoretical roots of therapist self-disclosure and the AA philosophy and offers suggestions for how the two might be reconciled.

  6. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle

    PubMed Central

    Pagano, Maria E.; Post, Stephen G.; Johnson, Shannon M.

    2012-01-01

    The helper therapy principle (HTP) observes the helper’s health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry. PMID:23525280

  7. Security Analysis of Accountable Anonymous Group Communication in Dissent

    DTIC Science & Technology

    2013-01-31

    simple yet powerful attack against one scheme (Park, Itoh, and Kurosawa 1994) trivially breaks an honest member’s anonymity if an attacker can create a...probably secure (Jakobsson 1998) was given by Mitomo and Kurosawa (2000). A corrupted mix server can alter intermediate ciphertexts, affect- ing the...Pfizmann 1990; Desmedt and Kurosawa 2000) general design flaws as well 62 as the ability of mix servers to use incorrect and specially-prepared inputs

  8. Utility-preserving transaction data anonymization with low information loss

    PubMed Central

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-01-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual’s record to their identity. Approaches that anonymize data by eliminating certain values in an individual’s record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers’ utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency. PMID:22563145

  9. [E-research: problems with anonymity and consent].

    PubMed

    Woolderink, Marla; van Asselt, Antoinette D I; van Schayck, Constant P; van Wijmen, Frans C B

    2013-01-01

    The Medical Research Involving Human Subjects Act (WMO) requires that participants in medical-scientific studies provide written consent. This requirement makes e-research (online research) unnecessarily difficult and sometimes impossible. Much of e-research involves online interventions that focus on sensitive issues such as sexual dysfunction, addiction and child abuse, for which anonymity is an important condition. WMO procedures, however, strictly interpret the word "written" as "on paper", and participants are not permitted to give consent by email, for example. A second requirement, which mainly makes studies among minors between the ages of 12 and 18 more difficult, is that both parents or the guardian must provide written consent. This undermines anonymity to such an extent that virtually no subjects remain. Participants in medical-scientific studies must always be identifiable to the investigator. But, apart from this, he/she should be possible to guarantee anonymity within the regulatory framework. There is good reason to adapt legal regulations to today's needs.

  10. Utility-preserving transaction data anonymization with low information loss.

    PubMed

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  11. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  12. [Concept analysis of workplace bullying].

    PubMed

    Ma, Shu-Ching; Wang, Hsiu-Hung; Chen, Jih-Yuan

    2011-08-01

    Workplace bullying is a complicated and imprecise concept. Research findings have highlighted it as an important issue in the nursing environment worldwide. Workplace bullying arises due to malfunctions in workplace organizational and cultural related antecedents and manifests in various forms. Many studies have reported that nurses experiencing workplace bullying face increased levels of physical, psychological and social distress, may adopt suicidal thoughts and negativity towards the nursing profession, and may even abandon the nursing profession completely. Although a large number of papers have discussed the antecedents, forms and interventions related to workplace bullying, there has yet been no systematic concept analysis of workplace bullying. This paper applied Walker and Avant's concept analysis process to verify concept definitions, identify defining attributes, antecedents, and consequences, and provide examples of model, borderline, and contrary cases. Findings can help nursing administrators understand and clarify the meaning of workplace bullying in order to take appropriate measures to improve the working environment for nursing professionals.

  13. Understanding HIV-related stigma among Indonesian nurses.

    PubMed

    Waluyo, Agung; Culbert, Gabriel J; Levy, Judith; Norr, Kathleen F

    2015-01-01

    Evidence indicates widespread stigmatization of persons living with HIV (PLWH) in Indonesia. Such attitudes among health care workers could impede the country's policies for effective diagnosis and medical treatment of PLWH. Nonetheless, research to guide interventions to reduce stigma in health care settings is lacking. Also, the contributions of workplace, religion, and HIV knowledge to nurses' HIV-related stigma are poorly understood. Our cross-sectional study aimed to describe factors associated with nurses' stigmatizing attitudes toward PLWH. Four hundred nurses recruited from four hospitals in Jakarta, Indonesia, were surveyed using the Nurse AIDS Attitude Scale to measure stigma. Stigmatizing attitudes were significantly predicted by education, HIV training, perceived workplace stigma, religiosity, Islamic religious identification, and affiliation with the Islamic hospital. HIV knowledge was not a significant predictor of stigmatizing attitudes. Organization changes fostering workplace diversity are likely to substantially reduce stigmatizing attitudes in nurses. Copyright © 2015 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.

  14. Understanding HIV-related stigma among Indonesian nurses

    PubMed Central

    Waluyo, Agung; Culbert, Gabriel J.; Levy, Judith; Norr, Kathleen

    2014-01-01

    Evidence indicates widespread stigmatization of persons living with HIV (PLWH) in Indonesia. Such attitudes among health care workers could impede the country’s policies for effective diagnosis and medical treatment of PLWH. Nonetheless, research to guide interventions to reduce stigma in health care settings is lacking. Also, the contributions of workplace, religion, and HIV knowledge to nurses’ HIV-related stigma are poorly understood. Our cross-sectional study aimed to describe factors associated with nurses’ stigmatizing attitudes toward PLWH. Four hundred nurses recruited from 4 hospitals in Jakarta, Indonesia, were surveyed using the Nurse AIDS Attitude Scale (NAAS) to measure stigma. Stigmatizing attitudes were significantly predicted by education, HIV training, perceived workplace stigma, religiosity, Islamic religious identification, and affiliation with the Islamic hospital. HIV knowledge was not a significant predictor of stigmatizing attitudes. Organization changes fostering workplace diversity are likely to substantially reduce stigmatizing attitudes in nurses. PMID:24759060

  15. 65 FR 17745 - Program Announcement for the Evaluation of Parents Anonymous®

    Federal Register 2010, 2011, 2012, 2013, 2014

    2000-04-04

    ... Parents Anonymous ; Notice #0;#0;Federal Register / Vol. 65, No. 65 / Tuesday, April 4, 2000 / Notices#0... Announcement for the Evaluation of Parents Anonymous AGENCY: Office of Justice Programs, Office of Juvenile... Parents Anonymous program. The purpose of the evaluation is to assess the implementation and...

  16. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    ERIC Educational Resources Information Center

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  17. Planning peer education programmes in the workplace.

    PubMed

    Hirschmann De Salazar, A

    1998-01-01

    In Guatemala, the HIV/AIDS epidemic is expected to have a vast negative impact on private enterprises as employees battle the disease in themselves and in family members. In response, the Guatemalan Association for the Prevention and Control of AIDS (AGPCS) developed a program to train private sector employees in peer health education. The program began by informing employers about the potential impact of HIV/AIDS on the private sector. Then AGPCS designed a workshop consisting of 11 two-hour weekly modules to provide up to 30 participants with information on sexually transmitted diseases, AIDS, and related issues. The first business to take advantage of the program was a 7000-employee clothing factory that continues to implement HIV prevention strategies. However, concern about the loss of employee time impeded other companies from participating. AGPCS, therefore, increased its flexibility and gave employers the option of sending employees to fewer seminars on topics the employers choose. This new approach led to 31 workshops in 1997 and 28 by August 1998. Also, in 1998, one company hired AGPCS to present 20 workshops to all of their employees. Efforts are made to evaluate workshop effectiveness and to facilitate follow-up activities. Peer education is an important part of the program, and potential peer educators are provided with a manual, extra training, and follow-up help. The training has helped companies develop work-place AIDS policies, and the AGPCS project has become sustainable.

  18. Arthrodesis after workplace injuries.

    PubMed

    Galey, Stephanie; Sferra, James J

    2002-06-01

    Many foot and ankle injuries are incurred in the workplace. Despite steel-toed shoes, metatarsal bars, and ankle-high boots, fractures which require arthrodesis procedures can occur. The area of the foot and ankle involved, any pre-existing conditions, and the patient's occupational requirements must be taken into account. When an employer is flexible, the patient can often return to a sit down job during the postoperative recovery, if intermittent elevation of the extremity is permitted and hours are gradually increased. Alternatively, manual laborers who operate heavy machinery or work on ladders or elevated surfaces will require a prolonged recovery period before being able to return to the workplace. Algorithms with return to work dates may be helpful, but because so many factors exist, a functional capacity evaluation is often necessary to determine what, if any, permanent restrictions will be required.

  19. Human factors workplace considerations

    NASA Technical Reports Server (NTRS)

    Haines, Richard F.

    1988-01-01

    Computer workstations assume many different forms and play different functions today. In order for them to assume the effective interface role which they should play they must be properly designed to take into account the ubiguitous human factor. In addition, the entire workplace in which they are used should be properly configured so as to enhance the operational features of the individual workstation where possible. A number of general human factors workplace considerations are presented. This ongoing series of notes covers such topics as achieving comfort and good screen visibility, hardware issues (e.g., mouse maintenance), screen symbology features (e.g., labels, cursors, prompts), and various miscellaneous subjects. These notes are presented here in order to: (1) illustrate how one's workstation can be used to support telescience activities of many other people working within an organization, and (2) provide a single complete set of considerations for future reference.

  20. Defining workplace bullying behaviour professional lay definitions of workplace bullying.

    PubMed

    Saunders, Paula; Huynh, Amy; Goodman-Delahunty, Jane

    2007-01-01

    As is commonly the case in new areas of research, workplace bullying researchers and practitioners have struggled to establish a single agreed-upon definition of this phenomenon. As a consequence, there are numerous definitions of workplace bullying currently in use around the world to investigate this serious workplace issue, to educate the workforce about this form of harassment and to assess claims involving allegations of workplace bullying. Additionally, little is known about how employees and people in general define workplace bullying behaviour, and whether current researcher, practitioner and legal definitions coincide with lay definitions of bullying. To compare researcher, practitioner and legal definitions of workplace bullying with lay definitions, the content of definitions composed by adults from diverse personal and professional backgrounds (N=1095) was analysed. Results confirmed that components commonly used by researchers and practitioners, including the occurrence of harmful and negative workplace behaviours, were frequently cited by participants as central defining components of bullying behaviour. In addition, lay definitions often included themes of fairness and respect. The emergence of these themes has important consequences for organisations responding to, and attempting to prevent the occurrence of workplace bullying behaviour in that organisations in which bullying is tolerated may violate both local laws as well as their ethical responsibility to provide employees with a safe, professional and respectful workplace.

  1. [Depression in the workplace].

    PubMed

    Mezerai, Mustapha; Dahane, Abdelkrim; Tachon, Jean-Paul

    2006-05-01

    Depression is the object of a dense literature, and synthesizing it is more of a utopian ideal rather than a concrete possibility. Several specific risk factors for mental health are found in the workplace: work overloads, defective communications, role conflicts, competitive climate, and tolerance of violence. At the same time, few preventive measures have been implemented against mental disorders at work, nor are many protective factors present. One worker in ten suffers from depression, anxiety, stress, or overwork. To be distinguished from "burnout", depressive symptoms must induce clinically significant suffering with substantial deterioration in functioning at work. For depression to be recognized as a workplace accident, the employee must show that it was triggered by an unforeseen and sudden event (or at least one certainly) due to or at work. The causal link between an event at work and the depression must be shown (in particular by expert medical testimony about stress factors and indicators of vulnerability to depression). Its recognition as an occupational disease can be based on the presence of psychosocial factors described by models of workplace stress and on its description by the occupational physician.

  2. HIV Transmission

    MedlinePlus

    ... Abroad Treatment Basic Statistics Get Tested Find an HIV testing site near you. Enter ZIP code or city Follow HIV/AIDS CDC HIV CDC HIV/AIDS See RSS | ... on HIV Syndicated Content Website Feedback HIV/AIDS HIV Transmission Language: English (US) Español (Spanish) Recommend ...

  3. The implications of stigma and anonymity for self-disclosure in health blogs.

    PubMed

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  4. Competing discourses of workplace health.

    PubMed

    Allender, Steven; Colquhoun, Derek; Kelly, Peter

    2006-01-01

    This article presents an analysis of workplace health programme discourses within an international information technology company. Discourse refers to a system of statements that share a common force and coherence and which are socially constitutive. The representation of entities such as workplace health can be subject to competition between discourses. A critical discourse analysis was undertaken on semi-structured interviews, participant observation and workplace health programme documents. Two competing discourses were identified: health as safety and health as lifestyle. Each discourse is described and shown to both implicitly and explicitly define health within this particular workplace. Lifestyle discourse encouraged moves towards linking of the employees' working and private lives while safety discourse defined health in the relationship between workers and their physical environment. Competition between discourses both constricts and opens spaces for alternative understandings of health in the workplace. The implications of this competition for workplace health policy and practice are discussed.

  5. Harnessing the heightened public awareness of celebrity HIV disclosures: "Magic" and "Cookie" Johnson and HIV testing.

    PubMed

    Tesoriero, J M; Sorin, M D; Burrows, K A; LaChance-McCullough, M L

    1995-06-01

    This article investigates the impact NBA basketball star Earvin ("Magic") Johnson's HIV disclosure had on changes in demand for HIV counseling and testing services in New York State's 61 Anonymous HIV Counseling and Testing sites. Interrupted time-series analyses were conducted on weekly data from over 34,000 clients seeking anonymous HIV counseling and testing services from January 1991 to June 1992, to determine whether demand for these services changed as a result of the disclosure. Results indicated that immediately following the HIV disclosure, there was a substantial increase in service demand, which transcended all sex, race, age, and most HIV risk-related boundaries. Seven months later, demand had not returned to pre-disclosure levels. The strong impact on females, coupled with additional data analyses in obstetrical settings, suggests that previous research has been too narrow in focus, and that the effect of Johnson's HIV disclosure has been enhanced, in part, by the publicity surrounding his wife and baby. The importance of harnessing the heightened public awareness of celebrity HIV disclosures is discussed.

  6. Professional Development Project for Workplace Education Teachers.

    ERIC Educational Resources Information Center

    Blight, Bronwen; Nou, Georgina

    1993-01-01

    A training course for workplace education teachers had five modules: the changing workplace, its impact on workers, nonteaching roles of the practitioner, teaching skills for the workplace, and program management. Flexible delivery modes and mentoring were also featured. (SK)

  7. An efficient and anonymous buyer-seller watermarking protocol.

    PubMed

    Lei, Chin-Laung; Yu, Pei-Ling; Tsai, Pan-Lung; Chan, Ming-Hwa

    2004-12-01

    For the purpose of deterring unauthorized duplication and distribution of multimedia contents, a seller may insert a unique digital watermark into each copy of the multimedia contents to be sold. When an illegal replica is found in the market sometime later, the seller can determine the responsible distributor by examining the watermark embedded. However, the accusation against the charged distributor, who was the buyer in some earlier transaction, is objectionable because the seller also has access to the watermarked copies and, hence, is able to release such a replica on her own. In this paper, a watermarking protocol is proposed to avoid such difficulties, known as the customer's right problem, in the phase of arbitration. The proposed watermarking protocol also provides a fix to Memon and Wong's scheme by solving the unbinding problem. In addition, the buyer is no longer required to contact the watermark certification authority during transactions, and the anonymity of the buyer can be retained through a trusted third party. The result is an efficient and anonymous buyer-seller watermarking protocol.

  8. The living anonymous kidney donor: lunatic or saint?

    PubMed

    Henderson, Antonia J Z; Landolt, Monica A; McDonald, Michael F; Barrable, William M; Soos, John G; Gourlay, William; Allison, Colleen J; Landsberg, David N

    2003-02-01

    Studies indicate that 11% to 54% of individuals surveyed would consider donating a kidney, while alive, to a stranger. The idea of 'living anonymous donors' (LADs) as a donor source, however, has not been embraced by the medical community. Reservations focus on the belief that LADs might be psychologically unstable and thus unsuitable donors. Our goal was to inform policy development by exploring the psycho-social make up and motivations of the LAD. Ninety-three unsolicited individuals contacted our center expressing interest in living anonymous donation. Of these, 43 participated in our study, completing two extensive inventories of psychopathology and personality disorder and taking part in the Comprehensive Psycho-Social Interview (CPSI). From the Personality Assessment Inventory (PAI), the revised NEO Personality Inventory (NEO PI-R), and the CPSI, coders assessed psychological health, psycho-social suitability, commitment, and motivations. Twenty-one participants passed the stringent criteria to be considered potential LADs. Content analysis of motivations showed that potential LADs were more likely than non-LADs (those who did not pass the criteria) to have a spiritual belief system and to be altruistic. Non-LADs were more likely than potential LADs to use donation to make a statement against their families. The authors conclude with a preliminary outline of eight policy recommendations.

  9. Quantum anonymous voting with unweighted continuous-variable graph states

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  10. An improved anonymous authentication scheme for telecare medical information systems.

    PubMed

    Wen, Fengtong; Guo, Dianli

    2014-05-01

    Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients' privacy is very significant. Very recently, Wu et al. identified Jiang et al.'s authentication scheme had some security drawbacks and proposed an enhanced authentication scheme for TMIS. However, we analyze Wu et al.'s scheme and show that their scheme suffers from server spoofing attack, off-line password guessing attack, impersonation attack. Moreover, Wu et al.'s scheme fails to preserve the claimed patient anonymity and its password change phase is unfriendly and inefficient. Thereby, we present a novel anonymous authentication scheme for telecare medical information systems to eliminate the aforementioned faults. Besides, We demonstrate the completeness of the proposed scheme through the BAN logic. Furthermore, the security of our proposed scheme is proven through Bellare and Rogaways model. Compared with the related existing schemes, our scheme is more secure.

  11. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    PubMed Central

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR. PMID:24605060

  12. Private anonymous fingerprinting for color images in the wavelet domain

    NASA Astrophysics Data System (ADS)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  13. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    PubMed

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  14. Nonexposure accurate location K-anonymity algorithm in LBS.

    PubMed

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  15. HIV Risk and Protection among Gay Male Couples: The Role of Gay Community Integration

    ERIC Educational Resources Information Center

    Fergus, Stevenson; Lewis, Megan A.; Darbes, Lynae A.; Butterfield, Rita M.

    2005-01-01

    This study examined the association between different types of integration in the gay community and HIV risk among gay male couples. Previous research linking gay community integration and involvement among couples to HIV risk has been equivocal. Each partner in 59 gay couples completed a separate anonymous questionnaire that assessed two types of…

  16. Education and Nutritional Status of Orphans and Children of HIV-Infected Parents in Kenya

    ERIC Educational Resources Information Center

    Mishra, Vinod; Arnold, Fred; Otieno, Fredrick; Cross, Anne; Hong, Rathavuth

    2007-01-01

    We examined whether orphaned and fostered children and children of HIV-infected parents are disadvantaged in schooling, nutrition, and health care. We analyzed data on 2,756 children aged 0-4 years and 4,172 children aged 6-14 years included in the 2003 Kenya Demographic and Health Survey, with linked anonymous HIV testing, using multivariate…

  17. Education and Nutritional Status of Orphans and Children of HIV-Infected Parents in Kenya

    ERIC Educational Resources Information Center

    Mishra, Vinod; Arnold, Fred; Otieno, Fredrick; Cross, Anne; Hong, Rathavuth

    2007-01-01

    We examined whether orphaned and fostered children and children of HIV-infected parents are disadvantaged in schooling, nutrition, and health care. We analyzed data on 2,756 children aged 0-4 years and 4,172 children aged 6-14 years included in the 2003 Kenya Demographic and Health Survey, with linked anonymous HIV testing, using multivariate…

  18. Champaign County National Workplace Literacy Program. Workplace Literacy Curriculum.

    ERIC Educational Resources Information Center

    Champaign County Board of Education, Urbana, OH.

    This workplace literacy curriculum is based on neuropsychological brain behavior research and the principles of continuous improvement in a learning environment. Section 1 explains the choice of this model. Section 2 defines the need for this type of workplace curriculum. Sections 3 and 4 discuss the method of building the thematic units and…

  19. Workplace English: From Literature Classics to Workplace Literacy.

    ERIC Educational Resources Information Center

    Dixon-Krauss, Lisbeth; McClanahan, Linda

    This paper explains the rationale and methods for integrating workplace literacy with English literature instruction for high school or adult students. The workplace literacy/English literature activities presented include: (1) a newsletter format reporting on the major historical periods in English literature; (2) a business project report used…

  20. The impact of workplace factors on evidence-based speech-language pathology practice for children with autism spectrum disorders.

    PubMed

    Cheung, Gladys; Trembath, David; Arciuli, Joanne; Togher, Leanne

    2013-08-01

    Although researchers have examined barriers to implementing evidence-based practice (EBP) at the level of the individual, little is known about the effects workplaces have on speech-language pathologists' implementation of EBP. The aim of this study was to examine the impact of workplace factors on the use of EBP amongst speech-language pathologists who work with children with Autism Spectrum Disorder (ASD). This study sought to (a) explore views about EBP amongst speech-language pathologists who work with children with ASD, (b) identify workplace factors which, in the participants' opinions, acted as barriers or enablers to their provision of evidence-based speech-language pathology services, and (c) examine whether or not speech-language pathologists' responses to workplace factors differed based on the type of workplace or their years of experience. A total of 105 speech-language pathologists from across Australia completed an anonymous online questionnaire. The results indicate that, although the majority of speech-language pathologists agreed that EBP is necessary, they experienced barriers to their implementation of EBP including workplace culture and support, lack of time, cost of EBP, and the availability and accessibility of EBP resources. The barriers reported by speech-language pathologists were similar, regardless of their workplace (private practice vs organization) and years of experience.

  1. HIV testing behaviors and attitudes after adoption of name-to-code HIV case surveillance in Washington State.

    PubMed

    Hopkins, Sharon G; Gelfand, Sarah E; Buskin, Susan E; Kent, James B; Kahle, Erin M; Barkan, Susan E

    2005-01-01

    Controversy over HIV reporting in Washington State raised concerns that name-to-code reporting might reduce HIV testing. We assessed HIV testing and the influence of reporting among people at risk for HIV. An anonymous survey was conducted 9 months after HIV reporting began. Recruitment for men who have sex with men was at bars; high-risk heterosexuals at a sexually transmitted disease clinic; and injection drug users at needle exchange sites. Eighty-nine percent of 267 participants had been tested for HIV at least once but only half reported testing regularly. Injection drug users and men who have sex with men were more likely than HRH to report regular testing. Main reasons for delaying testing were thinking that HIV exposure was unlikely or not wanting to think about being HIV positive; concern about government reporting was cited by only 2%. Over half the respondents hadn't heard about the new name-to-code HIV reporting mechanism, although 69% thought there was some type of HIV reporting. Only 18% correctly identified the mechanism of HIV reporting. HIV prevention programs should focus on the most common reasons for delaying or avoiding HIV testing: believing that one has not been exposed to HIV, and the fear of learning that one is HIV positive.

  2. Partnering with the 21st century workplace: leveraging workplace ecology.

    PubMed

    Bricout, John C

    2003-01-01

    The 'accessible' job market of the 1990's has given way to a challenging job market in a climate of economic uncertainty in the early Twenty-First Century. For vocational rehabilitation professionals this change requires the strategic use of workplace supports to increase the value and sustainability of work performed by people with disabilities in competitive jobs. An analytical framework for leveraging the natural supports of the workplace is provided by the workplace ecology as a bounded environment in which relationships between workers and supervisors promote learning and enhanced performance. The dynamics of the workplace ecology are explored with particular reference to workers with disabilities receiving supported employment services. Recommendations are made for leveraging the workplace ecology to the benefit of the supported worker. Implications for supported employment services in the new millennium are discussed.

  3. Workplace Bullying in Surgery.

    PubMed

    Ling, Mary; Young, Christopher J; Shepherd, Heather L; Mak, Cindy; Saw, Robyn P M

    2016-11-01

    The aim of this study was to determine the extent and nature of workplace bullying among General Surgery trainees and consultants in Australia. An online questionnaire survey of General Surgery trainees and consultant surgeons in Australia was conducted between March and May 2012. Prevalence of bullying was measured using both a definition of workplace bullying and the revised Negative Acts Questionnaire (NAQ-R). Sources of bullying were also examined, as well as the barriers and outcomes of formal reporting of bullying. The response rate was 34 % (370/1084) with 41 % (n = 152) of respondents being trainees. Overall, 47 % (n = 173) of respondents reported having been bullied to some degree and 68 % (n = 250) reported having witnessed bullying of surgical colleagues in the last 12 months. The prevalence of bullying was significantly higher in trainees and females, with 64 % of trainees and 57 % of females experiencing some degree of bullying. The majority of respondents (83 %) had experienced at least one negative behavior in the last 12 months, but 38 % experienced at least one negative behavior on a weekly or daily basis. The persistent negative behaviors that represent work-related bullying most commonly experienced were 'having opinions ignored' and 'being exposed to an unmanageable workload.' Consultant surgeons were the most common source of bullying for both trainees and consultants, with administration the next common source. Of those who reported being bullied, only 18 % (n = 32) made a formal complaint. Despite increased awareness and interventions, workplace bullying remains a significant problem within General Surgery in Australia. The findings in this study serve as a baseline for future questionnaires to monitor the effectiveness of implemented anti-bullying interventions.

  4. [HIV infection in pregnant women in Dakar (Senegal)].

    PubMed

    Diouf, A; Kebe, F; Faye, E O; Diallo, D; Ndour Sarr, A; Mboup, S; Diadhiou, F

    1996-01-01

    The epidemiologic and sociodemographic characteristics of human deficiency virus (HIV) infection vary from one country to another. The objective of this study was to determine the prevalence of HIV infection in pregnant women in Dakar and associated factors. Systematic anonymous screening was performed in pregnant women admitted to the maternity ward. Women whose seropositivity was confirmed by Western blot retroviral serology were included. One woman out of four was assigned by simple random selection to the case control group. Over a 24 month period, 12,498 women were tested. 104 were seropositive (44 HIV1, 58HIV2, and 2 HIV1-HIV2 giving a prevalence of 0.8%. Factors associated with HIV1 and HIV2 were different: mean age 21.7 years for HIV1 versus 30.6 for HIV 2 (p = 0.05); origin in Guinea-Bissau for HIV2 (p = 0.001); mean number of pregnancies 2.6 for HIV1 versus 5.9 for HIV2 (p = 0.001); mean parity 1.5 for HIV1 versus 4.5 for HIV2 (p < 0.01); vitality of the conception product in 85.1% for HIV2 versus 67.5% for HIV1 (p = 0.0001). These data confirm the low prevalence of HIV infection in pregnant women, with a predominance for HIV2. The factors identified in associated with virus type suggest a different mode of transmission and/or reduced virulence or HIV2 compared with HIV1. Knowledge of these factors helps orient management strategies, especially in pregnant women.

  5. Workplace Wellness Programs Study

    PubMed Central

    Mattke, Soeren; Liu, Hangsheng; Caloyeras, John; Huang, Christina Y.; Van Busum, Kristin R.; Khodyakov, Dmitry; Shier, Victoria

    2013-01-01

    Abstract This article investigates the characteristics of workplace wellness programs, their prevalence, their impact on employee health and medical cost, facilitators of their success, and the role of incentives in such programs. The authors employ four data collection and analysis streams: a review of the scientific and trade literature, a national survey of employers, a longitudinal analysis of medical claims and wellness program data from a sample of employers, and five case studies of existing wellness programs in a diverse set of employers to gauge the effectiveness of wellness programs and employees' and employers' experiences. PMID:28083294

  6. Smoke-Free Workplace

    DTIC Science & Technology

    1994-03-07

    8217 (FTý, . kIrcferred to a, secondhand or passive smoke . Exhaled and/or sidestream smoke emitted from smokers and the burning of cigarettes, cigars, and...DTIC S E 1519CDepartment of Defense fl "INSTRUCTIONC AD-A276 525 March 7, 1994 -- lil l1111 i 1tllilIi qlllllll NUMBER 1omo.is USD(A) SUBJECT : Smoke ...34Environmental Smoke in the Workplace," June 1991 (d) Environmental Protection Agency (EPA) Report, "Respiratory Health Effects of Passive Smoking : Lung Cancer and

  7. Conceptions of Workplace University Education.

    ERIC Educational Resources Information Center

    Martin, Elaine

    1998-01-01

    A study examined how academic staff involved in workplace supervision of students conceive of the workplace experience in four professional areas: engineering, business administration, health sciences, and social science. Five concepts are identified, and a relationship is seen between the conceptions and the quality of student learning. Staff…

  8. Evaluating Workplace Education Program Effectiveness.

    ERIC Educational Resources Information Center

    Burkhart, Jennifer

    This guide, which is intended for project directors, coordinators, and other professional staff involved in developing and delivering workplace education programs, explains the workplace education evaluation process, the main approaches to evaluation, and considerations in selecting appropriate evaluation instruments. Discussed first are the…

  9. Workplace Learning: A Literature Review

    ERIC Educational Resources Information Center

    Vaughan, Karen

    2008-01-01

    As we move into being a knowledge society, the way an organisation learns can be key to its innovation and profitability. This literature review examines the nature of workplace learning, with a focus on nonprofessional occupations, including those closely associated with workplace training. It identifies the conditions that facilitate workplace…

  10. Marketing Workplace Education to Business.

    ERIC Educational Resources Information Center

    Burkhart, Jennifer

    This guide, which is intended for project directors, coordinators, and other professional staff interested in marketing adult basic skills and workplace education programs to business, presents a six-step process for developing a marketing plan. Discussed first are the purposes of marketing and considerations in marketing workplace education to…

  11. Workplace Learning: A Literature Review

    ERIC Educational Resources Information Center

    Vaughan, Karen

    2008-01-01

    As we move into being a knowledge society, the way an organisation learns can be key to its innovation and profitability. This literature review examines the nature of workplace learning, with a focus on nonprofessional occupations, including those closely associated with workplace training. It identifies the conditions that facilitate workplace…

  12. Workplace Education Sample Evaluation Report.

    ERIC Educational Resources Information Center

    Bozarjian, Bob; Uvin, Johan

    This sample evaluation report is part of a series of resources developed for and by workplace education practitioners in business, education, and labor partnerships funded through the Massachusetts Department of Education's Workplace Literacy Program. Data included in the report are based on Project Health, which integrates the experiences from…

  13. Convenience Store Workplace Literacy Curriculum.

    ERIC Educational Resources Information Center

    Van Duzer, Carol; Mansoor, Inaam

    The Convenience Store Workplace Literacy Curriculum was developed for English-as-a-Second-Language classes offered by the Southland Corporation, 7-Eleven stores, through a national workplace literacy grant. It is based on an analysis of the tasks and interactions common to a convenience store worksite. Store employees, managers, field consultants,…

  14. Workplace incivility: a concept analysis.

    PubMed

    Abolfazl Vagharseyyedin, Seyyed

    2015-01-01

    This study aimed to describe the meaning of the concept 'workplace incivility' and promote consistency in its application in nursing research and practice. The methodology introduced by Walker and Avant was used to analyze this concept. A total number of 50 studies that had essentially addressed the concept of incivility in employees' work environment was selected. Ambiguous intent, violation of mutual respect, low intensity and lack of physical assault were identified as the defining attributes of workplace incivility. The necessary antecedent of workplace incivility consisted of the presence of two or more people, with one or more as the source of the incivility, and another or others as its target in the workplace. Moreover, certain individual and organisational factors were the potential antecedents of workplace incivility. Possible negative outcomes for victims, witnesses, organisations, society and perpetrators of such behaviours, such as increased cost for the organisation, reduced citizenship performance, psychological distress and anxiety were identified as outcomes of workplace incivility. Results of the current concept analysis can guide nurse managers to design interventions so that the occurrence of workplace incivility can be reduced. Further studies can focus on testing the psychometric properties of the existing workplace incivility scales, especially uncivil behaviours experienced by nurses across different societies or cultures.

  15. Black Boxes in Workplace Mathematics

    ERIC Educational Resources Information Center

    Williams, Julian; Wake, Geoff

    2007-01-01

    We ground Cultural-Historical Activity Theory (CHAT) in studies of workplace practices from a mathematical point of view. We draw on multiple case study visits by college students and teacher-researchers to workplaces. By asking questions that "open boxes", we "outsiders and boundary-crossers" sought to expose contradictions between College and…

  16. Adult Learning in the Workplace.

    ERIC Educational Resources Information Center

    1999

    This document contains four symposium papers on adult learning in the workplace. "The Relationship between Workplace Learning and Employee Satisfaction in Small Businesses" (Robert W. Rowden, Shamsuddin Ahmad) reports the results of a study of the nature and extent of HRD, level of job satisfaction among workers, and correlation between…

  17. The Toll of Workplace Bullying

    ERIC Educational Resources Information Center

    Killoren, Robert

    2014-01-01

    Bullying may be more common than most people think. According to a study commissioned by the Workplace Bullying Institute, one in three employees experience bullying in the workplace either as a victim or as a witness suffering collateral damage. Bullying is a serious problem. Directors, managers, and staff members need to ensure that it does not…

  18. Experience, Competence and Workplace Learning

    ERIC Educational Resources Information Center

    Paloniemi, Susanna

    2006-01-01

    Purpose: This paper aims to examine employees' conceptions of the meaning of experience in job-competence and its development in workplace context. The aim is to bring out the variety of conceptions related to experience, competence and workplace learning. Design/methodology/approach: The paper is based on interview data from six Finnish small and…

  19. Experience, Competence and Workplace Learning

    ERIC Educational Resources Information Center

    Paloniemi, Susanna

    2006-01-01

    Purpose: This paper aims to examine employees' conceptions of the meaning of experience in job-competence and its development in workplace context. The aim is to bring out the variety of conceptions related to experience, competence and workplace learning. Design/methodology/approach: The paper is based on interview data from six Finnish small and…

  20. Black Boxes in Workplace Mathematics

    ERIC Educational Resources Information Center

    Williams, Julian; Wake, Geoff

    2007-01-01

    We ground Cultural-Historical Activity Theory (CHAT) in studies of workplace practices from a mathematical point of view. We draw on multiple case study visits by college students and teacher-researchers to workplaces. By asking questions that "open boxes", we "outsiders and boundary-crossers" sought to expose contradictions between College and…

  1. Ohio Workplace Education Resource Guide.

    ERIC Educational Resources Information Center

    Northwest ABLE Resource Center, Toledo, OH.

    This manual is designed for adult basic education programs to use as a resource for workplace education (WE). It begins with a section of introductory materials, including a WE definition, scope of work, and survey results. The next section contains a program profile; director/coordinator profile; instructor profiles; Ohio ABLE workplace site…

  2. Communication Skills for Workplace Assessors.

    ERIC Educational Resources Information Center

    Corbett, Deborah

    This document is designed to help develop the communication skills of individuals training for the position of workplace assessor in Australia's National Training Framework and practicing workplace assessors who require additional assistance with on-the-job communication skills. The document consists of 11 units of study that each contain some or…

  3. Developing Literacy for the Workplace.

    ERIC Educational Resources Information Center

    Keeley, Meg

    This paper presents a case and some ideas for integrating basic skills development with occupational training. Explaining why traditional instructional methods do not work in the workplace, the paper summarizes learning theories that support work force literacy programs. It explains how to identify the skills needed in the workplace, provides…

  4. Part of the job? Workplace violence in Massachusetts social service agencies.

    PubMed

    Zelnick, Jennifer R; Slayter, Elspeth; Flanzbaum, Beth; Butler, Nanci Ginty; Domingo, Beryl; Perlstein, Judith; Trust, Carol

    2013-05-01

    Workplace violence is a serious and surprisingly understudied occupational hazard in social service settings. The authors of this study conducted an anonymous, Internet-based survey of Massachusetts social service agencies to estimate the incidence of physical assault and verbal threat of violence in social service agencies, understand how social service agencies collect data on workplace violence, and identify disparities in who is at risk in terms of staff education and training level and the work setting. The study gathered general descriptions of each agency and compiled incidence data on workplace violence that were collected by agencies in fiscal year 2009. The key findings of this descriptive study showed high rates of workplace violence against social services providers and a pattern of risk disparity, with significantly more risk for direct care versus clinical staff. These results are based on data routinely collected by social service agencies that typically remain unexamined. A research agenda that is sensitive to potential occupational health disparities and focuses on maximizing workplace safety in social services is needed.

  5. Workplace discrimination and cancer.

    PubMed

    McKenna, Maureen A; Fabian, Ellen; Hurley, Jessica E; McMahon, Brian T; West, Steven L

    2007-01-01

    Data from the Equal Employment Opportunity Commission (EEOC) Integrated Mission System database were analyzed with specific reference to allegations of workplace discrimination filed by individuals with cancer under ADA Title One. These 6,832 allegations, filed between July 27, 1992 and September 30, 2003, were compared to 167,798 allegations from a general disability population on the following dimensions: type of workplace discrimination; demographic characteristics of the charging parties (CPs); the industry designation, location, and size of employers; and the outcome or resolution of EEOC investigations. Results showed allegations derived from CPs with cancer were more likely than those in the general disability population to include issues involving discharge, terms and conditions of employment, lay-off, wages, and demotion. Compared to the general disability group, CPs with cancer were more likely to be female, older, and White. Allegations derived from CPs with cancer were also more likely to be filed against smaller employers (15-100 workers) or those in service industries. Finally, the resolution of allegations by CPs with cancer were more likely to be meritorious than those filed from the general disability population; that is, actual discrimination is more likely to have occurred.

  6. A randomized study of the effect of anonymity, quasi-anonymity, and Certificates of Confidentiality on postpartum women's disclosure of sensitive information.

    PubMed

    Beatty, Jessica R; Chase, Sara K; Ondersma, Steven J

    2014-01-01

    Under-reporting of substance use and other sensitive information is a substantial threat to internal study validity, particularly during the perinatal period. Anonymous approaches are associated with greater disclosure but are incompatible with longitudinal follow-up. Alternative approaches include use of a U.S. Federal Certificate of Confidentiality (CoC) and quasi-anonymous methods, in which there is no link between name and data. However, the relative effect of these procedures on disclosure is unknown. This randomized study was designed to evaluate the effects of consent condition (anonymous, quasi-anonymous, CoC, and traditional confidentiality) on disclosure of sensitive information among postpartum women. Participants were 200 postpartum, primarily African-American women who were randomly assigned to one of the four consent conditions and completed a brief computer-delivered assessment of alcohol and drug use, sexual risk, intimate partner violence, and emotional distress. Participants in the anonymous and quasi-anonymous conditions disclosed significantly more sensitive information than those in the traditional consent condition. In contrast, no advantage in overall disclosure was observed for the CoC condition. This result was largely consistent across specific content areas with the exception of emotional distress, disclosure of which was unrelated to consent condition. Although use of a CoC has limited impact on disclosure, the quasi-anonymous method may increase disclosure to a similar extent as full anonymity. Quasi-anonymous approaches should be considered when under-reporting is likely, a context in which the disadvantages of this approach must be balanced against its advantages. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Evaluation of medical student attitudes toward alcoholics anonymous.

    PubMed

    Fazzio, Lydia; Galanter, Marc; Dermatis, Helen; Levounis, Petros

    2003-09-01

    This is a two-phase study on attitudes of medical students toward Alcoholics Anonymous. The first phase compares views of addiction faculty to third-year medical students on the importance of spirituality in addiction treatment. We administered a questionnaire to assess attitudes toward spiritual, biological, and psychosocial approaches to addiction treatment. The faculty viewed spirituality as relatively more important in addiction treatment than did the students. The second phase was designed to assess whether medical student attitudes toward spiritually based treatments changed over the course of a psychiatry clerkship. At the beginning of the clerkship, students rated a spiritually oriented approach as important in addiction treatment as a biological approach, whereas, at the end of the clerkship, they rated the biological approach as more important. It may be important to educate medical students about the spiritual dimensions of recovery so they can integrate this into their treatment of addiction.

  8. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  9. Watermarking medical images with anonymous patient identification to verify authenticity.

    PubMed

    Coatrieux, Gouenou; Quantin, Catherine; Montagner, Julien; Fassa, Maniane; Allaert, François-André; Roux, Christian

    2008-01-01

    When dealing with medical image management, there is a need to ensure information authenticity and dependability. Being able to verify the information belongs to the correct patient and is issued from the right source is a major concern. Verification can help to reduce the risk of errors when identifying documents in daily practice or when sending a patient's Electronic Health Record. At the same time, patient privacy issues may appear during the verification process when the verifier accesses patient data without appropriate authorization. In this paper we discuss the combination of watermarking with different identifiers ranging from DICOM standard UID to an Anonymous European Patient Identifier in order to improve medical image protection in terms of authenticity and maintainability.

  10. Participant Anonymity in the Internet Age: From Theory to Practice

    PubMed Central

    Saunders, Benjamin; Kitzinger, Jenny; Kitzinger, Celia

    2015-01-01

    Qualitative researchers attempting to protect the identities of their research participants now face a multitude of new challenges due to the wealth of information once considered private but now readily accessible online. We will draw on our research with family members of people with severe brain injury to discuss these challenges in relation to three areas: participant engagement with the mass media, the availability of court transcripts online, and participants’ use of social media. We suggest strategies for managing these challenges via disguise, refining informed consent, and discussion with interviewees. In the context of a largely theoretical literature on anonymization, this article offers concrete examples of the dilemmas we faced and will be of illustrative use to other researchers confronting similar challenges. PMID:25866484

  11. Parameterized Complexity of k-Anonymity: Hardness and Tractability

    NASA Astrophysics Data System (ADS)

    Bonizzoni, Paola; Della Vedova, Gianluca; Dondi, Riccardo; Pirola, Yuri

    The problem of publishing personal data without giving up privacy is becoming increasingly important. A precise formalization that has been recently proposed is the k-anonymity, where the rows of a table are partitioned in clusters of size at least k and all rows in a cluster become the same tuple after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is hard even when the stored values are over a binary alphabet or the table consists of a bounded number of columns. In this paper we study how the complexity of the problem is influenced by different parameters. First we show that the problem is W[1]-hard when parameterized by the value of the solution (and k). Then we exhibit a fixed-parameter algorithm when the problem is parameterized by the number of columns and the number of different values in any column.

  12. Father-daughter incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Beard, Keith W; Kuo, Shih-Ya; Swindell, Samuel V S; Kommor, Martin J

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were more likely than controls to endorse feeling damaged, psychologically injured, estranged from one or both parents, and shamed by others when they tried to open up about their experience. They had been eroticized early on by the incest experience, and it interfered with their adult sexuality. Incest victims experienced coitus earlier than controls and after reaching age 18 had more sex partners and were more likely to have casual sex outside their primary relationship and engage in sex for money than controls. They also had worse scores on scales measuring depression, sexual satisfaction, and communication about sex than controls.

  13. Talking about suicide: confidentiality and anonymity in qualitative research.

    PubMed

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  14. Evaluating alcoholics anonymous sponsor attributes using conjoint analysis.

    PubMed

    Stevens, Edward B; Jason, Leonard A

    2015-12-01

    Alcoholics Anonymous (AA) considers sponsorship an important element of the AA program, especially in early recovery. 225 adult individuals who had experience as either a sponsor, sponsee, or both, participated in a hypothetical sponsor ranking exercise where five attributes were varied across three levels. Conjoint analysis was used to compute part-worth utility of the attributes and their levels for experience, knowledge, availability, confidentiality, and goal-setting. Differences in utilities by attribute were found where confidentiality had the greatest overall possible impact on utility and sponsor knowledge had the least. These findings suggest qualitative differences in sponsors may impact their effectiveness. Future research on AA should continue to investigate sponsor influence on an individual's overall recovery trajectory.

  15. Alcoholics Anonymous and 12-step alcoholism treatment programs.

    PubMed

    Humphreys, Keith

    2003-01-01

    Alcoholics Anonymous (AA) self-help groups are the most commonly accessed component of the de facto system of care for alcohol problems in the United States. Further, AA's concepts and approach have strongly influenced a significant number of professional treatment programs. Nevertheless, only a modest number of longitudinal, comparative outcome studies on AA and on professional 12-step treatment programs have been conducted, which has limited both the certainty and scope of conclusions that can be drawn about these interventions. Research indicates that participation in Alcoholics Anonymous and in 12-step treatment are associated with significant reductions in substance abuse and psychiatric problems. Further, such interventions, it has been found, reduce health care costs over time in naturalistic, quasi-experimental, and experimental studies. Evaluation studies have also begun to illuminate the processes through which self-help groups and 12-step treatment programs exert their effects. To build on this knowledge base, future research should (1) be methodologically flexible and well-matched to its phenomenon of interest, (2) include evaluation of the unique features of self-help organizations, (3) increase representation of African-Americans and women in research samples, and (4) increase statistical power through larger sample sizes and more reliable measurement. Key content areas for future enquiry include further longitudinal evaluation of the outcomes of participation in AA and 12-step treatment (particularly in outpatient samples); better specification of the aspects of AA that influence outcome; and individual-, community-, and health organization-level controlled studies of the health care cost consequences of 12-step interventions.

  16. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    PubMed Central

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  17. Anonymity versus privacy: selective information sharing in online cancer communities.

    PubMed

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  18. New Frameworks for Detecting and Minimizing Information Leakage in Anonymized Network Data

    DTIC Science & Technology

    2011-10-01

    FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE NEW FRAMEWORKS FOR DETECTING AND MINIMIZING INFORMATION LEAKAGE IN ANONYMIZED NETWORK...FRAMEWORKS FOR DETECTING AND MINIMIZING INFORMATION LEAKAGE IN ANONYMIZED NETWORK DATA 5a. CONTRACT NUMBER FA8750-08-2-0147 5b. GRANT NUMBER N/A...risk, high-value data is that of trace anonymization - a process of sanitizing data before release so that information of concern cannot be extracted

  19. Preventing Active Timing Attacks in Low-Latency Anonymous Communication [Extended Abstract

    DTIC Science & Technology

    2010-07-01

    Preventing Active Timing Attacks in Low-Latency Anonymous Communication [Extended Abstract] Joan Feigenbaum1?, Aaron Johnson2??, and Paul Syverson3...itd.nrl.navy.mil Abstract. Low-latency anonymous communication protocols in gen- eral, and the popular onion-routing protocol in particular, are broken...inserting delays and dropping messages. We present a protocol that provides anonymity against an active adver- sary by using a black-box padding scheme

  20. Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment: Client Puzzles and Tor

    DTIC Science & Technology

    2006-03-01

    by a distributed system like Tor. The protocol must account for Tor’s threat environment and also address any secondary DDoS or anonymity attacks...Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment: Client Puzzles and Tor THESIS Nicholas A. Fraser, Captain, USAF... Anonymous Routing Environment: Client Puzzles and Tor THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate

  1. Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment

    DTIC Science & Technology

    2007-06-01

    a viable solution for mitigating distributed denial-of-service (DDoS) attacks in an anonymous routing environment. One such environment, Tor...provides anonymity for interactive Internet services. However, Tor relies on the Transport Layer Security (TLS) protocol, making it vulnerable to...the first to explore TLS DDoS attack mitigation in the Tor anonymous routing environment. Using the MPP, the central processing unit (CPU

  2. Predictors of workplace sexual health policy at sex work establishments in the Philippines.

    PubMed

    Withers, M; Dornig, K; Morisky, D E

    2007-09-01

    Based on the literature, we identified manager and establishment characteristics that we hypothesized are related to workplace policies that support HIV protective behavior. We developed a sexual health policy index consisting of 11 items as our outcome variable. We utilized both bivariate and multivariate analysis of variance. The significant variables in our bivariate analyses (establishment type, number of employees, manager age, and membership in manager association) were entered into a multivariate regression model. The model was significant (p<.01), and predicted 42) of the variability in the development and management of a workplace sexual health policy supportive of condom use. The significant predictors were number of employees and establishment type. In addition to individually-focused CSW interventions, HIV prevention programs should target managers and establishment policies. Future HIV prevention programs may need to focus on helping smaller establishments, in particular those with less employees, to build capacity and develop sexual health policy guidelines.

  3. [Workplace bullying and sickness absenteeism].

    PubMed

    Campanini, Paolo; Conway, Paul Maurice; Neri, Luca; Punzi, Silvia; Camerino, Donatella; Costa, Giovanni

    2013-01-01

    To assess the relationship between workplace bullying and sickness absenteeism in a large sample of Italian workers. A cross-sectional study conducted by means of questionnaires. In all, 8,992 subjects filled in a questionnaire to detect workplace bullying, the presence of work stress factors and days of sickness absence in the last year. Workplace bullying and psychosocial stressor were measured by the means of the CDL 2.0 questionnaire. Days of sickness absence reported by the subjects. On average, days of sickness absence were 7.4, and 7.2% of the respondents were defined as bullied. Results from logistic regression analyses showed that a workplace bullying was associated with more days of sickness absence after controlling for gender, age, professional qualification, company sector and juridical nature and other psychosocial factors (men: OR =1.62; women: OR =2.15). The present study confirms that workers exposed to a workplace bullying reported higher sickness absenteeism as compared with non-exposed subjects, also when a potentially highly stressful work environment is considered. The results of the present study support that workplace bullying may be viewed as an extreme stressful condition. Interventions to avoid workplace bullying not only favoure workers' health, but also avoid the company costs associated with workers' sickness absenteeism.

  4. Workplace Learning as a Cultural Technology.

    ERIC Educational Resources Information Center

    Solomon, Nicky

    2001-01-01

    Despite the raised status of learning in workplace culture, workplace learning may be experienced as oppressive or disempowering when it must conform to cultural norms or learner differences are made invisible. Workplace educators should understand culture as an evolving entity and challenge oppressive workplace practices. (Contains 16…

  5. Reading Work: Literacies in the New Workplace

    ERIC Educational Resources Information Center

    Belfiore, Mary Ellen; Defoe, Tracy A.; Folinsbee, Sue; Hunter, Judy; Jackson, Nancy S.; Hunter, Judith M.

    2004-01-01

    This book explores changing understandings of literacy and its place in contemporary workplace settings. It points to new questions and dilemmas to consider in planning and teaching workplace education. By taking a social perspective on literacies in the workplace, this book challenges traditional thinking about workplace literacy as functional…

  6. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis

    PubMed Central

    Kelly, John F.; Greene, M. Claire; Bergman, Brandon G.

    2014-01-01

    Aims: Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Method: Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for ‘primary drug’ patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). Results: The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Conclusion: Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. PMID:25294352

  7. Workplace bullying in nurses.

    PubMed

    Quine, L

    2001-01-01

    The article reports a study of workplace bullying in community nurses in an NHS trust. The aims were to determine the prevalence of bullying, to examine the association between bullying and occupational health outcomes, and to investigate whether support at work could moderate the effects of bullying. Forty-four percent of nurses reported experiencing one or more types of bullying in the previous 12 months, compared to 35 percent of other staff. Fifty percent of nurses had witnessed the bullying of others. Nurses who had been bullied reported significantly lower levels of job satisfaction and significantly higher levels of anxiety, depression and propensity to leave. They were also more critical of aspects of the organizational climate of the trust. Support at work was able to protect nurses from some of the damaging effects of bullying.

  8. Workplace bullying in nursing.

    PubMed

    Ovayolu, Ozlem; Ovayolu, Nimet; Karadag, Gulendam

    2014-09-01

    This research was designed to determine whether nurses are bullied by other staff members and the effects of such behaviors on the nurse victims. This study reports on nurses' interpersonal workplace relationships in a culturally unique environment. The study was conducted with 260 nurses working in three public hospitals. Data were collected using a questionnaire. The majority of nurses were female with bachelor's degrees and reported being assigned duties outside their usual responsibilities, held responsible for coworkers' mistakes, and criticized for job performance although they thought they had done their work properly. Most of the nurses who were bullied experienced health and sleep problems,did not want to go to work, and had communication problems with other staff members. Nearly all of the study nurses received psychological support to solve their problems and believed that the best way to prevent bullying was education.

  9. Predicting workplace aggression and violence.

    PubMed

    Barling, Julian; Dupré, Kathryne E; Kelloway, E Kevin

    2009-01-01

    Consistent with the relative recency of research on workplace aggression and the considerable media attention given to high-profile incidents, numerous myths about the nature of workplace aggression have emerged. In this review, we examine these myths from an evidence-based perspective, bringing greater clarity to our understanding of the predictors of workplace aggression. We conclude by pointing to the need for more research focusing on construct validity and prevention issues as well as for methodologies that minimize the likelihood of mono-method bias and that strengthen the ability to make causal inferences.

  10. Antiferromagnetic character of workplace stress

    NASA Astrophysics Data System (ADS)

    Watanabe, Jun-Ichiro; Akitomi, Tomoaki; Ara, Koji; Yano, Kazuo

    2011-07-01

    We study the nature of workplace stress from the aspect of human-human interactions. We investigated the distribution of Center for Epidemiological Studies Depression Scale scores, a measure of the degree of stress, in workplaces. We found that the degree of stress people experience when around other highly stressed people tends to be low, and vice versa. A simulation based on a model describing microlevel human-human interaction reproduced this observed phenomena and revealed that the energy state of a face-to-face communication network correlates with workplace stress macroscopically.

  11. Antiferromagnetic character of workplace stress.

    PubMed

    Watanabe, Jun-ichiro; Akitomi, Tomoaki; Ara, Koji; Yano, Kazuo

    2011-07-01

    We study the nature of workplace stress from the aspect of human-human interactions. We investigated the distribution of Center for Epidemiological Studies Depression Scale scores, a measure of the degree of stress, in workplaces. We found that the degree of stress people experience when around other highly stressed people tends to be low, and vice versa. A simulation based on a model describing microlevel human-human interaction reproduced this observed phenomena and revealed that the energy state of a face-to-face communication network correlates with workplace stress macroscopically.

  12. Workplace bullying: the effectiveness of a workplace program.

    PubMed

    Stagg, Sharon J; Sheridan, Daniel J; Jones, Ruth A; Speroni, Karen Gabel

    2013-08-01

    Workplace bullying can not only cost thousands of dollars to replace an affected nurse, but also have detrimental economic effects on health care organizations. Occupational health nurses can provide leadership in preventing or eliminating workplace bullying. This pilot study determined that attendance at a cognitive rehearsal program decreased workplace bullying. The study used an Internet-based survey administered 6 months after nurses completed the 2-hour cognitive rehearsal program. Half of the nurses reported witnessing bullying behaviors since attending the program; 70% of the nurses reported changing their own behaviors following the course; and 40% of the nurses reported a decrease in bullying behaviors during the past 6 months. Although 70% of the nurses believed they could intervene in bullying situations, only 16% reported they responded to bullying at the time of occurrence. This study illuminates the need to continue searching for other effective methods to prevent and manage workplace bullying. Copyright 2013, SLACK Incorporated.

  13. Challenges of educational and cultural diversity in the workplace.

    PubMed

    Hyde, S; White, S

    1993-01-01

    In South Africa, the estimate of HIV-infected population was 300,000 in September 1993, with 500 new infections occurring daily, mostly in poor neighborhoods with illiteracy rates of 25-50%. The AIDS Education and Training (AET) targeted low-literate groups by developing an educational package for the workplace. The methodology included repetition of key messages, stories from their own culture with pictures, interaction in groups, and visual aids to retain information. The content involved biomedical aspects of HIV/AIDS, testing and counseling, safe sex, traditional healers, the needs of the infected, and workplace/community issues. The pictures depicted men and women of all racial varieties to drive home the message that the infection can infect everybody. 31 colorful laminated posters were developed for the AIDS flip chart kit, and over 100 flip chart sessions were conducted at workplaces. An evaluation of the flip chart sessions queried 143 English- and 897 Tswana-speaking people at one company. 58% of respondents considered condom use and reducing the number of partners the most important message. 28% deemed biomedical facts and latency of the infection important, 25% the deadly nature of the disease, and 15% the modes of transmission. 44% desired to learn about prevention and 30% appreciated the interactive method of learning. All participants sought more information on STDs, where to get an HIV test, and how to have safer sex. AET provides assistance to clients to become educators themselves by means of policy development, refresher courses for educators, and action planning (condom distribution, STD control, referral for testing, and follow-up). The flip chart is also used for other health and lifestyle education regarding family planning, tuberculosis, sexuality, and communication skills aimed at company managers, union officials, and supervisors.

  14. [Efficiency of an alcohol addiction prevention program at the workplace: results of an empirical study].

    PubMed

    Ennenbach, M; Gass, B; Reinecker, H; Soyka, M

    2009-03-01

    Following an anonymous survey on health und substance use problems in 2004, a prevention program for workers at a Bavarian rehabilitation clinic was initiated. Its efficiency was evaluated by a follow-up study in 2007. The initial analysis had indicated a high rate of substance abuse. Young female employees had been identified as one of the risk groups for alcohol consumption and professional discontent. Based on these findings, a special prevention program was established. The follow-up study revealed some improvements with respect to health und substance abuse, including a significant reduction in average alcohol consumption. These findings indicate that prevention programs at the workplace are both possible and effective.

  15. University students and HIV in Namibia: an HIV prevalence survey and a knowledge and attitude survey

    PubMed Central

    2012-01-01

    Background With an overall adult HIV prevalence of 15.3%, Namibia is facing one of the largest HIV epidemics in Africa. Young people aged 20 to 34 years constitute one of the groups at highest risk of HIV infection in Namibia. However, little is known about the impact of HIV on this group and its access to healthcare. The purpose of this study was to estimate HIV prevalence, to assess the knowledge of and attitudes towards HIV/AIDS, and to assess access to healthcare among university students in Namibia. Methods We assessed HIV/AIDS knowledge and attitudes, HIV prevalence and access to healthcare among students at the Polytechnic of Namibia and the University of Namibia. HIV prevalence was tested through anonymous oral fluid-based tests. Results Half (n = 2790/5568) of the university students and 45% (n = 2807/6302) of the Polytechnic students participated in the knowledge and attitudes surveys. HIV/AIDS knowledge was reasonable, except for misperceptions about transmission. Awareness of one's own HIV status and risks was low. In all, 55% (n = 3055/5568) of university students and 58% (n = 3680/6302) of Polytechnic students participated in the HIV prevalence survey; 54 (1.8%) university students and 103 (2.8%) Polytechnic students tested HIV positive. Campus clinics were not the major providers of healthcare to the students. Conclusions Meaningful strategies addressing the gap between knowledge, attitude and young people's perception of risk of HIV acquisition should be implemented. HIV prevalence among Namibian university students appears relatively low. Voluntary counselling and testing should be stimulated. Efforts should be made to increase access to healthcare through the campus clinics. PMID:22353579

  16. University students and HIV in Namibia: an HIV prevalence survey and a knowledge and attitude survey.

    PubMed

    de Beer, Ingrid H; Gelderblom, Huub C; Schellekens, Onno; Gaeb, Esegiel; van Rooy, Gert; McNally, Alta; Wit, Ferdinand W; Tobias, Rinke de Wit F

    2012-02-22

    With an overall adult HIV prevalence of 15.3%, Namibia is facing one of the largest HIV epidemics in Africa. Young people aged 20 to 34 years constitute one of the groups at highest risk of HIV infection in Namibia. However, little is known about the impact of HIV on this group and its access to healthcare. The purpose of this study was to estimate HIV prevalence, to assess the knowledge of and attitudes towards HIV/AIDS, and to assess access to healthcare among university students in Namibia. We assessed HIV/AIDS knowledge and attitudes, HIV prevalence and access to healthcare among students at the Polytechnic of Namibia and the University of Namibia. HIV prevalence was tested through anonymous oral fluid-based tests. Half (n = 2790/5568) of the university students and 45% (n = 2807/6302) of the Polytechnic students participated in the knowledge and attitudes surveys. HIV/AIDS knowledge was reasonable, except for misperceptions about transmission. Awareness of one's own HIV status and risks was low. In all, 55% (n = 3055/5568) of university students and 58% (n = 3680/6302) of Polytechnic students participated in the HIV prevalence survey; 54 (1.8%) university students and 103 (2.8%) Polytechnic students tested HIV positive. Campus clinics were not the major providers of healthcare to the students. Meaningful strategies addressing the gap between knowledge, attitude and young people's perception of risk of HIV acquisition should be implemented. HIV prevalence among Namibian university students appears relatively low. Voluntary counselling and testing should be stimulated. Efforts should be made to increase access to healthcare through the campus clinics.

  17. Workplace bullying in the NHS.

    PubMed

    Randle, Jacqueline

    2011-11-01

    Bullying is a sensitive issue which is no longer confined to the school playground; adults are increasingly aware that workplace bullying is on the rise. Healthcare workers as well as patients are affected by bullying which can result in anxiety, dismay and powerlessness. The impact of workplace bullying on patient care is identified in this article as this is an under-researched area. The influence of the environment on workplace bullying is also considered. The NHS, like any other organisation, is characterised by circumstances that make bullying and harassment likely. Healthcare workers can minimise these and strategies are offered in this paper to make the workplace environment more positive from both an individual and an organisational perspective.

  18. Growing Concerns With Workplace Incivility.

    PubMed

    Collins, Natasha Renee; Rogers, Bonnie

    2017-07-01

    Workplace incivility (WPI) is a growing issue across all public and private sectors. Occupational and environmental health nurses can educate employees and management about WPI, its risk factors and characteristics, and ways to reduce incidents of WPI.

  19. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    ERIC Educational Resources Information Center

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  20. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    ERIC Educational Resources Information Center

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  1. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    ERIC Educational Resources Information Center

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  2. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    ERIC Educational Resources Information Center

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  3. Survey Confidentiality vs. Anonymity: Young Men's Self-Reported Substance Use.

    ERIC Educational Resources Information Center

    Moore, Roland S.; Ames, Genevieve M.

    2002-01-01

    Experiment was conducted to see if respondents providing identification would be as forthcoming regarding substance use as anonymous respondents. No statistically significant differences were found between 2 groups' self-reported substance use over the previous 12 months. Findings suggest the lack of anonymity does not necessarily impede the same…

  4. A Psychological Rationale in Support of the Alcoholics Anonymous' Concept of Fellowship.

    ERIC Educational Resources Information Center

    Machell, David F.

    This article creates a strong theoretical rationale in support of the concept of fellowship, the cornerstone healing influence of Alcoholic Anonymous (AA). It reviews the literature which supports the Alcoholic Anonymous' concept of fellowship or client perceived belongingness. It provides a strong rationale for the establishment of new…

  5. Comparison of Anonymous versus Confidential Survey Procedures: Effects on Health Indicators in Dutch Adolescents

    ERIC Educational Resources Information Center

    van de Looij-Jansen, Petra M.; Goldschmeding, Judith E. J.; de Wilde, Erik Jan

    2006-01-01

    Self-report questionnaires are frequently used in youth research, but doubt remains whether total anonymity affects the results. This study compared the responses of 704 mainly 16-17-year-old adolescents to self-report measures of various health indicators in 2 groups: anonymous and confidential collection. For most health indicators no…

  6. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    ERIC Educational Resources Information Center

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  7. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    PubMed

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  8. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    ERIC Educational Resources Information Center

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  9. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    ERIC Educational Resources Information Center

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  10. Oral History Research Ethics: Should Anonymity and Confidentially Issues Be Dealt with on Their Own Merit?

    ERIC Educational Resources Information Center

    Le Roux, C.

    2015-01-01

    A primary principle of ethical codes in research involving people is that of informed consent which ensures participants' right to privacy, confidentiality and anonymity. A blanket application of the principle of anonymity to Oral History (OH) research could well be counterproductive to the purported aims of OH research. The research comprised a…

  11. Oral History Research Ethics: Should Anonymity and Confidentially Issues Be Dealt with on Their Own Merit?

    ERIC Educational Resources Information Center

    Le Roux, C.

    2015-01-01

    A primary principle of ethical codes in research involving people is that of informed consent which ensures participants' right to privacy, confidentiality and anonymity. A blanket application of the principle of anonymity to Oral History (OH) research could well be counterproductive to the purported aims of OH research. The research comprised a…

  12. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    ERIC Educational Resources Information Center

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  13. Stress within the academic workplace.

    PubMed

    Kenner, Carole A; Pressler, Jana L

    2014-01-01

    Many new nursing leaders assuming deanships, assistant deanships, or interim deanships have limited education, experience, or background to prepare them to deal with workplace stress. To assist new deans and those aspiring to be deans, the authors of this department offer survival tips based on their personal experiences and insights. They address common issues such as time management, handling workplace bullying, and negotiating deadlines and assignments. The authors welcome counterpoint discussions with readers.

  14. LGBT Workplace Climate in Astronomy

    NASA Astrophysics Data System (ADS)

    Gaudi, B. S.; Danner, R.; Dixon, W. V.; Henderson, C. B.; Kay, L. E.

    2013-01-01

    The AAS Working Group on LGBTIQ Equality (WGLE) held a town hall meeting at the 220th AAS meeting in Anchorage to explore the workplace climate for LGBTIQ individuals working in Astronomy and related fields. Topics of discussion included anti-discrimination practices, general workplace climate, and pay and benefit policies. Four employment sectors were represented: industry, the federal government, private colleges, and public universities. We will summarize and expand on the town hall discussions and findings of the panel members.

  15. Workplace violence in nursing today.

    PubMed

    Araujo, Susan; Sofield, Laura

    2011-12-01

    Workplace violence is not a new phenomenon and is often sensationalized by the media when an incident occurs. Verbal abuse is a form of workplace violence that leaves no scars. However, for nurses, the emotional damage to the individual can affect productivity, increase medication errors, incur absenteeism, and decrease morale and overall satisfaction within the nursing profession. This results in staffing turnover and creates a hostile work environment that affects the culture within the organization.

  16. Visual ergonomics in the workplace.

    PubMed

    Anshel, Jeffrey R

    2007-10-01

    This article provides information about visual function and its role in workplace productivity. By understanding the connection among comfort, health, and productivity and knowing the many options for effective ergonomic workplace lighting, the occupational health nurse can be sensitive to potential visual stress that can affect all areas of performance. Computer vision syndrome-the eye and vision problems associated with near work experienced during or related to computer use-is defined and solutions to it are discussed.

  17. HIV Prevention

    MedlinePlus

    ... Abroad Treatment Basic Statistics Get Tested Find an HIV testing site near you. Enter ZIP code or city Follow HIV/AIDS CDC HIV CDC HIV/AIDS See RSS | ... Collapse All Is abstinence the only 100% effective HIV prevention option? Yes. Abstinence means not having oral, ...

  18. Workplace homicides of Texas males.

    PubMed

    Davis, H

    1987-10-01

    A review of Texas death certificates for 1975-84 identified 779 civilian males whose deaths were homicides that occurred in the workplace. Injuries from firearms caused 81 per cent of the deaths. The overall rate of workplace homicide was 2.1/100,000 male workers/year. Males employed in taxicab service had the highest rate of workplace homicide. 78.2/100,000 male workers/year. Males employed in certain retail trade industries, law enforcement, and the private-security industry also had high rates of workplace homicide. Male workers greater than or equal to 65 years old were at especially high risk, with a workplace-homicide rate 3.5 times that of younger workers. A review of medical examiners' records in five urban counties indicated that 32 per cent of victims who had worked in eating-and-drinking places and 5 per cent of other workers had blood or cerebrospinal-fluid alcohol levels greater than or equal to 0.10 g/dl. These results provide a base for designing effective strategies to prevent workplace homicides.

  19. Developing a workplace resilience instrument.

    PubMed

    Mallak, Larry A; Yildiz, Mustafa

    2016-05-27

    Resilience benefits from the use of protective factors, as opposed to risk factors, which are associated with vulnerability. Considerable research and instrument development has been conducted in clinical settings for patients. The need existed for an instrument to be developed in a workplace setting to measure resilience of employees. This study developed and tested a resilience instrument for employees in the workplace. The research instrument was distributed to executives and nurses working in the United States in hospital settings. Five-hundred-forty completed and usable responses were obtained. The instrument contained an inventory of workplace resilience, a job stress questionnaire, and relevant demographics. The resilience items were written based on previous work by the lead author and inspired by Weick's [1] sense-making theory. A four-factor model yielded an instrument having psychometric properties showing good model fit. Twenty items were retained for the resulting Workplace Resilience Instrument (WRI). Parallel analysis was conducted with successive iterations of exploratory and confirmatory factor analyses. Respondents were classified based on their employment with either a rural or an urban hospital. Executives had significantly higher WRI scores than nurses, controlling for gender. WRI scores were positively and significantly correlated with years of experience and the Brief Job Stress Questionnaire. An instrument to measure individual resilience in the workplace (WRI) was developed. The WRI's four factors identify dimensions of workplace resilience for use in subsequent investigations: Active Problem-Solving, Team Efficacy, Confident Sense-Making, and Bricolage.

  20. Automated Gene Ontology annotation for anonymous sequence data.

    PubMed

    Hennig, Steffen; Groth, Detlef; Lehrach, Hans

    2003-07-01

    Gene Ontology (GO) is the most widely accepted attempt to construct a unified and structured vocabulary for the description of genes and their products in any organism. Annotation by GO terms is performed in most of the current genome projects, which besides generality has the advantage of being very convenient for computer based classification methods. However, direct use of GO in small sequencing projects is not easy, especially for species not commonly represented in public databases. We present a software package (GOblet), which performs annotation based on GO terms for anonymous cDNA or protein sequences. It uses the species independent GO structure and vocabulary together with a series of protein databases collected from various sites, to perform a detailed GO annotation by sequence similarity searches. The sensitivity and the reference protein sets can be selected by the user. GOblet runs automatically and is available as a public service on our web server. The paper also addresses the reliability of automated GO annotations by using a reference set of more than 6000 human proteins. The GOblet server is accessible at http://goblet.molgen.mpg.de.

  1. A proposal for an anonymous living organ donation in Germany.

    PubMed

    Rittner, Christian K; Besold, Andrea; Wandel, Evelyn

    2003-03-01

    In Germany, living organ donation of paired and usually not regenerating organs is restricted by law to related individuals, as well as persons who 'obviously entertain an especially intimate personal relationship'. When this law was adopted in 1997, the intention of the legislator was to guarantee the free will of the donor and to exclude any trade of organs. Since then the transplantation of cadaveric organs has not increased. Additional organs were donated from living donors. However, for a number of reasons only a limited array of transplantation centers use living organ donation as a supply facing a steadily increasing number of patients with chronic renal failure. Living organ donation raises a variety of medical, ethical and legal questions. Although transplantation is a generally accepted therapeutic approach for impaired organ function, doctors do not promote it actively. Prospective donor-recipient pairs use the information obtained via internet and other sources before they contact the clinician. Doctors are hesitant to operate a healthy individual for allowing her or him to profit from this organ loss only emotionally or in an altruistic sense. Often a complex relationship between donor and recipient, as well as tissue incompatibility (ABO, HLA) may be additional reasons to restrain from carrying out living organ transplantation. To improve the chances for good organ function and better life quality of the patients we here propose a model for anonymous living organ donation with special reference to kidney transplantation.

  2. Anonymous semen donor recruitment without reimbursement in Canada.

    PubMed

    Del Valle, Alfonso P; Bradley, Leanne; Said, Tamer

    2008-01-01

    A previous review of 22 studies from eight countries, conducted between 1980 and 2003, concluded that semen donors who are older, married or are fathers are less likely to be financially motivated. Despite the Assisted Human Reproduction Act coming into force in 2004, no data originating from Canada have been published on this topic. The objective of this study was to validate these findings in the Canadian population within the context of an anonymous semen donor programme in Canada. A survey of 301 donor applicants was conducted to collect demographic data including age, marital status, paternity status and occupation, in addition to information assessing donor eligibility and willingness to donate without reimbursement. Eligible candidates were screened to determine their acceptance or exclusion from the semen donor programme. The results showed that the relationships found between donor applicant demographics and their willingness to participate without reimbursement do not appear to be consistent with earlier published studies in various countries. Further screening resulted in a recruitment rate of less than 1%. Additional studies will be required to investigate the feasibility of altruistic semen donation programmes in Canada, and to determine the potential impact of these findings on Canadians who rely on donor gamete services to build their families.

  3. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    PubMed

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  4. iDASH: integrating data for analysis, anonymization, and sharing

    PubMed Central

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  5. iDASH: integrating data for analysis, anonymization, and sharing.

    PubMed

    Ohno-Machado, Lucila; Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2012-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses.

  6. Sister-sister incest: data from an anonymous computerized survey.

    PubMed

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  7. Homophily in an Anonymous Online Community: Sociodemographic Versus Personality Traits.

    PubMed

    Kang, Jeong-Han; Chung, Da Young

    2017-06-01

    In what traits do people interact with others who are similar to them in completely anonymous online communication? Can those traits contribute to greater exchange of opinion and information across the sociodemographic boundaries that often limit interaction between social strata? To answer this question concerning online homophily, we combined survey data on 7,287 users (aged 18 and above) of a Korean online dating advice platform with their behavioral data from June 2015 to August 2015 and explored whether advice exchange occurred between users with similar sociodemographic and personality traits. On this platform, two types of interactions occurred as follows: (1) responses to a randomly distributed problem submitted by an advice seeker and (2) the seeker's indication of approval of any of the responses given. The study found that (1) a receiver was more likely to respond to problems submitted by seekers of a comparable age and that (2) seekers were more likely to approve of a response if the seeker and receiver had similar educational backgrounds. By contrast, homophily based on personality traits was not observed even though some personality traits significantly affected the likelihood of both response and approval. Our findings suggest that online communication may breed sociodemographic homophily, whether based on age or education, more than expected or intended while not easily fostering alternative forms of homophily, such as personality homophily, which can potentially cut across borders dividing sociodemographic groups.

  8. Maxwell and creation: Acceptance, criticism, and his anonymous publication

    NASA Astrophysics Data System (ADS)

    Marston, Philip L.

    2007-08-01

    Although James Clerk Maxwell's religious views and discussions on atoms having the properties of ``manufactured articles'' have been discussed, some aspects of the responses by his contemporaries to his remarks on creation have been neglected. Various responses quoted here include a book from 1878 by ``Physicus'' (George John Romanes) attributing ``arrogance'' to Maxwell for his inferences. Relevant aspects of the evolution of the perspective of Romanes are noted. A response by B. F. Westcott indicated that Maxwell was the author of a related anonymous publication concerned with what eventually became known as the heat death of the universe. In his teaching to theology students, Westcott, a friend of Maxwell, emphasized Maxwell's reasoning based on the dissipation of energy. There are similarities between Maxwell's perspective on creation and Biblical commentaries by fellow Eranus Club members Westcott and J. B. Lightfoot. Interest in Maxwell's remarks extended into the twentieth century. The principal Baptist chapel attended by Maxwell and his wife when in London in the 1860s is identified and some relevant attributes of the chapel and of its pastor are described.

  9. Social Network Variables in Alcoholics Anonymous: A Literature Review

    PubMed Central

    Groh, D.R.; Jason, L.A.; Keys, C.B.

    2008-01-01

    Alcoholics Anonymous (AA) is the most commonly used program for substance abuse recovery and one of the few models to demonstrate positive abstinence outcomes. Although little is known regarding the underlying mechanisms that make this program effective, one frequently cited aspect is social support. In order to gain insight into the processes at work in AA, this paper reviewed 24 papers examining the relationship between AA and social network variables. Various types of social support were included in the review such as structural support, functional support, general support, alcohol-specific support, and recovery helping. Overall, this review found that AA involvement is related to a variety of positive qualitative and quantitative changes in social support networks. Although AA had the greatest impact on friend networks, it had less influence on networks consisting of family members or others. In addition, support from others in AA was found to be of great value to recovery, and individuals with harmful social networks supportive of drinking actually benefited the most from AA involvement. Furthermore, social support variables consistently mediated AA’s impact on abstinence, suggesting that social support is a mechanism in the effectiveness of AA in promoting a sober lifestyle. Recommendations are made for future research and clinical practice. PMID:17719158

  10. Statistical disclosure limitation of health data based on Pk-anonymity.

    PubMed

    Kimura, Eizen; Chida, Koji; Ikarashi, Dai; Hamada, Koki; Ishihara, Ken

    2012-01-01

    The Act for the Protection of Personal Information in Japan considers as personal information any quasi-identifier that may be used to obtain information that identifies individuals through comparisons with datasets. Studies using health records are not widely conducted because of the concern regarding the safety of anonymized health records. To increase the safety of such records, we used the Pk-anonymity method. In this method, attributes are probabilistically randomized and then reconstructions are performed on the basis of statistical information from perturbed data. Hence, it is expected to provide more precise statistics and more reliably preserve privacy than the traditional "k-anonymity" method. We anonymized health records, performed cross tabulation, and assessed the error rate using original data. This study shows that the Pk-anonymity method can be used to perform safety statistical disclosures with low error rates, even in small cases.

  11. Attribute Utility Motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers.

    PubMed

    Ye, Huimin; Chen, Elizabeth S

    2011-01-01

    In order to support the increasing need to share electronic health data for research purposes, various methods have been proposed for privacy preservation including k-anonymity. Many k-anonymity models provide the same level of anoymization regardless of practical need, which may decrease the utility of the dataset for a particular research study. In this study, we explore extensions to the k-anonymity algorithm that aim to satisfy the heterogeneous needs of different researchers while preserving privacy as well as utility of the dataset. The proposed algorithm, Attribute Utility Motivated k-anonymization (AUM), involves analyzing the characteristics of attributes and utilizing them to minimize information loss during the anonymization process. Through comparison with two existing algorithms, Mondrian and Incognito, preliminary results indicate that AUM may preserve more information from original datasets thus providing higher quality results with lower distortion.

  12. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    PubMed

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity.

  13. Changing families, changing workplaces.

    PubMed

    Bianchi, Suzanne M

    2011-01-01

    American families and workplaces have both changed dramatically over the past half-century. Paid work by women has increased sharply, as has family instability. Education-related inequality in work hours and income has grown. These changes, says Suzanne Bianchi, pose differing work-life issues for parents at different points along the income distribution. Between 1975 and 2009, the labor force rate of mothers with children under age eighteen increased from 47.4 percent to 71.6 percent. Mothers today also return to work much sooner after the birth of a child than did mothers half a century ago. High divorce rates and a sharp rise in the share of births to unmarried mothers mean that more children are being raised by a single parent, usually their mother. Workplaces too have changed, observes Bianchi. Today's employees increasingly work nonstandard hours. The well-being of highly skilled workers and less-skilled workers has been diverging. For the former, work hours may be long, but income has soared. For lower-skill workers, the lack of "good jobs" disconnects fathers from family obligations. Men who cannot find work or have low earnings potential are much less likely to marry. For low-income women, many of whom are single parents, the work-family dilemma is how to care adequately for children and work enough hours to support them financially. Jobs for working-class and lower middle-class workers are relatively stable, except in economic downturns, but pay is low, and both parents must work full time to make ends meet. Family income is too high to qualify for government subsidized child care, but too low to afford high-quality care in the private market. These families struggle to have a reasonable family life and provide for their family's economic well-being. Bianchi concludes that the "work and family" problem has no one solution because it is not one problem. Some workers need more work and more money. Some need to take time off around the birth of a child

  14. Surveillance of recent HIV infections among newly diagnosed HIV cases in Germany between 2008 and 2014.

    PubMed

    Hofmann, Alexandra; Hauser, Andrea; Zimmermann, Ruth; Santos-Hövener, Claudia; Bätzing-Feigenbaum, Jörg; Wildner, Stephan; Kücherer, Claudia; Bannert, Norbert; Hamouda, Osamah; Bremer, Viviane; Bartmeyer, Barbara

    2017-07-11

    The HIV surveillance system in Germany is based on mandatory, anonymous notification of newly diagnosed HIV cases by laboratories. Because the time between HIV infection and the diagnosis of HIV varies widely between persons, it is difficult to determine the number of cases of recent HIV infection among newly diagnosed cases of HIV. In Germany, the BED-capture-enzyme immunoassay (BED-CEIA) has been used to distinguish between recent and long-standing HIV infection. The aim of this analysis is to report the proportion of cases of recent HIV infection among newly diagnosed cases in Germany between 2008 and 2014 and to identify factors associated with recent infections. A sample of voluntary laboratories among all HIV diagnostic laboratories was recruited. Residual blood from HIV diagnostic tests was spotted on filter paper as dried serum or dried plasma spots and was sent along with the notification form of the HIV cases. The BED-CEIA test was performed. A case was defined as recent HIV infection with a BED-CEIA test result of less than 0.8 normalized optical density, with the exclusion of CDC stage C. The proportion of recent newly diagnosed HIV infections among different groups (such as transmission groups, gender or age groups) was calculated. We used logistic regression to identify factors associated with recent HIV infection and to identify subpopulations with high proportions of recent HIV infections. Approximately 10,257 newly diagnosed cases were tested for recency using the BED-CEIA. In total, 3084 (30.4%) of those were recently infected with HIV. The highest proportion of recent HIV infections was found among men who had sex with men (MSM) (35%) and persons between 18 and 25 years of age (43.0%). Logistic regression revealed that female German intravenous drug users with a recent HIV infection had a higher chance of being detected than German MSM (OR 2.27). Surveillance of recent HIV infection is a useful additional tool to monitor the HIV epidemic in

  15. A quantitative study of Michigan's criminal HIV exposure law.

    PubMed

    Galletly, Carol L; Pinkerton, Steven D; DiFranceisco, Wayne

    2012-01-01

    The objectives of the project were (1) to determine the extent to which HIV-positive persons living in Michigan were aware of and understood Michigan's criminal HIV exposure law, (2) to examine whether awareness of the law was associated with seropositive status disclosure to prospective sex partners, and, (3) to examine whether awareness of the law was associated with potential negative effects of the law on persons living with HIV (PLWH) including heightened HIV-related stigma, perceived societal hostility toward PLWH, and perceived need to conceal one's HIV infection. The study design was cross-sectional. A statewide sample of 384 PLWH in Michigan completed anonymous pen and paper surveys in 1 of 25 data collection sessions. A majority of participants were aware of Michigan's HIV exposure law. Awareness of the law was not associated with increased seropositive status disclosure to all prospective sex partners, decreased HIV transmission risk behavior, or increased perceived responsibility for HIV transmission prevention. However, awareness of the law was significantly associated with disclosure to a greater proportion of sex partners prior to respondents' first sexual interaction with that partner. Awareness of the law was not associated with increased HIV-related stigma, perceived societal hostility toward PLWH, or decreased comfort with seropositive status disclosure. Evidence of an effect of Michigan's HIV exposure law on seropositive status disclosure was mixed. Further research is needed to examine the various forms of HIV exposure laws among diverse groups of persons living with or at increased risk of acquiring HIV.

  16. A Quantitative Study of Michigan's Criminal HIV Exposure Law

    PubMed Central

    Galletly, Carol L.; Pinkerton, Steven D.; DiFranceisco, Wayne

    2011-01-01

    The objectives of the project were 1) to determine the extent to which HIV-positive persons living in Michigan were aware of and understood Michigan's criminal HIV exposure law, 2) to examine whether awareness of the law was associated with seropositive status disclosure to prospective sex partners, and, 3) to examine whether awareness of the law was associated with potential negative effects of the law on persons living with HIV (PLWH) including heightened HIV-related stigma, perceived societal hostility toward PLWH, and perceived need to conceal one's HIV infection. The study design was cross-sectional. A statewide sample of 384 PLWH in Michigan completed anonymous pen and paper surveys in 1 of 25 data collection sessions. A majority of participants were aware of Michigan's HIV exposure law. Awareness of the law was not associated with increased seropositive status disclosure to all prospective sex partners, decreased HIV transmission risk behavior, or increased perceived responsibility for HIV transmission prevention. However, awareness of the law was significantly associated with disclosure to a greater proportion of sex partners prior to respondents’ first sexual interaction with that partner. Awareness of the law was not associated with increased HIV-related stigma, perceived societal hostility toward PLWH, or decreased comfort with seropositive status disclosure. Evidence of an effect of Michigan's HIV exposure law on seropositive status disclosure was mixed. Further research is needed to examine the various forms of HIV exposure laws among diverse groups of persons living with or at increased risk of acquiring HIV. PMID:21861631

  17. Racial/Ethnic Workplace Discrimination

    PubMed Central

    Chavez, Laura J.; Ornelas, India J.; Lyles, Courtney R.; Williams, Emily C.

    2014-01-01

    Background Experiences of discrimination are associated with tobacco and alcohol use, and work is a common setting where individuals experience racial/ethnic discrimination. Few studies have evaluated the association between workplace discrimination and these behaviors, and none have described associations across race/ethnicity. Purpose To examine the association between workplace discrimination and tobacco and alcohol use in a large, multistate sample of U.S. adult respondents to the Behavioral Risk Factor Surveillance System survey Reactions to Race Module (2004–2010). Methods Multivariable logistic regression analyses evaluated cross-sectional associations between self-reported workplace discrimination and tobacco (current and daily smoking) and alcohol use (any and heavy use, and binge drinking) among all participants and stratified by race/ethnicity, adjusting for relevant covariates. Data were analyzed in 2013. Results Among respondents, 70,080 completed the workplace discrimination measure. Discrimination was more common among black non-Hispanic (21%), Hispanic (12%), and other race respondents (11%) than white non-Hispanics (4%) (p<0.001). In the total sample, discrimination was associated with current smoking (risk ratio [RR]=1.32, 95% CI=1.19, 1.47), daily smoking (RR=1.41, 95% CI=1.24, 1.61), and heavy drinking (RR=1.11, 95% CI=1.01, 1.22), but not binge or any drinking. Among Hispanics, workplace discrimination was associated with increased heavy and binge drinking, but not any alcohol use or smoking. Workplace discrimination among black non-Hispanics and white Non-Hispanics was associated with increased current and daily smoking, but not alcohol outcomes. Conclusions Workplace discrimination is common, associated with smoking and alcohol use, and merits further policy attention given the impact of these behaviors on morbidity and mortality. PMID:25441232

  18. Mobile technology use and desired technology-based intervention characteristics among HIV+ Black men who have sex with men.

    PubMed

    Senn, Theresa E; Braksmajer, Amy; Coury-Doniger, Patricia; Urban, Marguerite A; Carey, Michael P

    2017-04-01

    HIV positive Black men who have sex with men (MSM) are retained in HIV medical care at suboptimal rates. Interventions targeted to Black MSM are needed to help to improve their retention in care. The purposes of this study were to investigate the use of mobile technology among HIV+ Black MSM and to explore participants' thoughts about the use of mobile technology for HIV retention in care interventions. Twenty-two HIV+ Black MSM completed a technology use survey and participated in a qualitative interview regarding technology-based interventions. The majority of participants (95%) had access to a cell phone, and used their phones frequently (median 3 hours/day). Men preferred interventions that would allow for anonymous participation and that would provide individually tailored support. Mobile technology is a promising approach to intervention delivery for both younger and older HIV+ Black MSM. These interventions should incorporate features that are desirable to men (i.e., anonymous participation and individual tailoring).

  19. Development and Validation of the Alcoholics Anonymous Intention Measure * (AAIM)

    PubMed Central

    Zemore, Sarah E.; Kaskutas, Lee Ann

    2009-01-01

    Background Drop-out from 12-step groups is notoriously high, yet the field lacks strong models and scales for addressing this problem. We aim to determine whether the theory of planned behavior (TPB) can be applied to 12-step involvement, and to develop and validate a scale of 12-step readiness based on that theory: the Alcoholics Anonymous Intention Measure (AAIM). Method Data were from a longitudinal trial of a manual-guided 12-step facilitation intervention called Making AA Easier (MAAEZ) involving 2 treatment programs in California (N=508). Participants completed surveys at baseline, 7 weeks, 6 months, and 12 months. Surveys included the preliminary AAIM, a 12-step involvement measure, other readiness measures, and substance use outcomes. Results The final, 17-item AAIM measured attitudes (5-item α's=.75-.83), subjective norms (4-item α's=.56-.81), perceived control (5 item α's=.78-.85), and intentions (3-item α's=.80-.95) regarding attendance at 12-step groups. Components were correlated with each other and other readiness measures as expected, supporting the AAIM's validity. Scale components predicted 31% of the variance in Intention to attend 12-step groups at 6 months and 41% of the variance in 12-step involvement at 12 months. Social factors were among the strongest predictors of 12-step involvement. Results did not support the expectancy-value formulation of the TPB, as unweighted (vs. weighted) belief items performed optimally. Conclusions Results generally support the TPB as a model of 12-step involvement and suggest specific targets for 12-step facilitation interventions within attitude, norm, and control components. Findings also support the AAIM as a tool for identifying drop-out risks and tailoring individual interventions. PMID:19581057

  20. Feedback to Supervisors: Is Anonymity Really So Important?

    PubMed

    Dudek, Nancy L; Dojeiji, Suzan; Day, Kathleen; Varpio, Lara

    2016-09-01

    Research demonstrates that physicians benefit from regular feedback on their clinical supervision from their trainees. Several features of effective feedback are enabled by nonanonymous processes (i.e., open feedback). However, most resident-to-faculty feedback processes are anonymous given concerns of power differentials and possible reprisals. This exploratory study investigated resident experiences of giving faculty open feedback, advantages, and disadvantages. Between January and August 2014, nine graduates of a Canadian Physiatry residency program that uses open resident-to-faculty feedback participated in semistructured interviews in which they described their experiences of this system. Three members of the research team analyzed transcripts for emergent themes using conventional content analysis. In June 2014, semistructured group interviews were held with six residents who were actively enrolled in the program as a member-checking activity. Themes were refined on the basis of these data. Advantages of the open feedback system included giving timely feedback that was acted upon (thus enhancing residents' educational experiences), and improved ability to receive feedback (thanks to observing modeled behavior). Although some disadvantages were noted, they were often speculative (e.g., "I think others might have felt …") and were described as outweighed by advantages. Participants emphasized the program's "feedback culture" as an open feedback enabler. The relationship between the feedback giver and recipient has been described as influencing the uptake of feedback. Findings suggest that nonanonymous practices can enable a positive relationship in resident-to-faculty feedback. The benefits of an open system for resident-to-faculty feedback can be reaped if a "feedback culture" exists.

  1. Seeking insights about cycling mood disorders via anonymized search logs.

    PubMed

    Yom-Tov, Elad; White, Ryen W; Horvitz, Eric

    2014-02-25

    Mood disorders affect a significant portion of the general population. Cycling mood disorders are characterized by intermittent episodes (or events) of the disease. Using anonymized Web search logs, we identify a population of people with significant interest in mood stabilizing drugs (MSD) and seek evidence of mood swings in this population. We extracted queries to the Microsoft Bing search engine made by 20,046 Web searchers over six months, separately explored searcher demographics using data from a large external panel of users, and sought supporting information from people with mood disorders via a survey. We analyzed changes in information needs over time relative to searches on MSD. Queries for MSD focused on side effects and their relation to the disease. We found evidence of significant changes in search behavior and interests coinciding with days that MSD queries are made. These include large increases (>100%) in the access of nutrition information, commercial information, and adult materials. A survey of patients diagnosed with mood disorders provided evidence that repeated queries on MSD may come with exacerbations of mood disorder. A classifier predicting the occurrence of such queries one day before they are observed obtains strong performance (AUC=0.78). Observed patterns in search behavior align with known behaviors and those highlighted by survey respondents. These observations suggest that searchers showing intensive interest in MSD may be patients who have been prescribed these drugs. Given behavioral dynamics, we surmise that the days on which MSD queries are made may coincide with commencement of mania or depression. Although we do not have data on mood changes and whether users have been diagnosed with bipolar illness, we see evidence of cycling in people who show interest in MSD and further show that we can predict impending shifts in behavior and interest.

  2. Seeking Insights About Cycling Mood Disorders via Anonymized Search Logs

    PubMed Central

    White, Ryen W; Horvitz, Eric

    2014-01-01

    Background Mood disorders affect a significant portion of the general population. Cycling mood disorders are characterized by intermittent episodes (or events) of the disease. Objective Using anonymized Web search logs, we identify a population of people with significant interest in mood stabilizing drugs (MSD) and seek evidence of mood swings in this population. Methods We extracted queries to the Microsoft Bing search engine made by 20,046 Web searchers over six months, separately explored searcher demographics using data from a large external panel of users, and sought supporting information from people with mood disorders via a survey. We analyzed changes in information needs over time relative to searches on MSD. Results Queries for MSD focused on side effects and their relation to the disease. We found evidence of significant changes in search behavior and interests coinciding with days that MSD queries are made. These include large increases (>100%) in the access of nutrition information, commercial information, and adult materials. A survey of patients diagnosed with mood disorders provided evidence that repeated queries on MSD may come with exacerbations of mood disorder. A classifier predicting the occurrence of such queries one day before they are observed obtains strong performance (AUC=0.78). Conclusions Observed patterns in search behavior align with known behaviors and those highlighted by survey respondents. These observations suggest that searchers showing intensive interest in MSD may be patients who have been prescribed these drugs. Given behavioral dynamics, we surmise that the days on which MSD queries are made may coincide with commencement of mania or depression. Although we do not have data on mood changes and whether users have been diagnosed with bipolar illness, we see evidence of cycling in people who show interest in MSD and further show that we can predict impending shifts in behavior and interest. PMID:24568936

  3. Paramedic and midwifery student exposure to workplace violence during clinical placements in Australia – A pilot study

    PubMed Central

    McKenna, Lisa

    2016-01-01

    Objectives The objective of this pilot study was to identify the type of workplace violence experienced by undergraduate paramedic and midwifery students. Methods The study used a cross-sectional methodology with the self-administered paper-based Paramedic Workplace Violence Exposure Questionnaire to elicit undergraduate paramedic and midwife responses to workplace violence whilst on clinical placements. There were 393 students eligible for inclusion in the study. A convenience sample was used. The anonymous questionnaire took 10 to 20 minutes to complete. Descriptive statistics are used to summarise the data with a two-tailed t-test used to compare groups. Results The main form of workplace violence was verbal abuse 18% and intimidation 17%. There was a statistically significant difference between midwifery and paramedic students for intimidation (t(134)=-3.143, CI: -0.367 to -0.082, p=0.002) and between females and males for sexual harassment (t(134)=2.029, CI: 0.001 to 0.074, p=0.045), all other results were not statistically different. Conclusions This pilot study is the first of its kind in Australia and internationally to identify exposure rates of workplace violence by undergraduate paramedic students during clinical placements and one of very few to identify midwifery students’ exposure rates of workplace violence. The study identified that students were exposed to a range of workplace violence acts from verbal abuse through to sexual harassment. These findings highlight a need for investigation of workplace violence exposure of medical, nursing and allied health students during the clinical phase of their studies. PMID:27941182

  4. Preliminary results from the new HIV surveillance system in France.

    PubMed

    Lot, F; Semaille, C; Cazein, F; Barin, F; Pinget, R; Pillonel, J; Desenclos, J C

    2004-10-01

    In addition to AIDS surveillance, data on HIV infection are necessary to better follow the dynamics of the epidemic. We report the first results of France's mandatory anonymous HIV notification system, which is linked to a virological surveillance of recent HIV infections and of circulating HIV types, groups and subtypes. HIV notifications are initiated by microbiologists who create an anonymous code of patient's identity. Clinicians complete the notification form with epidemiological and clinical data. Notifications are sent to the local health authorities and passed to the Institut de Veille Sanitaire (InVS). Laboratories voluntarily send sera from newly diagnosed HIV infected persons on dried blood spots to the national HIV reference laboratory where an immunoassay for recent infection (< or = 6 months) and a serotyping assay for the determination of group and subtype are done. The virological results are then merged at the InVS with the information from the mandatory reporting. Of the first 1301 new HIV diagnoses reported in 2003, 43% were in women, and overall, 53% were in heterosexuals, of whom 47% were of sub-Saharan African origin. MSM accounted for 36% of male notifications. A dried blood spot was available for 64% of new HIV diagnoses. Evidence of recent infection was found for 38%, ranging from 22% in IDUs to 58% in MSM. Twenty-six percent of infections in sub-Saharan migrants were recent infections. HIV-1 accounted for 98% of all notifications: 48% of these were non-B subtypes. The first results of the HIV notification system indicate that heterosexual transmission is the predominant mode of transmission and that persons originating from sub-Saharan Africa are particularly affected. Over half of infections shown to be recently acquired were in MSM; this may indicate an increased HIV incidence in this population.

  5. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    PubMed

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  6. Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    An anonymous password-authenticated key exchange (anonymous PAKE) protocol is designed to provide both password-only authentication and user anonymity against a semi-honest server, who follows the protocol honestly. Very recently, Yang and Zhang [25] have proposed a new anonymous PAKE (NAPAKE) protocol that is claimed efficient compared to the previous constructions. In this paper, we propose a very-efficient anonymous PAKE (called, VEAP) protocol that provides the most efficiency among their kinds in terms of computation and communication costs. The VEAP protocol guarantees semantic security of session keys in the random oracle model under the chosen target CDH problem, and unconditional user anonymity against a semi-honest server. If the pre-computation is allowed, both the user and the server are required to compute only one modular exponentiation, respectively. Surprisingly, this is the same computation cost of the well-known Diffie-Hellman protocol that does not provide authentication at all. In addition, we extend the VEAP protocol in two ways: the first is designed to reduce the communication costs of the VEAP protocol and the second shows that stripping off anonymity parts from the VEAP protocol results in a new PAKE protocol.

  7. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  8. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  9. Smoking cessation in the workplace.

    PubMed

    Fishwick, D; Carroll, C; McGregor, M; Drury, M; Webster, J; Bradshaw, L; Rick, J; Leaviss, J

    2013-12-01

    The workplace is an important setting for reaching potentially large numbers of smokers. To review the evidence about smoking cessation in the workplace. Literature review including a synthesis of findings from recent systematic reviews and meta-analyses of workplace smoking cessation programmes, a separate review of the qualitative evidence, case studies and an expert panel assessment. We found advantages, identified or confirmed from the mixed methods used in this work to holding smoking cessation programmes in the workplace. These included: (i) easy access to large numbers of worker populations for large workplaces, (ii) the potential improved recruitment to such programmes given this, (iii) the opportunity to access young men, traditionally difficult to achieve, (iv) access to occupational health and other staff who can assist with support and delivery and (v) ability for workers to attend relatively easily. Evidence on the importance of developing peer support at work was mixed. The simple provision or availability of programmes and interventions was unlikely to provide any beneficial behaviour change. Interventions should target workers that actively want to stop smoking, use elements that workers have identified as useful or focus on altering beliefs about smoking and the need to stop. Smoking cessation programmes at work can provide useful support for workers wishing to stop smoking. They are only likely to be effective if participants have moved beyond the contemplation stage regarding smoking cessation, so that stopping smoking is a personal priority.

  10. Social capital and workplace bullying.

    PubMed

    Pihl, Patricia; Albertsen, Karen; Hogh, Annie; Andersen, Lars Peter Sønderbo

    2017-01-01

    Workplace bullying is a serious stressor with devastating short- and long-term consequences. The concept of organizational social capital may provide insights into the interactional and communicative dynamics of the bullying process and opportunities for prevention. This study aimed to explore the association between organizational social capital and being a target or observer of workplace bullying. Based on self-reported cross-sectional data from a large representative sample of the Danish working population (n = 10.037), logistic regression analyses were conducted to explore at the individual level the associations between vertical and horizontal organizational social capital with being a target or observer of workplace bullying. In the fully adjusted models, low organizational social capital (vertical and horizontal) was associated with significantly increased odds ratios of both self-labelled (vertical: OR = 3.25; CI = 2.34-4.51; horizontal: OR = 3.17; CI = 2.41-4.18) and observed workplace bullying (vertical: OR = 2.09; CI = 1.70-2.56; horizontal: OR = 1.60; CI = 1.35-1.89), when compared with high organizational social capital. This study supports that characteristics of the psychosocial work environment are of importance in the development of workplace bullying, and provides focus on the importance of self-reported organizational social capital.

  11. Monitoring the levels and trends of HIV infection: the Public Health Service's HIV surveillance program.

    PubMed Central

    Dondero, T J; Pappaioanou, M; Curran, J W

    1988-01-01

    A comprehensive, multifaceted approach to HIV surveillance is needed to provide the information necessary for public health management and policy. Because HIV infection is not readily or uniformly ascertained, survey methods and sentinel surveillance approaches must be used. At least some of the surveys must be blinded, that is, anonymous and unlinked to identifiable persons, to avoid the uninterpretable impact of self-selection bias that could lead to both significant underestimates and occasional overestimates of HIV prevalence. Other surveys must be nonblinded, with careful interviews of volunteer participants to evaluate risk factors for HIV infection. These various surveys must continue over time to evaluate trends in infection. A comprehensive family of complementary HIV surveys and studies and a national household-based HIV seroprevalence survey have been undertaken by the Public Health Service in collaboration with other Federal agencies, State and local health departments, blood collection agencies, and medical research institutions. These projects focus on accessible segments of the general population, childbearing women, persons at high risk for HIV, and persons in special settings such as prisons and colleges. This comprehensive surveillance approach will help monitor the levels and trends of HIV infection in the United States and help prioritize, target, and evaluate HIV prevention activities. PMID:3131809

  12. Diversity management: the treatment of HIV-positive employees.

    PubMed

    Yap, Matthew H T; Ineson, Elizabeth M

    2012-01-01

    Socio-demographic dimensions such as age, gender, sexual orientation, race and ethnicity are commonly included in diversity studies. With a view to helping Asian hospitality managers to manage HIV-positive employees in their workplaces through diversity management (DM) theory, this research extends the boundaries of previous diversity studies by considering Human Immunodeficiency Virus (HIV) infection as a diverse characteristic. Both quantitative and qualitative primary data were collected from purposively selected Asian hospitality managers through postal questionnaire and follow-up telephone interviews. Transformed raw data were analysed using summary statistics and template analysis. Asian hospitality managers agreed that DM would be appropriate in the management of HIV-positive employees and that it could generate substantial benefits for employees and employers. However, they believe that the successful adoption and implementation of DM is not easy; it requires training and, ideally, the recruitment of experienced directors. Nevertheless, Asian hospitality managers are confident that implementing DM to manage HIV-positive employees can enhance tolerance, improve understanding and promote equality. The purposive sampling technique and the small number of respondents have impacted the external validity of the study. However, this exploratory study initiates an equality discussion to include HIV-positive employees in DM discourse beyond antidiscrimination legislation. It also supplements the sparse literature addressing HIV-positive employees in the Asian hospitality workplace. Asian hospitality managers are advised to understand and employ DM to treat HIV-positive employees fairly to overcome hospitality workplace marginalisation, discrimination and stigmatisation.

  13. Substance Abuse Taxes the American Workplace

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_164283.html Substance Abuse Taxes the American Workplace Survey, analysis reveal the ... 24, 2017 FRIDAY, March 24, 2017 (HealthDay News) -- Substance abuse exacts a heavy toll on the American workplace, ...

  14. Workplace Safety and Health: Body Art

    MedlinePlus

    ... message, please visit this page: About CDC.gov . Workplace Safety & Health Topics Body Art Get Vaccinated Prevent Needlestick ... Pinterest Twitter YouTube NIOSH Homepage NIOSH A-Z Workplace Safety & Health Topics Publications and Products Programs Contact NIOSH ...

  15. Cognitive and strategic processes in small groups: effects of anonymity of the self and anonymity of the group on social influence.

    PubMed

    Sassenberg, Kai; Postmes, Tom

    2002-09-01

    Two studies examined cognitive and strategic processes of social influence in small groups. A first study showed that anonymity of in-group members to the self cognitively enhanced the perceived unity or entitativity of the group, while the interpersonal attraction to group members decreased. A second study showed that anonymity of the self to the group strategically enhanced differentiation from the group on non-normative dimensions. Overall, it was found that strategic and cognitive processes interact to produce social influence within the group. Implications for theories of social influence in groups are discussed.

  16. Using Adult Education Principles for HIV/AIDS Awareness Intervention Strategies in Botswana

    ERIC Educational Resources Information Center

    Preece, Julia; Ntseane, Gabo

    2004-01-01

    This paper reports on a mainly qualitative study into company strategies for HIV/AIDS information, education and communication (IEC) strategies in the Botswana workplace. The authors argue that HIV/AIDS awareness and prevention strategies in Botswana need a new approach. The research proposal hypothesized that IEC strategies need to take account…

  17. Using Adult Education Principles for HIV/AIDS Awareness Intervention Strategies in Botswana

    ERIC Educational Resources Information Center

    Preece, Julia; Ntseane, Gabo

    2004-01-01

    This paper reports on a mainly qualitative study into company strategies for HIV/AIDS information, education and communication (IEC) strategies in the Botswana workplace. The authors argue that HIV/AIDS awareness and prevention strategies in Botswana need a new approach. The research proposal hypothesized that IEC strategies need to take account…

  18. Mobbing: Workplace Violence in the Academy

    ERIC Educational Resources Information Center

    Keim, Jeanmarie; McDermott, J. Cynthia

    2010-01-01

    Incidents of workplace violence are becoming all too common at colleges and universities. Generally, one thinks of shootings and assaults in relation to campus workplace violence. However, mobbing and bullying of faculty by other faculty are types of workplace violence that, while very common, are rarely discussed or reported. This article raises…

  19. Workplace Education Programs. Adult Education Supervisor's Handbook.

    ERIC Educational Resources Information Center

    Averitt, Sallie Dowling

    This guidebook was designed to be a practical guide in developing workplace education programs. The handbook includes the following three sections: (1) background information, including details and supporting information about workplace education; (2) workplace education worksheets that adult education supervisors can take to the worksite to use…

  20. Key Issues for Workplace Literacy Educators.

    ERIC Educational Resources Information Center

    Mikulecky, Larry; And Others

    The research on workplace literacy programs during the past two decades has revealed a great deal about the requisites for successful workplace literacy programs. The following have been identified as characteristics of effective workplace literacy programs: active involvement by all project partners; employee involvement in the early stages of…

  1. Firefighter Workplace Learning: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Tracey, Edward A.

    2014-01-01

    Despite there being a significant amount of research investigating workplace learning, research exploring firefighter workplace learning is almost nonexistent. The purpose of this qualitative multi-case study was to explore how firefighters conceptualize, report, and practice workplace learning. The researcher also investigated how firefighters…

  2. Workplace Learning of High Performance Sports Coaches

    ERIC Educational Resources Information Center

    Rynne, Steven B.; Mallett, Clifford J.; Tinning, Richard

    2010-01-01

    The Australian coaching workplace (to be referred to as the State Institute of Sport; SIS) under consideration in this study employs significant numbers of full-time performance sport coaches and can be accurately characterized as a genuine workplace. Through a consideration of the interaction between what the workplace (SIS) affords the…

  3. Combatting Racism in the Workplace. Readings Kit.

    ERIC Educational Resources Information Center

    Thomas, Barb; Novogrodsky, Charles

    Readings and exercises for use with a course for Canadian workers on racism and the workplace are included in this book. The materials are organized to reflect the themes of the ten sessions of the course: (1) racism hurts workers; (2) analysing racial situations in the workplace; (3) the employer connection to racism in the workplace; (4)…

  4. Firefighter Workplace Learning: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Tracey, Edward A.

    2014-01-01

    Despite there being a significant amount of research investigating workplace learning, research exploring firefighter workplace learning is almost nonexistent. The purpose of this qualitative multi-case study was to explore how firefighters conceptualize, report, and practice workplace learning. The researcher also investigated how firefighters…

  5. Workplace Learning in Malaysia: The Learner's Perspective

    ERIC Educational Resources Information Center

    Muhamad, Mazanah; Idris, Khairuddin

    2005-01-01

    This paper offers a scenario of workplace learning as practiced in Malaysia. Based on survey research, the article describes learner profiles, learning provision and pattern. The analysis shows that Malaysians participate in formal workplace learning as part of their employment activities. Workplace learning in Malaysia is contextual, promoted by…

  6. Mobbing: Workplace Violence in the Academy

    ERIC Educational Resources Information Center

    Keim, Jeanmarie; McDermott, J. Cynthia

    2010-01-01

    Incidents of workplace violence are becoming all too common at colleges and universities. Generally, one thinks of shootings and assaults in relation to campus workplace violence. However, mobbing and bullying of faculty by other faculty are types of workplace violence that, while very common, are rarely discussed or reported. This article raises…

  7. Promoting Workplace Literacy and Basic Skills Development.

    ERIC Educational Resources Information Center

    Peterson, Elizabeth A.; Ott, Joyce; Wilson, Kathleen

    This document is intended to help literacy practitioners and others in South Carolina promote workplace literacy and basic skills development programs. The introduction examines the following topics: South Carolina's current workforce and its outlook; the definitions of literacy and workplace literacy; the need for workplace literacy and basic…

  8. Ten-year trends in HIV prevalence among visitors to public health centers under the National HIV Surveillance System in Korea, 2000 to 2009

    PubMed Central

    2012-01-01

    Background Korea saw a sharp increase in HIV diagnosis from 2000. This serious public health concern must be monitored diligently. We identified the characteristics and trends in HIV prevalence among visitors to public health centers (PHCs) from 2000 to 2009. Methods We retrieved ten-year data of HIV tests from 253 PHCs. The HIV prevalence was analyzed by gender, age, nationality, region, and reason for HIV testing. Data were analyzed using logistic regression and score test for trend. Results HIV prevalence among PHCs’ visitors has rapidly increased for six years since 2000, decreased from 2006, and then remained stable. Approximately 50% of total HIV tests were performed for sexually transmitted infection risk group (STI RG), who were tested 1.4 times within a year. Women and the 20s comprised approximately 70% and 40% of PHCs’ visitors, respectively. The prevalence of voluntary test takers was the highest and showed most rapid increase (P = 0.007), but that of prisoners declined (P = 0.003). The prevalence of STI RG was lower than those of the other groups and remained stable throughout the ten-year period (P = 0.606). Percentage of anonymous tests was 2–3% of a total HIV tests, but overall HIV-positive rate showed a rapid increase (P < 0.001). Conclusions As voluntary or anonymous testing groups are actively engaged in learning their status of HIV, these groups showed the highest in HIV infection. Groups in the population with these characteristics should be located and encouraged to be tested, and offered anonymity. This study suggests that it is important to ascertain the characteristics of people choosing to take voluntary testing. PMID:23020818

  9. A Healthier Workplace? Implementation of Fruit Boxes in the Workplace

    ERIC Educational Resources Information Center

    Pescud, Melanie; Waterworth, Pippa; Shilton, Trevor; Teal, Renee; Slevin, Terry; Ledger, Melissa; Lester, Leanne; Rosenberg, Michael

    2016-01-01

    Objective: The purpose of this study was to investigate whether making fruit boxes available in the workplace is a successful health promotion strategy. Design: A quasi-experimental study involving three conditions--free fruit, 50c per piece of fruit and $1 per piece of fruit--to investigate the effect of a contribution scheme on employees' fruit…

  10. Workplace Literacy: Raising the Floor of Education in the Workplace.

    ERIC Educational Resources Information Center

    Mathes, David M.

    Changes in the workplace have raised the level of literacy needed by workers to full twelfth grade at least and outstripped manufacturers' ability to retrain workers. Even workers with high school diplomas may not be able to read. Although defined as literate, 40 percent of workers cannot meet the demands of the new technology. In order to achieve…

  11. Workplace Bullying: Curing the Cancer of the American Workplace.

    ERIC Educational Resources Information Center

    Glendinning, Peter M.

    2001-01-01

    A literature review concluded that supervisor/supervisee relationships are critical to job satisfaction; workplace bullying in the form of a management style of aggressive and intimidating behaviors is widespread; certain types of organizations foster bullying; and bullying has high costs for the targeted employee and the organization. (Contains…

  12. A Healthier Workplace? Implementation of Fruit Boxes in the Workplace

    ERIC Educational Resources Information Center

    Pescud, Melanie; Waterworth, Pippa; Shilton, Trevor; Teal, Renee; Slevin, Terry; Ledger, Melissa; Lester, Leanne; Rosenberg, Michael

    2016-01-01

    Objective: The purpose of this study was to investigate whether making fruit boxes available in the workplace is a successful health promotion strategy. Design: A quasi-experimental study involving three conditions--free fruit, 50c per piece of fruit and $1 per piece of fruit--to investigate the effect of a contribution scheme on employees' fruit…

  13. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  14. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  15. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  16. Sentinel surveillance for HIV-2 infection in high-risk US populations.

    PubMed Central

    Onorato, I M; O'Brien, T R; Schable, C A; Spruill, C; Holmberg, S D

    1993-01-01

    OBJECTIVES. We conducted sentinel surveillance in persons practicing behaviors known to transmit retroviruses to determine the US presence and extent of human immunodeficiency virus type 2 (HIV-2). METHODS. Sentinel surveillance for HIV-2 was conducted by testing 31,533 anonymous blood specimens from patients at sexually transmitted disease clinics, injecting drug users at treatment centers, and clients at HIV counseling and testing sites in 14 US cities where West African immigrants often settle. Specimens were tested by HIV-1 and HIV-2 whole virus and synthetic peptide enzyme immunoassay and confirmed by HIV-1 and HIV-2 Western blots. RESULTS. Nearly 10% of 31,533 sera were positive for HIV-1. Two heterosexual Black male sexually transmitted disease patients were infected with HIV-2. One of the HIV-2 positive specimens did not cross-react on HIV-1 enzyme immunoassay screening. One client had antibodies consistent with malarial infection in West Africa; the other, who had syphilis, did not have antibodies to malaria or to any of 20 arboviruses present in Africa. CONCLUSIONS. Clinics serving clients from HIV-2 endemic areas should test persons practicing risk behaviors for both HIV-1 and HIV-2. Sentinel surveillance for HIV-2 serves as an early warning system for the possible spread of this virus in the United States. PMID:8460726

  17. Targeting HIV services to male migrant workers in southern Africa would not reverse generalized HIV epidemics in their home communities: a mathematical modeling analysis

    PubMed Central

    Klein, Daniel J.; Eckhoff, Philip A.; Bershteyn, Anna

    2015-01-01

    Background Migrant populations such as mine workers contributed to the spread of HIV in sub-Saharan Africa. We used a mathematical model to estimate the community-wide impact of targeting treatment and prevention to male migrants. Methods We augmented an individual-based network model, EMOD-HIV v0.8, to include an age-dependent propensity for males to migrate. Migrants were exposed to HIV outside their home community, but continued to participate in HIV transmission in the community during periodic visits. Results Migrant-targeted interventions would have been transformative in the 1980s to 1990s, but post-2015 impacts were more modest. When targetable migrants comprised 2% of adult males, workplace HIV prevention averted 3.5% of community-wide infections over 20 years. Targeted treatment averted 8.5% of all-cause deaths among migrants. When migrants comprised 10% of males, workplace prevention averted 16.2% of infections in the community, one-quarter of which were among migrants. Workplace prevention and treatment acted synergistically, averting 17.1% of community infections and 11.6% of deaths among migrants. These estimates do not include prevention of secondary spread of HIV or tuberculosis at the workplace. Conclusions Though cost-effective, targeting migrants cannot collapse generalized epidemics in their home communities. Such a strategy would only have been possible prior to the early 1990s. However, migrant-targeted interventions synergize with general-population expansion of HIV services. PMID:25733560

  18. Identity, Physical Space, and Stigma Among African American Men Living with HIV in Chicago and Seattle

    PubMed Central

    Singleton, Judith L.; Raunig, Manuela; Brunsteter, Halley; Desmond, Michelle; Rao, Deepa

    2015-01-01

    African American men have the highest rates of HIV in the United States, and research has shown that stigma, mistrust of healthcare, and other psychosocial factors interfere with optimal engagement in care with this population. In order to further understand reducing stigma and other psychosocial issues among African American men, we conducted qualitative interviews and focus groups with African American men in two metropolitan areas in the United States: Chicago and Seattle. We examined transcripts for relationships across variables of stigma, anonymity, self-identity, and space within the context of HIV. Our analysis pointed to similarities between experiences of stigma across the two cities, and illustrated the relationships between space, isolation and preferred anonymity related to living with HIV. The men in our study often preferred their HIV-linked identities remain invisible and anonymous, associated with perceived and created isolation from physical community spaces. This article suggests that our healthcare and housing institutions may influence preferences for anonymity. We make recommendations in key areas to create safer spaces for African American men living with HIV and reduce feelings of stigma and isolation. PMID:26863561

  19. Identity, Physical Space, and Stigma Among African American Men Living with HIV in Chicago and Seattle.

    PubMed

    Singleton, Judith L; Raunig, Manuela; Brunsteter, Halley; Desmond, Michelle; Rao, Deepa

    2015-12-01

    African American men have the highest rates of HIV in the USA, and research has shown that stigma, mistrust of health care, and other psychosocial factors interfere with optimal engagement in care with this population. In order to further understand reducing stigma and other psychosocial issues among African American men, we conducted qualitative interviews and focus groups with African American men in two metropolitan areas in the USA: Chicago and Seattle. We examined transcripts for relationships across variables of stigma, anonymity, self-identity, and space within the context of HIV. Our analysis pointed to similarities between experiences of stigma across the two cities and illustrated the relationships between space, isolation, and preferred anonymity related to living with HIV. The men in our study often preferred that their HIV-linked identities remain invisible and anonymous, associated with perceived and created isolation from physical community spaces. This article suggests that our health care and housing institutions may influence preferences for anonymity. We make recommendations in key areas to create safer spaces for African American men living with HIV and reduce feelings of stigma and isolation.

  20. Anonymous Warrior: The Contributions of Harold L. George to Strategic Air Power

    DTIC Science & Technology

    1997-03-01

    AU/ACSC/0126I/97–03 ANONYMOUS WARRIOR: THE CONTRIBUTIONS OF HAROLD L. GEORGE TO STRATEGIC AIR POWER A Research Paper Presented To The Research...Documentation Page Report Date 00031997 Report Type N/A Dates Covered (from... to) - Title and Subtitle Anonymous Warrior: The contributions of Harold L...Situation and Recommendation for the Conduct of the War.” This revision proposed a general increase in bomber strength to account for the loss of sea

  1. A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    At Indocrypt 2005, Viet et al., [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client's password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-line dictionary attacks. For the threshold t > 1, we propose a secure threshold anonymous PAKE (for short, TAP) protocol with the number of clients n upper-bounded, such that n\\leq 2 \\sqrt{N-1} -1, where N is a dictionary size of passwords. We rigorously prove that the TAP protocol has semantic security of session keys in the random oracle model by showing the reduction to the computational Diffie-Hellman problem. In addition, the TAP protocol provides unconditional anonymity against a passive server. For the threshold t=1, we propose an efficient anonymous PAKE protocol that significantly improves efficiency in terms of computation costs and communication bandwidth compared to the original (not threshold) anonymous PAKE protocol [21].

  2. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    PubMed

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  3. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

    PubMed Central

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-01-01

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417

  4. Should the United States Army Adapt New Conditions in Its HIV Policy to Allow Eligible HIV Positive Soldiers the Ability to Serve Overseas

    DTIC Science & Technology

    2017-06-09

    have made claims that an increase of contraction rates are from engaging in risky behaviors to include 2 unprotected sex with anonymous people...Americans, Hispanics, Latinos, Asians, Pacific Islanders and males who have sex with men” (IDCRP 2017; MEDCOM 2017; CDC 2016a; MHRP 2015). HIV can be...bloodstream (from a needle or syringe) for transmission to occur” (CDC 2016f). This means HIV can be spread through sex , birth, the use of contaminated

  5. Flipped Learning in the Workplace

    ERIC Educational Resources Information Center

    Nederveld, Allison; Berge, Zane L.

    2015-01-01

    Purpose: The purpose of this paper is to serve as a summary of resources on flipped learning for workplace learning professionals. A recent buzzword in the training world is "flipped". Flipped learning and the flipped classroom are hot topics that have emerged in K-12 education, made their way to the university and are now being noticed…

  6. Internet Gambling in the Workplace

    ERIC Educational Resources Information Center

    Griffiths, Mark

    2009-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to gambling--and more specifically internet gambling--in the workplace. Design/methodology/approach: Using psychological literature, this paper outlines a number of important and inter-related areas including brief overviews of gambling and problem gambling,…

  7. University Courses in the Workplace.

    ERIC Educational Resources Information Center

    McKinney, William Lynn; Nardone, Virginia E.

    1993-01-01

    Comparison of 187 New England Telephone workers participating in a workplace education program of the University of Rhode Island and 187 on-campus students showed them alike in terms of persistence, but workers earned fewer College-Level Examination Program credits and matriculated more slowly. Supportive work environments affected matriculation.…

  8. Workplace Literacy Tutor Training Manual.

    ERIC Educational Resources Information Center

    Janney-Pace, Priscilla; Fox, Laurie

    This manual contains a workshop curriculum that offers background information and activities rooted in the whole language approach. It is designed to address needs of employees with skill levels below fifth grade. Section I is an introduction to the changing workplace environment. Sections II-V cover problem solving, communication (speaking…

  9. Internet Gambling in the Workplace

    ERIC Educational Resources Information Center

    Griffiths, Mark

    2009-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to gambling--and more specifically internet gambling--in the workplace. Design/methodology/approach: Using psychological literature, this paper outlines a number of important and inter-related areas including brief overviews of gambling and problem gambling,…

  10. Educators' Understanding of Workplace Bullying

    ERIC Educational Resources Information Center

    de Wet, Corene

    2014-01-01

    This article looks at educators' understanding of workplace bullying through the lens of a two- dimensional model of bullying. Educators, who were furthering their studies at the University of the Free State, were invited to take part in a study on different types of bullying. Deductive, directed content analysis was used to analyse 59…

  11. Promoting Civility in the Workplace

    ERIC Educational Resources Information Center

    Griffith, Daniel

    2003-01-01

    There is more to achieving civility in the workplace than following imposed rules and regulations outlined in an institution's policy manual. Oftentimes, circumstances and situations arise that are not addressed in any policy manual, but which nonetheless compromise respect, trust and decency in the office. In this article, a manager of…

  12. Results Orientated Workplace Literacy Project.

    ERIC Educational Resources Information Center

    Farrell, Virginia, Comp.

    Cuyahoga Community College's (CCC) Unified Technologies Center (UTC) collaborated with three Cleveland area manufacturing companies in a workplace literacy project. The project provided job-related mathematics and communications programs for 302 employees who needed basic skills upgrading to improve their job performance. The project…

  13. Self-Directed Workplace Learning.

    ERIC Educational Resources Information Center

    1998

    This document contains four papers from a symposium on self-directed workplace learning. "Self-Directed Work Teams: Implementation and Performance" (Marcel van der Klink, Hilde ter Horst) discusses the results of a study examining the implementation and effects of self-directed work teams in a land register office and the role of the…

  14. Workplace Education: The Changing Landscape.

    ERIC Educational Resources Information Center

    Taylor, Maurice C., Ed.

    The 23 chapters of this book are as follows: "A Framework for Developing Partnerships" (Wendy M. Doughty); "Partnership Building in Nova Scotia" (Marjorie Davison, Paul Temple); "What Makes a Successful Workplace Education Partnership?" (Rob Despins et al.); "Building Linkages in Large Organizations: The Syncrude…

  15. Health & Hygiene in the Workplace.

    ERIC Educational Resources Information Center

    Snapp, Mary

    Developed by educators from the Emily Griffith Opportunity School with input from employees--both workplace literacy students and nonstudents--this guide contains activities for teaching health and hygiene on the job. Flowing from a perspective of respecting cultural diversity and guided by a common thread of good work practices, the activities…

  16. Information Literacy in the Workplace.

    ERIC Educational Resources Information Center

    Oman, Julie N.

    2001-01-01

    Discusses the need for information literacy in the workplace in the face of information overload and problems related to end user information skills. Explains how to improve information literacy by assessing the organization's infrastructure, including available information technologies and information processes; considering demographics; and…

  17. Canadian Accountants: Examining Workplace Learning

    ERIC Educational Resources Information Center

    Hicks, Elizabeth; Bagg, Robert; Doyle, Wendy; Young, Jeffrey D.

    2007-01-01

    Purpose: This paper seeks to examine workplace learning strategies, learning facilitators and learning barriers of public accountants in Canada across three professional levels--trainees, managers, and partners. Design/methodology/approach: Volunteer participants from public accounting firms in Nova Scotia and New Brunswick completed a demographic…

  18. Facilitating learning in the workplace.

    PubMed

    Morris, Clare

    2010-01-01

    Workplace-based learning has been at the heart of medical education and training for centuries. However, radical reform of the NHS means we have to re-think traditional approaches to apprenticeship and find new ways to ensure that students and trainees can learn 'on-the-job' while doing the job.

  19. Workplace Training at SBS Radio.

    ERIC Educational Resources Information Center

    Simons, Lynette

    2001-01-01

    Notes that at Australia's Special Broadcasting Services Radio, workplace training is an essential requirement for on-air staff but a degree in journalism or communications is an enormous advantage. Describes several in-house accredited competency-based modules in journalism and broadcasting. (RS)

  20. Expansive Learning across Workplace Boundaries

    ERIC Educational Resources Information Center

    Kerosuo, Hannele; Toiviainen, Hanna

    2011-01-01

    The article analyses a collaborative effort of learning across workplace boundaries in a regional learning network of South Savo, Finland. The focus is on the "Forum of In-house Development" in the network. Our objective is to highlight a dialectical approach to boundaries that draws from the ideas of cultural-historical activity theory.…

  1. Social Ecology of the Workplace.

    ERIC Educational Resources Information Center

    Chadsey-Rusch, Janis; And Others

    The collection contains six papers of studies which investigated the social ecology of the workplace and associated implications for friendship formations between adults with and without mental retardation. The papers' authors, Janis Chadsey-Rusch, Frank Rusch, Patricia Gonzalez, Jeffrey Tines, Kathleen Minch, and Carolyn Hughes, observed…

  2. University Courses in the Workplace.

    ERIC Educational Resources Information Center

    McKinney, William Lynn; Nardone, Virginia E.

    1993-01-01

    Comparison of 187 New England Telephone workers participating in a workplace education program of the University of Rhode Island and 187 on-campus students showed them alike in terms of persistence, but workers earned fewer College-Level Examination Program credits and matriculated more slowly. Supportive work environments affected matriculation.…

  3. Foreign Language in the Workplace.

    ERIC Educational Resources Information Center

    Lambert, Richard D., Ed.; Moore, Sarah Jane, Ed.

    1990-01-01

    Articles in this theme issue of the journal, devoted to the subject of languages in the workplace, include: "Language Use in International Research" (Eugene Garfield, Alfred Welljams-Dorof); "The Foreign Language Needs of U.S.-Based Corporations" (Carol S. Fixman); "Foreign Language Use Among International Business…

  4. Adult Development and the Workplace.

    ERIC Educational Resources Information Center

    Heffernan, James M.

    Little attention has been given to how adults develop through their lifetimes and what roles their workplace environments play in that development. Research and theory regarding adult psychosocial development have confirmed the developmental life-cycle phases of adulthood. These are: leaving the family (ages 16-22), getting into the adult world…

  5. Self-Directed Workplace Learning.

    ERIC Educational Resources Information Center

    1998

    This document contains four papers from a symposium on self-directed workplace learning. "Self-Directed Work Teams: Implementation and Performance" (Marcel van der Klink, Hilde ter Horst) discusses the results of a study examining the implementation and effects of self-directed work teams in a land register office and the role of the…

  6. Making Spaces: Teacher Workplace Topologies

    ERIC Educational Resources Information Center

    McGregor, Jane

    2003-01-01

    Studies of the workplace of teachers commonly focus on the spaces of the classroom, staffroom and school as pre-given and bounded entities. This article explores the possibilities of moving beyond such topographies of enclosure, towards seeing space(-time) as recursively constructed with social relations and so made and remade. Boundaries are then…

  7. Flipped Learning in the Workplace

    ERIC Educational Resources Information Center

    Nederveld, Allison; Berge, Zane L.

    2015-01-01

    Purpose: The purpose of this paper is to serve as a summary of resources on flipped learning for workplace learning professionals. A recent buzzword in the training world is "flipped". Flipped learning and the flipped classroom are hot topics that have emerged in K-12 education, made their way to the university and are now being noticed…

  8. Workplace Education: The Changing Landscape.

    ERIC Educational Resources Information Center

    Taylor, Maurice C., Ed.

    The 23 chapters of this book are as follows: "A Framework for Developing Partnerships" (Wendy M. Doughty); "Partnership Building in Nova Scotia" (Marjorie Davison, Paul Temple); "What Makes a Successful Workplace Education Partnership?" (Rob Despins et al.); "Building Linkages in Large Organizations: The Syncrude…

  9. Interpersonal Relationships in the Workplace.

    ERIC Educational Resources Information Center

    Danner, Jean Ortowski; And Others

    This curriculum guide on interpersonal relations in the workplace give techniques for instructors to use in evaluating these skills in their students. Eighteen competencies are included in this guide: adaptability; attendance; attitude; communication (nonverbal); communication (verbal); communication (written); confidence; cooperation; enthusiasm;…

  10. Information Literacy in the Workplace.

    ERIC Educational Resources Information Center

    Oman, Julie N.

    2001-01-01

    Discusses the need for information literacy in the workplace in the face of information overload and problems related to end user information skills. Explains how to improve information literacy by assessing the organization's infrastructure, including available information technologies and information processes; considering demographics; and…

  11. Making Spaces: Teacher Workplace Topologies

    ERIC Educational Resources Information Center

    McGregor, Jane

    2003-01-01

    Studies of the workplace of teachers commonly focus on the spaces of the classroom, staffroom and school as pre-given and bounded entities. This article explores the possibilities of moving beyond such topographies of enclosure, towards seeing space(-time) as recursively constructed with social relations and so made and remade. Boundaries are then…

  12. Expansive Learning across Workplace Boundaries

    ERIC Educational Resources Information Center

    Kerosuo, Hannele; Toiviainen, Hanna

    2011-01-01

    The article analyses a collaborative effort of learning across workplace boundaries in a regional learning network of South Savo, Finland. The focus is on the "Forum of In-house Development" in the network. Our objective is to highlight a dialectical approach to boundaries that draws from the ideas of cultural-historical activity theory.…

  13. Canadian Accountants: Examining Workplace Learning

    ERIC Educational Resources Information Center

    Hicks, Elizabeth; Bagg, Robert; Doyle, Wendy; Young, Jeffrey D.

    2007-01-01

    Purpose: This paper seeks to examine workplace learning strategies, learning facilitators and learning barriers of public accountants in Canada across three professional levels--trainees, managers, and partners. Design/methodology/approach: Volunteer participants from public accounting firms in Nova Scotia and New Brunswick completed a demographic…

  14. Epistemological Agency in the Workplace

    ERIC Educational Resources Information Center

    Smith, Raymond

    2006-01-01

    Purpose: The purpose of this paper is to report and discuss research that sought to explore how the individually purposeful nature of new employee workplace learning might be understood through its conception as epistemological agency, that is, the personally mediated construction of knowledge. Design/methodology/approach: Using a sociocultural…

  15. Workplace Violence in Higher Education.

    ERIC Educational Resources Information Center

    Rice, Edward D.

    2003-01-01

    Addresses workplace violence prevention, beginning by defining violence, why people become violent, and the cycle of violence. Then discusses steps in prevention, including pre-incident planning, an incident management team, threat management, assessment, post-incident response, and training. (EV)

  16. Reaction to the Changing Workplace.

    ERIC Educational Resources Information Center

    Lewis, Morgan V.

    1985-01-01

    While agreeing on balance with the four preceding articles on the changing workplace, the author cites some research that indicates that the net effect of technology is to lower skill requirements of jobs. Concludes that we will need a flexible, well-educated work force. (SK)

  17. Diversity in the Workplace. Symposium.

    ERIC Educational Resources Information Center

    2002

    Three papers comprise this symposium on diversity in the workplace. "Factors That Assist and Barriers That Hinder the Success of Diversity Initiatives in Multinational Corporations" (Rose Mary Wentling) reports that factors that assisted in the success were classified under diversity department, human, and work environment; barriers were…

  18. Evaluating Workplace English Language Programs

    ERIC Educational Resources Information Center

    Ekkens, Kristin; Winke, Paula

    2009-01-01

    Companies across the United States provide workplace English classes to non-native-English-speaking employees to increase productivity, retention, and on-the-job safety. Institutions that financially support the programs often require evidence of learning through standardized tests as a prerequisite for continued funding. However, the tests…

  19. Family-Focused Workplace Guide.

    ERIC Educational Resources Information Center

    SERVE: SouthEastern Regional Vision for Education.

    The relationship between family and the workplace and the impact of both on school readiness are well documented. As society changes, home, work, and school relationships are being reassessed and retooled. Noting that employers are taking an increasing role in helping families cope with societal changes, this handbook offers information to…

  20. Workshop III: Improving the Workplace Environment

    NASA Astrophysics Data System (ADS)

    Gledhill, Igle; Butcher, Gillian

    2015-12-01

    Research has shown that companies with more diversity and a better workplace perform better. So what makes a good workplace in physics, where women and men can work to their full potential? In the Improving the Workplace Environment workshop of the 5th IUPAP International Conference on Women in Physics, participants heard about initiatives taking place in Canada, the UK, Japan, and India to improve the workplace environment and shared good practices from around the world. Some of the less tangible aspects of the workplace environment, such as unconscious bias and accumulation of advantage and disadvantage, were explored.