Sharing sensitive personal health information through Facebook: the unintended consequences.
Househ, Mowafa
2011-01-01
The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined.
An Examination of the Explicit Costs of Sensitive Information Security Breaches
ERIC Educational Resources Information Center
Toe, Cleophas Adeodat
2013-01-01
Data security breaches are categorized as loss of information that is entrusted in an organization by its customers, partners, shareholders, and stakeholders. Data breaches are significant risk factors for companies that store, process, and transmit sensitive personal information. Sensitive information is defined as confidential or proprietary…
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
2008-04-11
This document adopts, without change, the interim final rule that was published in the Federal Register on June 22, 2007, addressing data breaches of sensitive personal information that is processed or maintained by the Department of Veterans Affairs (VA). This final rule implements certain provisions of the Veterans Benefits, Health Care, and Information Technology Act of 2006. The regulations prescribe the mechanisms for taking action in response to a data breach of sensitive personal information.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financialmore » harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified opportunities to strengthen the protection of all types of sensitive unclassified electronic information and reduce the risk that such data could fall into the hands of individuals with malicious intent. In particular, for the seven sites we reviewed: (1) Four sites had either not ensured that sensitive information maintained on mobile devices was encrypted. Or, they had improperly permitted sensitive unclassified information to be transmitted unencrypted through email or to offsite backup storage facilities; (2) One site had not ensured that laptops taken on foreign travel, including travel to sensitive countries, were protected against security threats; and, (3) Although required by the OMB since 2003, we learned that programs and sites were still working to complete Privacy Impact Assessments - analyses designed to examine the risks and ramifications of using information systems to collect, maintain, and disseminate personal information. Our testing revealed that the weaknesses identified were attributable, at least in part, to Headquarters programs and field sites that had not implemented existing policies and procedures requiring protection of sensitive electronic information. In addition, a lack of performance monitoring contributed to the inability of the Department and the National Nuclear Security Administration (NNSA) to ensure that measures were in place to fully protect sensitive information. As demonstrated by previous computer intrusion-related data losses throughout the Department, without improvements, the risk or vulnerability for future losses remains unacceptably high. In conducting this audit, we recognized that data encryption and related techniques do not provide absolute assurance that sensitive data is fully protected. For example, encryption will not necessarily protect data in circumstances where organizational access controls are weak or are circumvented through phishing or other malicious techniques. However, as noted by NIST, when used appropriately, encryption is an effective tool that can, as part of an overall risk-management strategy, enhance security over critical personal and other sensitive information. The audit disclosed that Sandia National Laboratories had instituted a comprehensive program to protect laptops taken on foreign travel. In addition, the Department issued policy after our field work was completed that should standardize the Privacy Impact Assessment process, and, in so doing, provide increased accountability. While these actions are positive steps, additional effort is needed to help ensure that the privacy of individuals is adequately protected and that sensitive operational data is not compromised. To that end, our report contains several recommendations to implement a risk-based protection scheme for the protection of sensitive electronic information.« less
Information barrier technology applied to less restrictive environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacArthur, D. W.; Langner, D. C.; Hypes, P. A.
2004-01-01
The information barrier is an important part of any system that allows inspector verification of declared classified materials. In this context, the information barrier must protect classified information while allowing the inspectors to reach correct and independent conclusions concerning the veracity of the declaration. Although other applications may not involve national security, information barrier techniques can still be used to protect information considered sensitive by individuals, commercial entities, or national organizations. Other potential areas of application include homeland security and airport screening, personal information disclosed by modern scanning techniques, nuclear information not considered classified but still sensitive, and industrial secretmore » information that could be compromised during 3rd party acceptance testing. Modern personnel screening devices are limited more by their potential for release of personal information than by technology. Screening systems that could be used in airports and other sensitive areas are often not utilized because the same system that can show the details of weapons carried on a person's body can also reveal potentially embarrassing and sensitive details of the body itself. Much other nuclear information, as well as industrially secret information, while not actually classified, is not appropriate for widespread dissemination. In both cases an inspector may need to verify elements of the manufacturer's or owner's claims, but at the same time not disclose sensitive information to either the inspector or the general public. Thus, information barrier technology, although originally developed for protection of nuclear weapons information, is also directly usable in a number of counter-terrorism and nonproliferation applications. Although these applications may not (or may) require the same level of rigor as the original application to classified items, many of the same techniques can be used in protecting this non-classified, but still sensitive, information.« less
78 FR 46578 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... , including any personal information provided. Sensitive personal information, such as account numbers or... to understand the impact of bundled products and services on the financial decision- making of... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No CFPB-2013-0024] Agency Information Collection...
78 FR 20900 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
....gov , including any personal information provided. Sensitive personal information, such as account... and empowerment programs, and practices that can improve financial decision-making skills and outcomes... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No. CFPB-2013-0007] Agency Information Collection...
ERIC Educational Resources Information Center
Fleming, Antoine
2017-01-01
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
Protecting Your Child's Personal Information at School
ERIC Educational Resources Information Center
Federal Trade Commission, 2012
2012-01-01
Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…
Examining Equity Sensitivity: An Investigation Using the Big Five and HEXACO Models of Personality.
Woodley, Hayden J R; Bourdage, Joshua S; Ogunfowora, Babatunde; Nguyen, Brenda
2015-01-01
The construct of equity sensitivity describes an individual's preference about his/her desired input to outcome ratio. Individuals high on equity sensitivity tend to be more input oriented, and are often called "Benevolents." Individuals low on equity sensitivity are more outcome oriented, and are described as "Entitleds." Given that equity sensitivity has often been described as a trait, the purpose of the present study was to examine major personality correlates of equity sensitivity, so as to inform both the nature of equity sensitivity, and the potential processes through which certain broad personality traits may relate to outcomes. We examined the personality correlates of equity sensitivity across three studies (total N = 1170), two personality models (i.e., the Big Five and HEXACO), the two most common measures of equity sensitivity (i.e., the Equity Preference Questionnaire and Equity Sensitivity Inventory), and using both self and peer reports of personality (in Study 3). Although results varied somewhat across samples, the personality variables of Conscientiousness and Honesty-Humility, followed by Agreeableness, were the most robust predictors of equity sensitivity. Individuals higher on these traits were more likely to be Benevolents, whereas those lower on these traits were more likely to be Entitleds. Although some associations between Extraversion, Openness, and Neuroticism and equity sensitivity were observed, these were generally not robust. Overall, it appears that there are several prominent personality variables underlying equity sensitivity, and that the addition of the HEXACO model's dimension of Honesty-Humility substantially contributes to our understanding of equity sensitivity.
Examining Equity Sensitivity: An Investigation Using the Big Five and HEXACO Models of Personality
Woodley, Hayden J. R.; Bourdage, Joshua S.; Ogunfowora, Babatunde; Nguyen, Brenda
2016-01-01
The construct of equity sensitivity describes an individual's preference about his/her desired input to outcome ratio. Individuals high on equity sensitivity tend to be more input oriented, and are often called “Benevolents.” Individuals low on equity sensitivity are more outcome oriented, and are described as “Entitleds.” Given that equity sensitivity has often been described as a trait, the purpose of the present study was to examine major personality correlates of equity sensitivity, so as to inform both the nature of equity sensitivity, and the potential processes through which certain broad personality traits may relate to outcomes. We examined the personality correlates of equity sensitivity across three studies (total N = 1170), two personality models (i.e., the Big Five and HEXACO), the two most common measures of equity sensitivity (i.e., the Equity Preference Questionnaire and Equity Sensitivity Inventory), and using both self and peer reports of personality (in Study 3). Although results varied somewhat across samples, the personality variables of Conscientiousness and Honesty-Humility, followed by Agreeableness, were the most robust predictors of equity sensitivity. Individuals higher on these traits were more likely to be Benevolents, whereas those lower on these traits were more likely to be Entitleds. Although some associations between Extraversion, Openness, and Neuroticism and equity sensitivity were observed, these were generally not robust. Overall, it appears that there are several prominent personality variables underlying equity sensitivity, and that the addition of the HEXACO model's dimension of Honesty-Humility substantially contributes to our understanding of equity sensitivity. PMID:26779102
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
49 CFR 15.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information under section 214 of the Homeland Security Act, any covered person who is a Federal employee in... Section 15.9 Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.9 Restrictions on the disclosure of SSI. (a) Duty to protect information. A covered person...
49 CFR 15.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information under section 214 of the Homeland Security Act, any covered person who is a Federal employee in... Section 15.9 Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.9 Restrictions on the disclosure of SSI. (a) Duty to protect information. A covered person...
77 FR 39222 - Consumer Use of Reverse Mortgages
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
... influence reverse mortgage consumers' decision-making, consumers' use of reverse mortgage loan proceeds.... Sensitive personal information such as account numbers or Social Security numbers should not be included... personal information that could be used to identify an individual consumer or account, nor should they...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
Slobodskaya, Helena R
2016-11-01
This study examined the contribution of reinforcement sensitivity to the hierarchical structure of child personality and common psychopathology in community samples of parent reports of children aged 2-18 (N = 968) and self-reports of adolescents aged 10-18 (N = 1,543) using the Inventory of Child Individual Differences-Short version (ICID-S), the Strengths and Difficulties Questionnaire (SDQ), and the Sensitivity to Punishment and Sensitivity to Reward Questionnaire (SPSRQ). A joint higher-order factor analysis of the ICID-S and SDQ scales suggested a 4-factor solution; congruence coefficients indicated replicability of the factors across the 2 samples at all levels of the personality-psychopathology hierarchy. The canonical correlation analyses indicated that reinforcement sensitivity and personality-psychopathology dimensions shared much of their variance. The main contribution of reinforcement sensitivity was through opposing effects of reward and punishment sensitivities. The superordinate factors Beta and Internalizing were best predicted by reinforcement sensitivity, followed by the Externalizing and Positive personality factors. These findings provide evidence for consistency of the hierarchical structure of personality and common psychopathology across informants and highlight the role of reinforcement systems in the development of normal and abnormal patterns of behavior and affect. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Kardamanidis, Katina; Kemp, Lynn; Schmied, Virginia
2009-08-01
The first Australian trial of sustained nurse home visiting provided an opportunity to explore nurses' understanding of the situations that support mothers of infants to disclose personal and sensitive psychosocial information. Using a qualitative descriptive design, semi-structured interviews were conducted and transcripts were analysed drawing upon aspects of Smith's interpretative phenomenological analysis. Five themes pertaining to the experience of relationship building to foster disclosure of sensitive information emerged: (1) building trust is an ongoing process of giving and giving in return, (2) being 'actively passive' to develop trust, (3) the client is in control of the trust-relationship, (4) the association between disclosure of sensitive issues and a trust-relationship, and (5) empowerment over disclosure. This study provides a deeper understanding of how child and family health nurses develop relationships that lead women to entrust the nurse with personal, sensitive information, and may inform the practice of psychosocial needs assessment in other contexts.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...
78 FR 7431 - Cbr Systems, Inc.; Analysis of Proposed Consent Order To Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... include any sensitive personal information, like anyone's Social Security number, date of birth, driver's... limited to, the following: name, address, email address, telephone number, date of birth, Social Security... collects personal information, such as fathers' Social Security numbers, and the company collects...
Anonymous indexing of health conditions for a similarity measure.
Song, Insu; Marsh, Nigel V
2012-07-01
A health social network is an online information service which facilitates information sharing between closely related members of a community with the same or a similar health condition. Over the years, many automated recommender systems have been developed for social networking in order to help users find their communities of interest. For health social networking, the ideal source of information for measuring similarities of patients is the medical information of the patients. However, it is not desirable that such sensitive and private information be shared over the Internet. This is also true for many other security sensitive domains. A new information-sharing scheme is developed where each patient is represented as a small number of (possibly disjoint) d-words (discriminant words) and the d-words are used to measure similarities between patients without revealing sensitive personal information. The d-words are simple words like "food,'' and thus do not contain identifiable personal information. This makes our method an effective one-way hashing of patient assessments for a similarity measure. The d-words can be easily shared on the Internet to find peers who might have similar health conditions.
32 CFR 154.6 - Standards for access to classified information or assignment to sensitive duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION... person's loyalty, reliability, and trustworthiness are such that entrusting the person with classified... reasonable basis for doubting the person's loyalty to the Government of the United States. ...
49 CFR 1520.11 - Persons with a need to know.
Code of Federal Regulations, 2010 CFR
2010-10-01
....11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.11 Persons with a need to know. (a) In general. A person has a need to...
Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints
ERIC Educational Resources Information Center
Pervaiz, Zahid
2013-01-01
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…
10 CFR 95.31 - Protective personnel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... equivalent) if the licensee, certificate holder, or other person possesses information classified... Information. (b) Possess a “Q” access authorization (or CSA equivalent) if the licensee, certificate holder... vulnerability information; and certain particularly sensitive Naval Nuclear Propulsion Program information (e.g...
10 CFR 95.31 - Protective personnel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... equivalent) if the licensee, certificate holder, or other person possesses information classified... Information. (b) Possess a “Q” access authorization (or CSA equivalent) if the licensee, certificate holder... vulnerability information; and certain particularly sensitive Naval Nuclear Propulsion Program information (e.g...
Trust-based information system architecture for personal wellness.
Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd
2014-01-01
Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.
Alerting device and method for reminding a person of a risk
Runyon, Larry [Richland, WA; Gunter, Wayne M [West Richland, WA; Pratt, Richard M [Richland, WA
2001-11-27
An alerting device and method to remind personnel of a risk is disclosed. The device has at least two sensors, a logic controller, a power source, and an annunciator that delivers a visual message, with or without an audible alarm, about a risk to a person when the sensors detect the person exiting a predetermined space. In particular, the present invention reminds a person of a security, safety, or health risk upon exiting a predetermined space. More particularly, the present invention reminds a person of an information security risk relating to sensitive, proprietary, confidential, trade secret, classified, or intellectual property information.
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... reports; or (B) Blind data, such as payment history on accounts that are not personally identifiable, that... technology, the sensitivity of your customer information, internal or external threats to information, and... Information Technology Examination Handbook, Information Security Booklet, Dec. 2002 available at http://www...
78 FR 70046 - Agency Information Collection Activities; Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-22
... Gans, Attorney, Division of Marketing Practices, Bureau of Consumer Protection, Federal Trade... that your comment does not include any sensitive personal information, such as anyone's Social Security...
78 FR 44930 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
.... Sensitive personal information, such as account numbers or social security numbers, should not be included... of receiving marketing materials and credit or insurance offers, that their credit report was used in...
Data Security Policy | High-Performance Computing | NREL
to use its high-performance computing (HPC) systems. NREL HPC systems are operated as research systems and may only contain data related to scientific research. These systems are categorized as low per sensitive or non-sensitive. One example of sensitive data would be personally identifiable information (PII
76 FR 79275 - Truth in Savings (Regulation DD)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... disclosure. Sensitive personal information, such as account numbers or social security numbers, should not be... improved, and consumers' ability to make informed decisions regarding deposit accounts would be... regulations, while making information on the other regulations available. The Bureau expects to conduct...
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Compartmented Intelligence Information will be controlled by the Assistant to the Vice President for National... procedures and insure accountability. (i) Loss or compromise. Any person who has knowledge of loss of... required for release of Sensitive Compartmented Intelligence Information. The names of personnel cleared...
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Compartmented Intelligence Information will be controlled by the Assistant to the Vice President for National... procedures and insure accountability. (i) Loss or compromise. Any person who has knowledge of loss of... required for release of Sensitive Compartmented Intelligence Information. The names of personnel cleared...
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Compartmented Intelligence Information will be controlled by the Assistant to the Vice President for National... procedures and insure accountability. (i) Loss or compromise. Any person who has knowledge of loss of... required for release of Sensitive Compartmented Intelligence Information. The names of personnel cleared...
49 CFR 15.11 - Persons with a need to know.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...
49 CFR 15.11 - Persons with a need to know.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-30
... viewing on http://www.regulations.gov without change. All Personal Identifying Information (for example... Confidential Business Information or otherwise sensitive or protected information. NMFS will accept anonymous... burden-hour estimates or other aspects of the collection-of-information requirements contained in this...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
... unless it displays a currently valid OMB control number. No person shall be subject to any penalty for... against public disclosure of proprietary and commercially sensitive information. Such information is... stringent protection of information deemed ``highly confidential.'' As opposed to the confidential data...
Sensitizing Effects of Pretreatment Measures on Cancer Chemotherapy Nausea and Vomiting.
ERIC Educational Resources Information Center
Gard, Diane; And Others
1988-01-01
Explored sensitizing effects of pretreatment assessment on posttreatment chemotherapy nausea and vomiting and interactive effects of personal dispositions for information seeking. Oncology patients rated side effects experienced previously (experimental condition), or parking conditions (control). Posttreatment, nausea of experimentals was…
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
75 FR 12119 - Finding And Recapturing Improper Payments
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-15
... contractors or other entities whereby highly skilled accounting specialists and fraud examiners use state-of... require the disclosure of classified information, law enforcement sensitive information, or other..., employees, or agents, or any other person. [[Page 12120
Patients want granular privacy control over health information in electronic medical records.
Caine, Kelly; Hanania, Rima
2013-01-01
To assess patients' desire for granular level privacy control over which personal health information should be shared, with whom, and for what purpose; and whether these preferences vary based on sensitivity of health information. A card task for matching health information with providers, questionnaire, and interview with 30 patients whose health information is stored in an electronic medical record system. Most patients' records contained sensitive health information. No patients reported that they would prefer to share all information stored in an electronic medical record (EMR) with all potential recipients. Sharing preferences varied by type of information (EMR data element) and recipient (eg, primary care provider), and overall sharing preferences varied by participant. Patients with and without sensitive records preferred less sharing of sensitive versus less-sensitive information. Patients expressed sharing preferences consistent with a desire for granular privacy control over which health information should be shared with whom and expressed differences in sharing preferences for sensitive versus less-sensitive EMR data. The pattern of results may be used by designers to generate privacy-preserving EMR systems including interfaces for patients to express privacy and sharing preferences. To maintain the level of privacy afforded by medical records and to achieve alignment with patients' preferences, patients should have granular privacy control over information contained in their EMR.
38 CFR 75.111 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) INFORMATION SECURITY MATTERS Data Breaches § 75.111 Purpose and scope. This subpart implements provisions of... Information Technology Act of 2006. It only concerns actions to address a data breach regarding sensitive personal information that is processed or maintained by VA. This subpart does not supersede the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... for making sure that your comment does not include any sensitive personal information, such as Social....; Polypore International, Inc.; Mylan, Inc., et al.; Actavis, Inc., et al.; Agency Information Collection... specified in the SUPPLEMENTARY INFORMATION section below. [[Page 65650
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... positive financial decision-making among young consumers. We also seek information to develop a clearer... the most important factors? (c) What type of information is helpful in making that decision? (d) How... record and subject to public disclosure. Sensitive personal information, such as account numbers or...
Young Children’s Sensitivity to Their Own Ignorance in Informing Others
Kim, Sunae; Paulus, Markus; Sodian, Beate; Proust, Joelle
2016-01-01
Prior research suggests that young children selectively inform others depending on others’ knowledge states. Yet, little is known whether children selectively inform others depending on their own knowledge states. To explore this issue, we manipulated 3- to 4-year-old children’s knowledge about the content of a box and assessed the impact on their decisions to inform another person. Moreover, we assessed the presence of uncertainty gestures while they inform another person in light of the suggestions that children's gestures reflect early developing, perhaps transient, epistemic sensitivity. Finally, we compared children’s performance in the informing context to their explicit verbal judgment of their knowledge states to further confirm the existence of a performance gap between the two tasks. In their decisions to inform, children tend to accurately assess their ignorance, whereas they tend to overestimate their own knowledge states when asked to explicitly report them. Moreover, children display different levels of uncertainty gestures depending on the varying degrees of their informational access. These findings suggest that children’s implicit awareness of their own ignorance may be facilitated in a social, communicative context. PMID:27023683
Mazerolle, Erin L; Wojtowicz, Magdalena A; Omisade, Antonina; Fisk, John D
2013-01-01
Slowed information processing speed is commonly reported in persons with multiple sclerosis (MS), and is typically investigated using clinical neuropsychological tests, which provide sensitive indices of mean-level information processing speed. However, recent studies have demonstrated that within-person variability or intra-individual variability (IIV) in information processing speed may be a more sensitive indicator of neurologic status than mean-level performance on clinical tests. We evaluated the neural basis of increased IIV in mildly affected relapsing-remitting MS patients by characterizing the relation between IIV (controlling for mean-level performance) and white matter integrity using diffusion tensor imaging (DTI). Twenty women with relapsing-remitting MS and 20 matched control participants completed the Computerized Test of Information Processing (CTIP), from which both mean response time and IIV were calculated. Other clinical measures of information processing speed were also collected. Relations between IIV on the CTIP and DTI metrics of white matter microstructure were evaluated using tract-based spatial statistics. We observed slower and more variable responses on the CTIP in MS patients relative to controls. Significant relations between white matter microstructure and IIV were observed for MS patients. Increased IIV was associated with reduced integrity in more white matter tracts than was slowed information processing speed as measured by either mean CTIP response time or other neuropsychological test scores. Thus, despite the common use of mean-level performance as an index of cognitive dysfunction in MS, IIV may be more sensitive to the overall burden of white matter disease at the microstructural level. Furthermore, our study highlights the potential value of considering within-person fluctuations, in addition to mean-level performance, for uncovering brain-behavior relationships in neurologic disorders with widespread white matter pathology.
Confidentiality and Student Records: Ten Ways to Invite Legal Challenges
ERIC Educational Resources Information Center
Essex, Nathan L.
2004-01-01
Confidentiality of student educational records is a serious issue. Disclosure of sensitive information in a student's personal file without prior written consent can be legally troublesome, especially when information is transmitted to others who have no legitimate educational interest in the student. Damaging information disclosed to a third…
Roberts, Laura Weiss; Geppert, Cynthia M A; Warner, Teddy D; Green Hammond, Katherine A; Rogers, Melinda; Smrcka, Julienne; Roberts, Brian B
2005-04-01
The societal use of genetic information raises ethical concerns, and the views of working persons regarding genetic information have received little attention. We performed an empirical project to characterize perspectives of 63 employees at two sites who expressed strong interest in learning about and protecting their personal genetic information. Genetic data were seen as more sensitive than other health data, and disclosure of genetic susceptibility was perceived as having negative consequences. This study suggests the value of exploring the perspectives of key stakeholders most directly affected by genetic applications across diverse societal settings.
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Zhu, Hui; Gao, Lijuan; Li, Hui
2016-02-01
With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
Zhu, Hui; Gao, Lijuan; Li, Hui
2016-01-01
With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319
1999-11-17
classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically... Internet communications. The Chief Information Officer (CIO) must provide authorization for this monitoring. 10. Inappropriate personal use of the
Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
75 FR 71704 - Agency Information Collection Activities; Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... for decisions, and follow-up), recordkeeping, and annual audits. The Rule requires that IDSMs... not include any sensitive personal information, such as any individual's Social Security number, date..., staff has adjusted its previous estimates based on the following two factors. First, the annual audits...
49 CFR 15.15 - SSI disclosed by DOT.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.15 SSI... Freedom of Information Act (5 U.S.C. 552), the Privacy Act (5 U.S.C. 552a), and other laws, records... persons without a need to know. (b) Disclosure under the Freedom of Information Act and the Privacy Act...
49 CFR 15.15 - SSI disclosed by DOT.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.15 SSI... Freedom of Information Act (5 U.S.C. 552), the Privacy Act (5 U.S.C. 552a), and other laws, records... persons without a need to know. (b) Disclosure under the Freedom of Information Act and the Privacy Act...
Code of Federal Regulations, 2014 CFR
2014-10-01
... this provision: Computer software, litigation information, litigation support, sensitive information, and technical data, are defined in the clause at DFARS 252.204-7014, Limitations on the Use or... Offeror, and against any person to whom the Offeror has released or disclosed such data or software, for...
Code of Federal Regulations, 2010 CFR
2010-07-01
... PROGRAM REGULATION Adjudication § 154.40 General. (a) The standard which must be met for clearance or assignment to sensitive duties is that, based on all available information, the person's loyalty, reliability...
Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.
Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R
2016-05-09
Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making. Copyright © 2016 Elsevier Ltd. All rights reserved.
Exploring the concepts of privacy and the sharing of sensitive health information.
Asiri, Eman; Asiri, Hanan; Househ, Mowafa
2014-01-01
People are increasingly sharing their personal information on social networks such as Facebook. Patients, in particular, join online support groups for specific conditions to get support and share their experience with other members of a social media group. Throughout this process, sensitive health information could be shared by group members as a part of this information exchange and privacy concerns can arise as a result. The purpose of this study is to explore various aspects relating to privacy and the sharing of sensitive health information through social media platforms. Our review found that social media such as Facebook already plays a large role in patients' lives as it helps patients to understand their health conditions and gain support from other people who suffer from the same condition. However, there are major concerns for those patients as their privacy and confidentiality can be harmed by improper use of their posted sensitive health information by governments, hospitals or individuals. More importantly, there is an increased need for laws and legislations that protect and empower patients. We recommend that healthcare organizations collaborate with social media software companies and create educational and awareness campaigns on the impacts of sharing sensitive health information through social media.
Aaron R. Turner
2017-12-09
An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aaron R. Turner
An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur
49 CFR 15.19 - Destruction of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...
49 CFR 15.19 - Destruction of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...
49 CFR 1520.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.9 Restrictions on the disclosure of SSI. (a) Duty to... infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
... established sales and marketing network in the United States that will allow it to be immediately competitive... making sure that your comment does not include any sensitive personal information, like anyone's Social... information such as costs, sales statistics, inventories, formulas, patterns, devices, manufacturing processes...
Report #16-P-0254, August 1, 2016. CSB has one system that contains sensitive PII. Safeguarding such information in the possession of the government and preventing its breach is essential to ensuring CSB retains the trust of the American public.
Perspectives on access to personal health information in New Zealand/Aotearoa.
Menkes, David B; Hill, Charlotte J; Horsfall, Melissa; Jaye, Chrystal
2008-12-01
This study used group interviews to explore Māori and European New Zealander (Pakeha) perspectives on access to personal health information. Two predominant themes emerged: the tension between the individual and society, and differences inherent in the use of formal and informal moral codes. Māori and Pakeha differed in their concept of autonomy and relied on distinct moral codes when considering questions of access; Western values and moral codes were notably less relevant to Māori who described distinct, collectivist means of ensuring social care of the sick and dying. Pakeha but not Māori participants often used hypothetical situations to reach an abstract determination of 'who should know'; the latter instead used personal experience to decide case-by-case. Generational differences were also evident, particularly in the Māori groups. In conclusion, culture should be considered in access to personal health information in New Zealand. Similar cultural variation is likely to be found in other countries; recognition of such differences will help ensure that access to sensitive information is appropriate, inclusive, and ethical.
Politic of Security, Privacy and Transparency in Human Learning Systems
ERIC Educational Resources Information Center
Jeghal, Adil; Oughdir, Lahcen; Tairi, Hamid
2016-01-01
The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect…
Shared function knowledge: infants' attention to function information in communicative contexts.
Träuble, Birgit; Bätz, Johannes
2014-08-01
Humans are specifically adapted to knowledge acquisition and transfer by social communication. According to natural pedagogy theory, infants are highly sensitive to signals that indicate a teacher's communicative intention and are biased to interpret communicative contexts as conveying relevant and generalizable knowledge that is also shared by other conspecifics. We investigated whether infants as young as 12 months interpret ostensively communicated object-directed emotion expressions as generalizable and shareable with others. Given that young infants pay particular attention to information about objects' functions, we were interested in whether the shareability assumption also holds for emotional attitudes toward functional features of unfamiliar objects. The results suggest that 12-month-olds (N=80) flexibly interpret another person's emotion displays toward unfamiliar artifacts either as object-centered and generalizable attitudes or as person-centered subjective attitudes, depending on the communicative characteristics of the learning context. Furthermore, the transfer of ostensively communicated information about the artifacts depended on their functional usability, which is consistent with infants' early sensitivity to function information in various areas of cognitive development. Copyright © 2014 Elsevier Inc. All rights reserved.
An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives
Neri, Emilio; Jonker, Elizabeth
2007-01-01
Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386
Mintu-Wimsatt, Alma; Madjourova-Davri, Anna; Lozada, Héctor R
2008-02-01
Equity sensitivity concerns perceptions of what is or is not equitable. Previous studies have shown that equity sensitivity is associated with one's relationship orientation. Relationships are also influenced by personality variables. As both personality and equity sensitivity influence relationships, equity sensitivity and personality may be correlated also; so, this study examined that possibility. The relations of equity sensitivity with 3 personality variables were explored across three culturally different samples. This allowed validation across cultures of the proposed equity-personality relationship which has traditionally been assessed in a U.S. setting. In general, personality-equity sensitivity relationship was not supported across the samples.
Scalable Iterative Classification for Sanitizing Large-Scale Datasets
Li, Bo; Vorobeychik, Yevgeniy; Li, Muqun; Malin, Bradley
2017-01-01
Cheap ubiquitous computing enables the collection of massive amounts of personal data in a wide variety of domains. Many organizations aim to share such data while obscuring features that could disclose personally identifiable information. Much of this data exhibits weak structure (e.g., text), such that machine learning approaches have been developed to detect and remove identifiers from it. While learning is never perfect, and relying on such approaches to sanitize data can leak sensitive information, a small risk is often acceptable. Our goal is to balance the value of published data and the risk of an adversary discovering leaked identifiers. We model data sanitization as a game between 1) a publisher who chooses a set of classifiers to apply to data and publishes only instances predicted as non-sensitive and 2) an attacker who combines machine learning and manual inspection to uncover leaked identifying information. We introduce a fast iterative greedy algorithm for the publisher that ensures a low utility for a resource-limited adversary. Moreover, using five text data sets we illustrate that our algorithm leaves virtually no automatically identifiable sensitive instances for a state-of-the-art learning algorithm, while sharing over 93% of the original data, and completes after at most 5 iterations. PMID:28943741
Dynamic Displays Enhance the Ability to Discriminate Genuine and Posed Facial Expressions of Emotion
Namba, Shushi; Kabir, Russell S.; Miyatani, Makoto; Nakao, Takashi
2018-01-01
Accurately gauging the emotional experience of another person is important for navigating interpersonal interactions. This study investigated whether perceivers are capable of distinguishing between unintentionally expressed (genuine) and intentionally manipulated (posed) facial expressions attributed to four major emotions: amusement, disgust, sadness, and surprise. Sensitivity to this discrimination was explored by comparing unstaged dynamic and static facial stimuli and analyzing the results with signal detection theory. Participants indicated whether facial stimuli presented on a screen depicted a person showing a given emotion and whether that person was feeling a given emotion. The results showed that genuine displays were evaluated more as felt expressions than posed displays for all target emotions presented. In addition, sensitivity to the perception of emotional experience, or discriminability, was enhanced in dynamic facial displays, but was less pronounced in the case of static displays. This finding indicates that dynamic information in facial displays contributes to the ability to accurately infer the emotional experiences of another person. PMID:29896135
Privacy-preserving record linkage on large real world datasets.
Randall, Sean M; Ferrante, Anna M; Boyd, James H; Bauer, Jacqueline K; Semmens, James B
2014-08-01
Record linkage typically involves the use of dedicated linkage units who are supplied with personally identifying information to determine individuals from within and across datasets. The personally identifying information supplied to linkage units is separated from clinical information prior to release by data custodians. While this substantially reduces the risk of disclosure of sensitive information, some residual risks still exist and remain a concern for some custodians. In this paper we trial a method of record linkage which reduces privacy risk still further on large real world administrative data. The method uses encrypted personal identifying information (bloom filters) in a probability-based linkage framework. The privacy preserving linkage method was tested on ten years of New South Wales (NSW) and Western Australian (WA) hospital admissions data, comprising in total over 26 million records. No difference in linkage quality was found when the results were compared to traditional probabilistic methods using full unencrypted personal identifiers. This presents as a possible means of reducing privacy risks related to record linkage in population level research studies. It is hoped that through adaptations of this method or similar privacy preserving methods, risks related to information disclosure can be reduced so that the benefits of linked research taking place can be fully realised. Copyright © 2013 Elsevier Inc. All rights reserved.
Syn, Sue Yeon; Kim, Sung Un
2016-07-01
College students tend to lack access to health information. Because social networking sites (SNSs) are popularly adopted by college students, SNSs are considered to be good media channels for college students to obtain health-related information. This study examines the factors that influence college students' health information-seeking and -sharing activities on Facebook. An online survey was distributed to college students between the ages of 18 and 29 to determine intentions pertaining to health information activities according to the factors identified for the study. The factors included both contextual factors (such as health topic sensitivity and health information sources) as well as user factors (such as demographics). Our findings showed that college students are willing to read and post health-related information on Facebook when the health topic is not sensitive. In addition, there are clear differences in preferences between professional sources and personal sources as health information sources. It was found that most user factors, except gender, have no influence on health information activities. The impacts of SNS contexts, awareness of information sources, types of interlocutors, and privacy concerns are further discussed.
75 FR 68849 - Privacy Act of 1974: System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... processing of personal information is conducted within established FAA computer security regulations. A risk... SECURITY CLASSIFICATION: Sensitive, unclassified SYSTEM LOCATION: Federal Aviation Administration (FAA... Enforcement Centers of the Drug Abatement Division; Office of Security and Hazardous Materials; Flight...
NASA Astrophysics Data System (ADS)
Bulander, Rebecca; Decker, Michael; Schiefer, Gunther; Kölmel, Bernhard
Mobile terminals like cellular phones and PDAs are a promising target platform for mobile advertising: The devices are widely spread, are able to present interactive multimedia content and offer as almost permanently carried along personal communication devices a high degree of reachability. But particular because of the latter feature it is important to pay great attention to privacy aspects and avoidance of spam-messages when designing an application for mobile advertising. Furthermore the limited user interface of mobile devices is a special challenge. The following article describes the solution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.
77 FR 65048 - Privacy Act; System of Records: Personal Property Claims, State-27
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... cyber security awareness training which covers the procedures for handling Sensitive but Unclassified... Property Claims. SECURITY CLASSIFICATION: Unclassified. SYSTEM LOCATION: Department of State, SA-3, Suite... which can include information such as names, birthdates, social security numbers (SSNs), employee IDs...
75 FR 44216 - Cybersecurity, Innovation and the Internet Economy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-28
..., intellectual property, business advocacy and export control. This Notice of Inquiry is one in a series of... proprietary and sensitive business, transactional, and personal data. At the same time that businesses and... area include research and training, threat reporting and analysis, information collection and...
Connected vehicle pilot deployment program phase 2 : data privacy plan – New York City.
DOT National Transportation Integrated Search
2016-12-27
This document represents a data privacy plan for ensuring the data privacy and security of those participating in the New York City connected vehicle pilot. Personally Identifiable Information (PII) and Sensitive PII (SPII) will be collected from var...
Griffin, Dale W; Harris, Peter R
2011-05-01
Self-affirmation, reflecting on one's defining personal values, increases acceptance of threatening information, but does it do so at the cost of inducing undue alarm in people at low risk of harm? We contrast an alarm model, wherein self-affirmation simply increases response to threat, with a calibration model, wherein self-affirmation increases sensitivity to the self-relevance of health-risk information. Female seafood consumers (N = 165) completed a values self-affirmation or control task before reading a U.S. Food and Drug Administration brochure on mercury in seafood. Findings support the calibration model: Among frequent seafood consumers, self-affirmation generally increased concern (reports of depth of thought, personal message relevance, perceived risk, and negative affect) for those high in defensiveness and reduced it for those low in defensiveness. Among infrequent consumers of seafood, self-affirmation typically reduced concern. Thus, self-affirmation increased the sensitivity with which women at different levels of risk, and at different levels of defensiveness, responded cognitively and affectively to the materials.
Aylagas-Crespillo, Marina; García-Barbero, Óscar; Rodríguez-Martín, Beatriz
2017-11-01
To explore the barriers to requesting social and healthcare assistance perceived by transgender persons and professionals involved in the assistance. A meta-study, qualitative systematic review, of studies published in English or Spanish, exploring the barriers, perceived by transgender persons and social and healthcare professionals, that transgender persons have when they seek social and healthcare assistance was carried out in the following databases Medline (PubMed), Scopus, Web of Science, Spanish National Research Council, CUIDEN, ProQuest, PsycINFO and CINAHL. Two thousand two hundred and sixty-one articles were found in the databases searched. Seven articles met all inclusion criteria and were included in this review. The professionals highlight the uncertainty when treating transgender persons and their lack of training. Transgender persons highlight the lack of information and the sense of helplessness it creates. Perceptions of transphobia, the fragmentation of services, administrative barriers, the lack of cultural sensitivity and professional training are also considered barriers to assistance. The findings of this study provide key information for the design of plans and programmes to improve the quality of social and health care for transgender persons. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.
Elucidating the relationship between noise sensitivity and personality.
Shepherd, Daniel; Heinonen-Guzejev, Marja; Hautus, Michael J; Heikkilä, Kauko
2015-01-01
Sensitivity to unwanted sounds is common in general and clinical populations. Noise sensitivity refers to physiological and psychological internal states of an individual that increase the degree of reactivity to noise in general. The current study investigated the relationship between the Big Five personality dimensions and noise sensitivity using the 240-item NEO Personality Inventory (NEO-PI) and 35-item The Noise-Sensitivity-Questionnaire (NoiSeQ) scales, respectively. Overall, the Big Five accounted for 33% of the variance in noise sensitivity, with the Introversion-Extroversion dimension explaining the most variability. Furthermore, the Big Five personality dimensions (neuroticism, extroversion, openness, agreeableness, and conscientiousness) had an independent effect on noise sensitivity, which were linear. However, additional analyses indicated that the influence of gender and age must be considered when examining the relationship between personality and noise sensitivity. The findings caution against pooling data across genders, not controlling for age, and using personality dimensions in isolation.
Elucidating the relationship between noise sensitivity and personality
Shepherd, Daniel; Heinonen-Guzejev, Marja; Hautus, Michael J.; Heikkilä, Kauko
2015-01-01
Sensitivity to unwanted sounds is common in general and clinical populations. Noise sensitivity refers to physiological and psychological internal states of an individual that increase the degree of reactivity to noise in general. The current study investigated the relationship between the Big Five personality dimensions and noise sensitivity using the 240-item NEO Personality Inventory (NEO-PI) and 35-item The Noise-Sensitivity-Questionnaire (NoiSeQ) scales, respectively. Overall, the Big Five accounted for 33% of the variance in noise sensitivity, with the Introversion-Extroversion dimension explaining the most variability. Furthermore, the Big Five personality dimensions (neuroticism, extroversion, openness, agreeableness, and conscientiousness) had an independent effect on noise sensitivity, which were linear. However, additional analyses indicated that the influence of gender and age must be considered when examining the relationship between personality and noise sensitivity. The findings caution against pooling data across genders, not controlling for age, and using personality dimensions in isolation. PMID:25913556
2016-02-01
other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a ...Based Nursing (KBN) innovation, a customized design featuring actionable EB recommendations embedded into policy and the content and CDS tools in the...will have a positive effect on nursing knowledge, use of evidence-based practices, and the achievement of nurse-sensitive patient outcomes at
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
Social and attentional aspects of echolalia in highly echolalic mentally retarded persons.
Campbell, B; Grieve, R
1978-01-01
Echolalia was examined in a sample of highly echolalic mentally retarded individuals. When presented with a standard set of questions, under conditions differing in appropriateness for exchange of discourse (e.g., questions presented with examiner and patient face-to-face vs. questions presented with the examiner's face averted vs. questions addressed towards another person sitting silently beside the patient), subjects' frequency of echolalia varied. Besides showing considerable sensitivity to aspects of discourse exchange, subjects exhibited some limited capacity for processing linguistic information.
ERIC Educational Resources Information Center
Piazza, Roberta
2013-01-01
In Italy, accreditation of prior learning is a sensitive issue. Despite the lack of laws or qualification frameworks regulating the recognition of non-formal and informal learning, most Italian universities proceed with caution, allowing only a restricted number of credits in the university curriculum related to practical activities or to external…
Communication security in open health care networks.
Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R
1999-01-01
Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.
The moderating effect of motivation on health-related decision-making.
Berezowska, Aleksandra; Fischer, Arnout R H; Trijp, Hans C M van
2017-06-01
This study identifies how autonomous and controlled motivation moderates the cognitive process that drives the adoption of personalised nutrition services. The cognitive process comprises perceptions of privacy risk, personalisation benefit, and their determinants. Depending on their level of autonomous and controlled motivation, participants (N = 3453) were assigned to one of four motivational orientations, which resulted in a 2 (low/high autonomous motivation) × 2 (low/high controlled motivation) quasi-experimental design. High levels of autonomous motivation strengthened the extent to which: (1) the benefits of engaging with a service determined the outcome of a risk-benefit trade-off; (2) the effectiveness of a service determined benefit perceptions. High levels of controlled motivation influenced the extent to which: (1) the risk of privacy loss determined the outcome of a risk-benefit trade-off; (2) controlling personal information after disclosure and perceiving the disclosed personal information as sensitive determined the risk of potential privacy loss. To encourage the adoption of personalised dietary recommendations, for individuals with high levels of autonomous motivation emphasis should be on benefits and its determinants. For those with high levels of controlled motivation, it is important to focus on risk-related issues such as information sensitivity.
Perceptual and Subliminal Communication: A Business Teacher's Dream.
ERIC Educational Resources Information Center
Gratz, Elizabeth W.; Gratz, J. E.
1983-01-01
Aims to increase awareness of and sensitivity to perceptual and subliminal communication by focusing on selected applications of them in present day society. The basic theories are (1) communication is used to try to change a person's behavior and (2) it is being used primarily for deception rather than information. (JOW)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-23
... . Persons who use a telecommunications device for the deaf (TDD) may call the Federal Information Relay... portions of five highly urbanized southern California counties: San Diego, Riverside, San Bernardino... Concern (ACEC), sensitive species and other wildlife habitat, lands with wilderness characteristics...
Comparison of visual sensitivity to human and object motion in autism spectrum disorder.
Kaiser, Martha D; Delmolino, Lara; Tanaka, James W; Shiffrar, Maggie
2010-08-01
Successful social behavior requires the accurate detection of other people's movements. Consistent with this, typical observers demonstrate enhanced visual sensitivity to human movement relative to equally complex, nonhuman movement [e.g., Pinto & Shiffrar, 2009]. A psychophysical study investigated visual sensitivity to human motion relative to object motion in observers with autism spectrum disorder (ASD). Participants viewed point-light depictions of a moving person and, for comparison, a moving tractor and discriminated between coherent and scrambled versions of these stimuli in unmasked and masked displays. There were three groups of participants: young adults with ASD, typically developing young adults, and typically developing children. Across masking conditions, typical observers showed enhanced visual sensitivity to human movement while observers in the ASD group did not. Because the human body is an inherently social stimulus, this result is consistent with social brain theories [e.g., Pelphrey & Carter, 2008; Schultz, 2005] and suggests that the visual systems of individuals with ASD may not be tuned for the detection of socially relevant information such as the presence of another person. Reduced visual sensitivity to human movements could compromise important social behaviors including, for example, gesture comprehension.
Braem, Maya; Asher, Lucy; Furrer, Sibylle; Lechner, Isabel; Würbel, Hanno; Melotti, Luca
2017-01-01
In humans, the personality dimension 'sensory processing sensitivity (SPS)', also referred to as "high sensitivity", involves deeper processing of sensory information, which can be associated with physiological and behavioral overarousal. However, it has not been studied up to now whether this dimension also exists in other species. SPS can influence how people perceive the environment and how this affects them, thus a similar dimension in animals would be highly relevant with respect to animal welfare. We therefore explored whether SPS translates to dogs, one of the primary model species in personality research. A 32-item questionnaire to assess the "highly sensitive dog score" (HSD-s) was developed based on the "highly sensitive person" (HSP) questionnaire. A large-scale, international online survey was conducted, including the HSD questionnaire, as well as questions on fearfulness, neuroticism, "demographic" (e.g. dog sex, age, weight; age at adoption, etc.) and "human" factors (e.g. owner age, sex, profession, communication style, etc.), and the HSP questionnaire. Data were analyzed using linear mixed effect models with forward stepwise selection to test prediction of HSD-s by the above-mentioned factors, with country of residence and dog breed treated as random effects. A total of 3647 questionnaires were fully completed. HSD-, fearfulness, neuroticism and HSP-scores showed good internal consistencies, and HSD-s only moderately correlated with fearfulness and neuroticism scores, paralleling previous findings in humans. Intra- (N = 447) and inter-rater (N = 120) reliabilities were good. Demographic and human factors, including HSP score, explained only a small amount of the variance of HSD-s. A PCA analysis identified three subtraits of SPS, comparable to human findings. Overall, the measured personality dimension in dogs showed good internal consistency, partial independence from fearfulness and neuroticism, and good intra- and inter-rater reliability, indicating good construct validity of the HSD questionnaire. Human and demographic factors only marginally affected the HSD-s suggesting that, as hypothesized for human SPS, a genetic basis may underlie this dimension within the dog species.
Web-browser encryption of personal health information
2011-01-01
Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940
Hölzel, Lars P; Ries, Zivile; Zill, Jördis M; Kriston, Levente; Dirmaier, Jörg; Härter, Martin; Bermejo, Isaac
2014-07-04
Many of the approximately 15 million people with a migration background living in Germany (19% of the population) are inadequately reached by existing healthcare provision. In the literature, the necessity for cultural adaptation of information material for patients with a migration background is often cited as a measure for improving healthcare.In this study, culturally sensitive information material will be developed and evaluated for patients with a migration background and depression or chronic low back pain. In this respect, it will be examined whether culturally sensitive information material is judged as more useful by the patients than standard translated patient information without cultural adaptation. The implementation and evaluation of culturally sensitive patient information material will occur in the framework of a double-blind randomized controlled parallel-group study in four study centres in Germany. Primary care patients with a Turkish, Polish, Russian or Italian migration background with a diagnosis of depressive disorder or chronic low back pain will be included and randomly allocated to the intervention group or the control group. In the intervention group, culturally sensitive patient information will be handed to the patient at the end of the physician consultation, while in the control group, standard translated patient information material will be provided. The patients will be surveyed by means of questionnaires following the consultation as well as after 8 weeks and 6 months. In addition to the primary outcome (subjective usefulness), several patient- and physician-rated secondary outcomes will be considered. The study will provide an empirical answer to the question of whether persons with a migration background perceive culturally sensitive patient information material as more useful than translated information material without cultural adaptation. Deutsches Register Klinischer Studien (DRKS-ID) DRKS00004241 and Universal Trial Number (UTN) U1111-1135-8043.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-11
... that your comment does not include any sensitive personal information, like anyone's Social Security... heightened security screening. As a result, we encourage you to submit your comments online. To make sure... Flashlight App'') to consumers for use on their Android mobile devices. The Brightest Flashlight App...
77 FR 66841 - The Sherwin-Williams Company; Analysis of Proposed Consent Order To Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... include any sensitive personal information, like anyone's Social Security number, date of birth, driver's... make final the agreement's proposed order. This matter involves Sherwin-Williams's marketing and sale... and practices in the future. Part I addresses the marketing of zero VOC paints. It prohibits Sherwin...
78 FR 46950 - Ecobaby Organics, Inc.; Analysis of Proposed Consent Order To Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... any sensitive personal information, like anyone's Social Security number, date of birth, driver's... or make final the agreement's proposed order. This matter involves respondent's marketing and sale of... respondent from engaging in similar acts and practices in the future. Part I addresses the marketing of VOC...
How Victim Sensitivity leads to Uncooperative Behavior via Expectancies of Injustice
Maltese, Simona; Baumert, Anna; Schmitt, Manfred J.; MacLeod, Colin
2016-01-01
According to the Sensitivity-to-mean-intentions model, dispositional victim sensitivity involves a suspicious mindset that is activated by situational cues and guides subsequent information processing and behavior like a schema. Study 1 tested whether victim-sensitive persons are more prone to form expectancies of injustice in ambiguous situations and whether these expectancies mediate the relationship between victim sensitivity and cooperation behavior in a trust game. Results show an indirect effect of victim sensitivity on cooperation after unfair treatment (vs. control condition), mediated by expectancies of injustice. In Study 2 we directly manipulated the tendency to form expectancies of injustice in ambiguous situations to test for causality. Results confirmed that the readiness to expect unjust outcomes led to lower cooperation, compared to a control condition. These findings provide direct evidence that expectancy tendencies are implicated in elevated victim sensitivity and are of theoretical and practical relevance. PMID:26793163
Tölle, R
2013-03-01
n his famous 1918 book „The sensitive relative delusion” Ernst Kretschmer not only described this specific delusional disorder but also the underlying sensitive personality disorder. Until now, relatively little attention has been paid to this part of his work. The incomplete reception is outlined, followed by a description of the symptoms, psychodynamics and course of sensitive personality disorder. The interpretation of "Anton Reiser: a psychological novel" - the autobiographical work by Karl Philipp Moritz in 1785 – is used as an example since it describes Anton Reiser as a sensitive personality.
Theranostic barcoded nanoparticles for personalized cancer medicine
Yaari, Zvi; da Silva, Dana; Zinger, Assaf; Goldman, Evgeniya; Kajal, Ashima; Tshuva, Rafi; Barak, Efrat; Dahan, Nitsan; Hershkovitz, Dov; Goldfeder, Mor; Roitman, Janna Shainsky; Schroeder, Avi
2016-01-01
Personalized medicine promises to revolutionize cancer therapy by matching the most effective treatment to the individual patient. Using a nanoparticle-based system, we predict the therapeutic potency of anticancer medicines in a personalized manner. We carry out the diagnostic stage through a multidrug screen performed inside the tumour, extracting drug activity information with single cell sensitivity. By using 100 nm liposomes, loaded with various cancer drugs and corresponding synthetic DNA barcodes, we find a correlation between the cell viability and the drug it was exposed to, according to the matching barcodes. Based on this screen, we devise a treatment protocol for mice bearing triple-negative breast-cancer tumours, and its results confirm the diagnostic prediction. We show that the use of nanotechnology in cancer care is effective for generating personalized treatment protocols. PMID:27830705
Geographic Data as Personal Data in Four EU Member States
NASA Astrophysics Data System (ADS)
de Jong, A. J.; van Loenen, B.; Zevenbergen, J. A.
2016-06-01
The EU Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data aims at harmonising data protection legislation in the European Union. This should promote the free flow of products and services within the EU. This research found a wide variety of interpretations of the application of data protection legislation to geographic data. The variety was found among the different EU Member States, the different stakeholders and the different types of geographic data. In the Netherlands, the Data Protection Authority (DPA) states that panoramic images of streets are considered personal data. While Dutch case law judges that the data protection legislation does not apply if certain features are blurred and no link to an address is provided. The topographic datasets studied in the case studies do not contain personal data, according to the Dutch DPA, while the German DPA and the Belgian DPA judge that topographic maps of a large scale can contain personal data, and impose conditions on the processing of topographic maps. The UK DPA does consider this data outside of the scope of legal definition of personal data. The patchwork of differences in data protection legislation can be harmonised by using a traffic light model. This model focuses on the context in which the processing of the data takes place and has four categories of data: (1) sensitive personal data, (2) personal data, (3), data that can possibly lead to identification, and (4) non-personal data. For some geographic data, for example factual data that does not reveal sensitive information about a person, can be categorised in the third category giving room to opening up data under the INSPIRE Directive.
Gregory, Sarah; Blair, R James; Ffytche, Dominic; Simmons, Andrew; Kumari, Veena; Hodgins, Sheilagh; Blackwood, Nigel
2015-02-01
Men with antisocial personality disorder show lifelong abnormalities in adaptive decision making guided by the weighing up of reward and punishment information. Among men with antisocial personality disorder, modification of the behaviour of those with additional diagnoses of psychopathy seems particularly resistant to punishment. We did a case-control functional MRI (fMRI) study in 50 men, of whom 12 were violent offenders with antisocial personality disorder and psychopathy, 20 were violent offenders with antisocial personality disorder but not psychopathy, and 18 were healthy non-offenders. We used fMRI to measure brain activation associated with the representation of punishment or reward information during an event-related probabilistic response-reversal task, assessed with standard general linear-model-based analysis. Offenders with antisocial personality disorder and psychopathy displayed discrete regions of increased activation in the posterior cingulate cortex and anterior insula in response to punished errors during the task reversal phase, and decreased activation to all correct rewarded responses in the superior temporal cortex. This finding was in contrast to results for offenders without psychopathy and healthy non-offenders. Punishment prediction error signalling in offenders with antisocial personality disorder and psychopathy was highly atypical. This finding challenges the widely held view that such men are simply characterised by diminished neural sensitivity to punishment. Instead, this finding indicates altered organisation of the information-processing system responsible for reinforcement learning and appropriate decision making. This difference between violent offenders with antisocial personality disorder with and without psychopathy has implications for the causes of these disorders and for treatment approaches. National Forensic Mental Health Research and Development Programme, UK Ministry of Justice, Psychiatry Research Trust, NIHR Biomedical Research Centre. Copyright © 2015 Elsevier Ltd. All rights reserved.
Morey, Leslie C; Bender, Donna S; Skodol, Andrew E
2013-09-01
The authors sought to determine whether a 5-point global rating of personality dysfunction on the Level of Personality Functioning Scale proposed as a severity index for Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5), would be related to DSM-IV personality disorder diagnosis as well as to other key clinical judgments. Data were collected from a national sample of 337 mental health clinicians who provided complete diagnostic information relevant to DSM-IV and proposed DSM-5 personality disorder diagnoses, as well as demographic information and other clinical judgments, on one of their patients. Of the 337 patients described, 248 met criteria for 1 of the 10 specific DSM-IV personality disorders. A "moderate" or greater rating of impairment in personality functioning on the Level Scale demonstrated 84.6% sensitivity and 72.7% specificity for identifying patients meeting criteria for a specific DSM-IV personality disorder. The Level of Personality Functioning Scale had significant and substantial validity correlations with other measures of personality pathology and with clinical judgments regarding functioning, risk, prognosis, and optimal treatment intensity. Furthermore, the single-item Level of Personality Functioning rating was viewed as being as clinically useful as the 10 DSM-IV categories for treatment planning and patient description and was a better predictor of clinician ratings of broad psychosocial functioning than were the 10 DSM-IV categories combined. These results confirm hypotheses that the single-item Level of Personality Functioning Scale rating provides an indication of severity of personality pathology that predicts both assignment of personality disorder diagnosis and clinician appraisals of functioning, risk, prognosis, and needed treatment intensity.
Pilinskaia, M A; Dybskiĭ, S S; Dybskaia, E B; Shvaĭko, L I
2012-01-01
By using modified "G2-bleomycin sensitivity assay" above background level of cytogenetic effect considered as a marker of hidden chromosome instability (HCI) has been investigated in 3 groups--liquidators of Chernobyl accident (occupational group 1), patients with lung cancer who denied conscious contact--with ionizing radiation (group of comparison), liquidators with lung cancer (occupational group 2). Significant interindividual variations of cytogenetic effects induced with bleomycin and the lack of positive correlation between background and above background frequencies of chromosome aberrations have been shown in all observed groups. It had been established that occupational group 2 was the most burdened group by expression of the above background cytogenetic effect and, accordingly, number of persons with HCI. The data obtained permit to suggest the existence of the association between radiation-induced increase of individual sensitivity to testing mutagenic exposure and the realization of cancer in persons exposed to ionizing radiation. The results show acceptability of "G2-bleomycin sensitivity assay" under the cytogenetic examination of irradiated contingents for determining HCI as one of informative markers of predisposition to oncopathology.
Sava, M Gabriela; Dolan, James G; May, Jerrold H; Vargas, Luis G
2018-07-01
Current colorectal cancer screening guidelines by the US Preventive Services Task Force endorse multiple options for average-risk patients and recommend that screening choices should be guided by individual patient preferences. Implementing these recommendations in practice is challenging because they depend on accurate and efficient elicitation and assessment of preferences from patients who are facing a novel task. To present a methodology for analyzing the sensitivity and stability of a patient's preferences regarding colorectal cancer screening options and to provide a starting point for a personalized discussion between the patient and the health care provider about the selection of the appropriate screening option. This research is a secondary analysis of patient preference data collected as part of a previous study. We propose new measures of preference sensitivity and stability that can be used to determine if additional information provided would result in a change to the initially most preferred colorectal cancer screening option. Illustrative results of applying the methodology to the preferences of 2 patients, of different ages, are provided. The results show that different combinations of screening options are viable for each patient and that the health care provider should emphasize different information during the medical decision-making process. Sensitivity and stability analysis can supply health care providers with key topics to focus on when communicating with a patient and the degree of emphasis to place on each of them to accomplish specific goals. The insights provided by the analysis can be used by health care providers to approach communication with patients in a more personalized way, by taking into consideration patients' preferences before adding their own expertise to the discussion.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... does not include any sensitive personal information, like anyone's Social Security number, date of... the agreement or make final the agreement's proposed order. This matter involves PPG's marketing and... prevent PPG from engaging in similar acts and practices in the future. Part I addresses the marketing of...
The effect of public disclosure laws on biomedical research.
Cardon, Andrew D; Bailey, Matthew R; Bennett, B Taylor
2012-05-01
The Freedom of Information Act (FOIA) and state 'open-records' laws govern access to records in the possession of federal agencies and state entities, such as public universities. Although these laws are intended to promote 'open government' and to assure the existence of an informed citizenry capable of holding government officials accountable for their decisions, an inherent tension exists between the public's access to information and biomedical research institutions' need to ensure the confidentiality of proprietary records and to protect the personal safety of employees. Recognizing these and other conflicts, the federal FOIA and state public-disclosure laws contain express exemptions to protect sensitive information from disclosure. Although some state open-records laws are modeled after the federal FOIA, important differences exist based on the language used by the state law, court interpretations, and exemptions. Two specific types of exemptions are particularly relevant to research facilities: exemptions for research information and exemptions for personal information. Responding to FOIA and state open-records requests requires knowledge of relevant laws and the involvement of all interested parties to facilitate a coordinated and orderly response.
Prevalence of Contact Allergens in Personal Care Products for Babies and Children.
Bonchak, Jonathan G; Prouty, Megan E; de la Feld, Salma F
Personal care products marketed for babies and children are often regarded as "safe" or "gentle." However, little is known about the prevalence of contact allergens in these types of products. This study assessed the prevalence of important sensitizers in personal care products marketed for babies and children. A secondary objective of this study was to determine whether a product's cost correlates with content of sensitizing ingredients. The ingredient lists of 533 unique personal care products were analyzed for presence of fragrance, betaines, propylene glycol, methylchloroisothiazolinone, methylisothiazolinone, formaldehyde, lanolin, and neomycin. Price per ounce was determined for each product as well. Most personal care products for babies and children contain 1 or more sensitizers. Products containing more sensitizers tend to cost less than those without any sensitizing ingredients.
Use of tablet personal computers for sensitive patient-reported information.
Dupont, Alexandra; Wheeler, Jane; Herndon, James E; Coan, April; Zafar, S Yousuf; Hood, Linda; Patwardhan, Meenal; Shaw, Heather S; Lyerly, H Kim; Abernethy, Amy P
2009-01-01
Notebook-style computers (e/Tablets) are increasingly replacing paper methods for collecting patient-reported information. Discrepancies in data between these methods have been found in oncology for sexuality-related questions. A study was performed to formulate hypotheses regarding causes for discrepant responses and to analyze whether electronic data collection adds value over paper-based methods when collecting data on sensitive topics. A total of 56 breast cancer patients visiting Duke Breast Clinic (North Carolina) participated by responding to 12 subscales of 5 survey instruments in electronic (e/Tablet) format and to a paper version of 1 of these surveys, at each visit. Twenty-one participants (38%) provided dissimilar responses on paper and electronic surveys to one item of the Functional Assessment of Cancer Therapy-General (FACT-G) Social Well-Being scale that asked patients to rate their satisfaction with their current sex life. Among these 21 patients were 8 patients who answered the question in the electronic environment, and 13 patients who answered both paper and electronic versions but with different responses. Eleven patients (29%) did not respond to the item on either e/Tablet or paper; 45 patients (80%) answered it on e/Tablet; and 37 patients (66%) responded on the paper version. The e/Tablet electronic system may provide a "safer" environment than paper questionnaires for cancer patients to answer private or highly personal questions on sensitive topics such as sexuality.
Informal Caregivers Assisting People with Multiple Sclerosis
Huang, Chunfeng
2011-01-01
The objective of this study was to identify characteristics of informal caregivers, caregiving, and people with multiple sclerosis (MS) receiving this assistance that are associated with the strength of the care-giver/care recipient relationship. Data were collected in a national survey of informal caregivers and analyzed using an ordered logistic regression model to identify factors associated with caregiver perceptions of the strength of the relationship with the person with MS. The overall health of the person with MS was significantly associated with caregiver perceptions that providing assistance strengthened the caregiver/care recipient relationship, with poor health having a negative impact on the relationship. A spousal relationship between the caregiver and the person with MS was associated with significantly lower perceptions of a strengthened relationship. Conversely, caregiver perceptions that MS symptoms interfered with the independence of the person with MS in daily life were associated with caregiver perceptions of a strengthened relationship. Longer duration of caregiving and more hours per week spent providing assistance also were associated with a stronger relationship. In contrast, we found a significant negative association between caregiver perceptions that assisting the person with MS was burdensome and the strength of the relationship. Similarly, higher levels of education among caregivers tended to have a significantly negative impact on the caregiver/care recipient relationship. Our findings highlight the importance of addressing the needs and concerns of spousal caregivers. Health professionals who treat informal caregivers, as well as those treating people with MS, should be sensitive to the impact caregiving has on caregivers, especially spouses providing assistance. PMID:24453723
41 CFR 109-43.305-50 - Nuclear-related and proliferation-sensitive personal property.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Nuclear-related and proliferation-sensitive personal property. 109-43.305-50 Section 109-43.305-50 Public Contracts and Property... Excess § 109-43.305-50 Nuclear-related and proliferation-sensitive personal property. Nuclear-related and...
41 CFR 109-43.305-50 - Nuclear-related and proliferation-sensitive personal property.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Nuclear-related and proliferation-sensitive personal property. 109-43.305-50 Section 109-43.305-50 Public Contracts and Property... Excess § 109-43.305-50 Nuclear-related and proliferation-sensitive personal property. Nuclear-related and...
41 CFR 109-43.305-50 - Nuclear-related and proliferation-sensitive personal property.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Nuclear-related and proliferation-sensitive personal property. 109-43.305-50 Section 109-43.305-50 Public Contracts and Property... Excess § 109-43.305-50 Nuclear-related and proliferation-sensitive personal property. Nuclear-related and...
41 CFR 109-43.305-50 - Nuclear-related and proliferation-sensitive personal property.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Nuclear-related and proliferation-sensitive personal property. 109-43.305-50 Section 109-43.305-50 Public Contracts and Property... Excess § 109-43.305-50 Nuclear-related and proliferation-sensitive personal property. Nuclear-related and...
41 CFR 109-43.305-50 - Nuclear-related and proliferation-sensitive personal property.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Nuclear-related and proliferation-sensitive personal property. 109-43.305-50 Section 109-43.305-50 Public Contracts and Property... Excess § 109-43.305-50 Nuclear-related and proliferation-sensitive personal property. Nuclear-related and...
A person is not a number: discourse involvement in subject-verb agreement computation.
Mancini, Simona; Molinaro, Nicola; Rizzi, Luigi; Carreiras, Manuel
2011-09-02
Agreement is a very important mechanism for language processing. Mainstream psycholinguistic research on subject-verb agreement processing has emphasized the purely formal and encapsulated nature of this phenomenon, positing an equivalent access to person and number features. However, person and number are intrinsically different, because person conveys extra-syntactic information concerning the participants in the speech act. To test the person-number dissociation hypothesis we investigated the neural correlates of subject-verb agreement in Spanish, using person and number violations. While number agreement violations produced a left-anterior negativity followed by a P600 with a posterior distribution, the negativity elicited by person anomalies had a centro-posterior maximum and was followed by a P600 effect that was frontally distributed in the early phase and posteriorly distributed in the late phase. These data reveal that the parser is differentially sensitive to the two features and that it deals with the two anomalies by adopting different strategies, due to the different levels of analysis affected by the person and number violations. Copyright © 2011 Elsevier B.V. All rights reserved.
[National Database of Genotypes--ethical and legal issues].
Franková, Vera; Tesínová, Jolana; Brdicka, Radim
2011-01-01
National Database of Genotypes--ethical and legal issues The aim of the project National Database of Genotypes is to outline structure and rules for the database operation collecting information about genotypes of individual persons. The database should be used entirely for health care. Its purpose is to enable physicians to gain quick and easy access to the information about persons requiring specialized care due to their genetic constitution. In the future, another introduction of new genetic tests into the clinical practice can be expected thus the database of genotypes facilitates substantial financial savings by exclusion of duplicates of the expensive genetic testing. Ethical questions connected with the creating and functioning of such database concern mainly privacy protection, confidentiality of personal sensitive data, protection of database from misuse, consent with participation and public interests. Due to necessity of correct interpretation by qualified professional (= clinical geneticist), particular categorization of genetic data within the database is discussed. The function of proposed database has to be governed in concordance with the Czech legislation together with solving ethical problems.
Privacy by design in personal health monitoring.
Nordgren, Anders
2015-06-01
The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.
[Pathologic skin changes in workers at electric and thermoelectric power plants].
Kieć-Swierczyńska, M; Woźniak, H
1988-01-01
Dermatological examination was performed and epidermal tests using a routine set of allergens and metals (Cr, Co, Ni, Al, Cu, Ag, Zn, Hg, Fe) on 112 workers of power plants and thermal-electric power stations working at the stands characterized by a heavy dustiness (electro-filters operation, ash removal, deslagging, carburizing) and at the stands where dustiness was not so heavy but instead exposure to machine oils and greases (retors' operators, electromechanics, assemblers and welders) was remarkable. It was found that occupational exposure to chemicals resulted in skin inflammation in 7.1% of the examined persons. Machine oils and greases induced skin inflammation in 2.7% and occupational acne in 5.3% of workers. It was also observed that chromium compounds were the primary allergen in workers exposed to dusts (13.4% of sensitized persons) and in workers exposed to industrial greases and oils (8.0% of sensitized persons). Allergy to cobalt compounds prevailed among persons exposed to smears and oils. Single positive results of epidermal tests with the use of copper and silver were obtained. Moreover, data concerning the microelements content in fly-ashes are presented. Information on the frequency of the incidence of occupational skin diseases, sickness absenteeism due to dermatoses and on personal safety equipment which should be used by the workers of power industry plants are provided.
van Hooren, Susan; van der Veld, William M.; Hutschemaekers, Giel
2017-01-01
Abstract Despite the use of art therapy in clinical practice, its appreciation and reported beneficial results, no instruments are available to measure specific effects of art therapy among patients with personality disorders cluster B/C in multidisciplinary treatment. In the present study, we described the development and psychometric evaluation of the Self‐expression and Emotion Regulation in Art Therapy Scale (SERATS). Structural validity (exploratory and confirmatory factor analysis), reliability, construct validity and sensitivity to change were examined using two independent databases (n = 335; n = 34) of patients diagnosed with personality disorders cluster B/C. This resulted in a nine‐item effect scale with a single factor with a high internal reliability and high test–retest reliability; it demonstrated discriminant validity and sensitivity to change. In conclusion, the SERATS is brief and content‐valid and offers objective and reliable information on self‐expression and emotion regulation in art therapy among patients with personality disorders cluster B/C. Although more research on construct validity is needed, the SERATS is a promising tool to be applied as an effect scale and as a monitoring tool during art therapy treatment. © 2017 The Authors Personality and Mental Health Published by John Wiley & Sons Ltd PMID:28730717
Methods to optimize recruitment and retention to an exercise study in Chinese immigrants.
Taylor-Piliae, Ruth E; Froelicher, Erika Sivarajan
2007-01-01
To counter pervasive disparities in healthcare and guide public health prevention programs, culturally sensitive recruitment and retention strategies for Chinese immigrants participating in health-related research studies are needed. The aim of this study was to develop and implement recruitment and retention strategies with Chinese immigrants in a Tai Chi exercise study. After substantial project planning and incorporating community-based research principles, a multidimensional approach was used to ensure minimal loss to follow-up. Recruitment strategies included partnering with a community-based agency, distributing study information using a multimedia approach, communicating in the native language, and demonstrating cultural sensitivity. Retention strategies included establishing a tracking method during recruitment, providing personalized feedback, maintaining the same location for all aspects of the study, eliminating potential linguistic barriers, providing personal attention and encouragement, monitoring attendance, utilizing a charismatic Tai Chi instructor, respecting Chinese culture, providing appropriate incentives, and maintaining good communication. Sixty persons showed interest in the study, 52 persons were screened, and 39 persons were enrolled. Recruitment was completed within 3 weeks. An advertisement in the Chinese newspaper was the most fruitful recruitment source, yielding approximately 60% of the study participants. Retention in the study was also very high (97%, n = 38). The successful recruitment and retention of Chinese immigrants in this Tai Chi exercise study are due to a variety of factors on many levels, including the participants, study investigator, and community-based agency.
A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining
NASA Astrophysics Data System (ADS)
Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.
The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.
Bresser, Laura; Köhler, Steffen; Schwaab, Christoph
2014-01-01
It is necessary to optimize workflows and communication between institutions involved in patients' treatment to improve quality and efficiency of the German healthcare. To achieve these in the Metropolregion Rhein-Neckar, a personal, cross-institutional patient record (PEPA) is used. Given the immense sensitivity of health-related information saved in the PEPA, it is imperative to obey the data protection regulations in Germany. One important aspect is the logging of access to personal health data and all other safety-related events. For gathering audit information, the IHE profile ATNA can be used, because it provides a flexible and standardized infrastructure. There are already existing solutions for gathering the audit information based on ATNA. In this article one solution (OpenATNA) is evaluated, which uses the method of evaluation defined by Peter Baumgartner. In addition, a user interface for a privacy officer is necessary to support the examination of the audit information. Therefore, we will describe a method to develop an application in Liferay (an OpenSource enterprise portal project) which supports examinations on the gathered audit information.
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
Bianchi, Kristin N; Carter, Michele M
2012-10-01
Disgust sensitivity and concern with contamination have been frequently associated with Spider and Blood-Injection-Injury (BII) Phobias. This study assessed the domain specificity of disgust sensitivity and concern with contamination in 29 Non-Phobic Controls, 25 clinical Spider Phobics, 26 clinical BII Phobics, and 27 persons who met clinical criteria for Spider Phobia and BII Phobia. On self-report measures we found evidence of domain specificity of disgust sensitivity for the Spider and BII Phobia groups. Furthermore, we found that persons with both phobias may be more disgust sensitive than persons with a single phobia. Interestingly, the animal reminder disgust stimulus used in this research was more sensitive to detecting domain specific differences in disgust sensitivity between Phobic groups than was the core disgust stimulus, emphasizing the importance of developing standardized behavioral measures of disgust sensitivity in future research. Lastly, findings from this research suggest that concern with contamination may be more influential in phobic avoidance for persons with Spider Phobia than for persons with BII Phobia. Treatment implications for these findings are discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.
Conti, Adelaide; Delbon, Paola; Laffranchi, Laura; Paganelli, Corrado; De Ferrari, Francesco
2012-06-01
The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current Italian normative framework for personal data protection and respect the patient's freedom. This freedom allows the patient to decide, in a conscious and responsible way, whether to share health information with health personnel without experiencing any prejudice in the provision of healthcare requested. Moreover, data collection must be relevant and cannot exceed the principles of treatment goals with reference to the specific care of the concerned person. However, the need for recording information regarding HIV infection at the first appointment, regardless of the clinical intervention or therapeutic plan that needs to be conducted, should not alter the standard protection measures of the healthcare staff. In fact, these measures are adopted for every patient.
Information accountability and usability: are there any connections?
Sahama, Tony; Kushniruk, Andre; Kuwata, Shigeki
2013-01-01
Availability of health information is rapidly increasing and the expansion and proliferation of health information is inevitable. The Electronic Healthcare Record, Electronic Medical Record and Personal Health Record are at the core of this trend and are required for appropriate and practicable exchange and sharing of health information. However, it is becoming increasingly recognized that it is essential to preserve patient privacy and information security when utilising sensitive information for clinical, management and administrative processes. Furthermore, the usability of emerging healthcare applications is also becoming a growing concern. This paper proposes a novel approach for integrating consideration of information accountability with a perspective from usability engineering that can be applied when developing healthcare information technology applications. A social networking user case in the healthcare information exchange will be presented in the context of our approach.
Influence of indirect information on interpersonal trust despite direct information.
Zarolia, Pareezad; Weisbuch, Max; McRae, Kateri
2017-01-01
Trust is integral to successful relationships. The development of trust stems from how one person treats others, and there are multiple ways to learn about someone's trust-relevant behavior. The present research captures the development of trust to examine if trust-relevant impressions and behavior are influenced by indirect behavioral information (i.e., descriptions of how a person treated another individual)-even in the presence of substantial direct behavioral information (i.e., self-relevant, first-hand experience with a person). Participants had repeated interpersonal exchanges with a partner who was trustworthy or untrustworthy with participants' money. The present studies vary the frequency with which (Studies 1 & 2), the order in which (Study 3) and the number of people for whom (Study 4) indirect information (i.e., brief vignettes describing trustworthy or untrustworthy behavior) were presented. As predicted, across 4 studies, we observed a robust effect of indirect-information despite the presence of substantial direct information. Even after dozens of interactions in which a partner betrayed (or not), a brief behavioral description of a partner influenced participants' willingness to actually trust the partner with money, memory-based estimates of partner-behavior, and impressions of the partner. These effects were observed even though participants were also sensitive to partners' actual trust behavior, and even when indirect behavioral descriptions were only presented a single time. Impressions were identified as a strong candidate mechanism for the effect of indirect-information on behavior. We discuss implications of the persistence of indirect information for impression formation, relationship development, and future studies of trust. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Relationship between human physiological parameters and geomagnetic variations of solar origin
NASA Astrophysics Data System (ADS)
Dimitrova, S.
Results presented concern influence of increased geomagnetic activity on some human physiological parameters. The blood pressure and heart rate of 86 volunteers were measured on working days in autumn 2001 (01/10 09/11) and in spring 2002 (08/04 28/05). These periods were chosen because of maximal expected geomagnetic activity. Altogether 2799 recordings were obtained and analysed. Questionnaire information about subjective psycho-physiological complaints was also gathered. MANOVA was employed to check the significance of the influence of three factors on the physiological parameters under consideration. The factors were the following: (1) planetary geomagnetic activity level estimated by Ap-index and divided into five levels; (2) gender males and females; (3) blood pressure degree persons in the group examined were divided into hypotensive, normotensive and hypertensive. Post hoc analysis was performed to elicit the significance of differences in the factors’ levels. The average arterial blood pressure of the group was found to increase significantly with the increase of geomagnetic activity level. The average increment of systolic and diastolic blood pressure of the group examined reached 9%. This effect was present irrespectively of gender. Results obtained suppose that hypertensive persons have the highest sensitivity and the hypotensive persons have the lowest sensitivity of the arterial blood pressure to increase of geomagnetic activity. The results did not show significant changes in the heart rate. The percentage of the persons who reported subjective psycho-physiological complaints was also found to increase significantly with the geomagnetic activity increase and the highest sensitivity was revealed for the hypertensive females.
Ma, K H; Cui, Z Y; Li, L; Chao, H; Wang, Y
2017-12-20
Objective: To investigate the relationship between personality characteristics and turnover intention of the medical staff in an infectious diseases hospital. Methods: Using the cluster sampling method, a total of 366 members of medical staff were selected from different departments in an infectious disease hospital from May to August, 2013. The general information, such as sex, age, education level, and professional title, were collected and they were subjected to a survey using Cattell's 16 Personality Factor Questionnaire and Turnover Intention Scale. The data were subjected to logistic regression analysis. Results: Compared with the Chinese norm, the medical staff in the infectious disease hospital had significantly higher scores of intelligence, stability, bullying, excitability, perseverance, social boldness, fantasy, privateness, independence, and self-discipline and significantly lower scores of gregariousness, sensitivity, suspicion, anxiety, and tension ( P <0.05). Of the 366 members of medical staff, 22 (6.01%) had a very low turnover intention, low in 152 (41.53%) , high in 61 (16.67%) , and very high in 131 (35.79%). The logistic regression analysis showed that sensitivity, suspicion, fantasy, privateness, anxiety, openness to change, and independence were the risk factors for turnover intention ( P <0.05) . Conclusion: Compared with the Chinese norm, the medical staff in the infectious disease hospital have a better mental quality and a higher turnover intention. The individuals with sensitivity, suspicion, fantasy, and anxiety are prone to having turnover intention.
Human genetic databases and liberty.
Adalsteinsson, Ragnar
2004-01-01
This paper examines an act of the Icelandic Parliament on health-sector databases. Both the legislation itself and the manner in which it was presented by the Government to the Parliament and the general public raise various questions about democratic parliamentary procedures, community consultation, autonomy, privacy, professional confidence, control of health data in hospitals and business relationships between medical doctors and biotechnology corporations. A major question to be asked is: In whose interest is it that such sensitive data are handed over to for-profit corporations? Furthermore, is it within the authority of the legislature to authorize politically appointed boards of health institutes to transfer such data without the direct informed consent of the patient and without the relevant physicians' having a say? Does experience teach us to entrust private companies with sensitive personal data? Should the Government be involved in the research policy-making of the biotechnology companies that have been given access to the genetic data of a population, or should the profit motive be the sole deciding influence? That is, should the interest of the shareholders of the companies prevail over the interest of underprivileged groups who are most in need of new methods or medicine to alleviate their situation due to incurable diseases? Or is the invisible hand of the market the only competent decision-maker? Finally, will the proliferation of databases containing sensitive personal data, such as human genetic data, limit our personal liberty?
Setoguchi, Soko; Zhu, Ying; Jalbert, Jessica J; Williams, Lauren A; Chen, Chih-Ying
2014-05-01
Linking patient registries with administrative databases can enhance the utility of the databases for epidemiological and comparative effectiveness research. However, registries often lack direct personal identifiers, and the validity of record linkage using multiple indirect personal identifiers is not well understood. Using a large contemporary national cardiovascular device registry and 100% Medicare inpatient data, we linked hospitalization-level records. The main outcomes were the validity measures of several deterministic linkage rules using multiple indirect personal identifiers compared with rules using both direct and indirect personal identifiers. Linkage rules using 2 or 3 indirect, patient-level identifiers (ie, date of birth, sex, admission date) and hospital ID produced linkages with sensitivity of 95% and specificity of 98% compared with a gold standard linkage rule using a combination of both direct and indirect identifiers. Ours is the first large-scale study to validate the performance of deterministic linkage rules without direct personal identifiers. When linking hospitalization-level records in the absence of direct personal identifiers, provider information is necessary for successful linkage. © 2014 American Heart Association, Inc.
Klonoff, David C; Price, W Nicholson
2017-03-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public's level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI.
Some economics on personalized and predictive medicine.
Antoñanzas, F; Juárez-Castelló, C A; Rodríguez-Ibeas, R
2015-12-01
To contribute to the theoretical literature on personalized medicine, analyzing and integrating in an economic model, the decision a health authority faces when it must decide on the implementation of personalized medicine in a context of uncertainty. We carry out a stylized model to analyze the decision health authorities face when they do not have perfect information about the best treatment for a population of patients with a given disease. The health authorities decide whether to use a test to match patients with treatments (personalized medicine) to maximize health outcomes. Our model characterizes the situations under which personalized medicine dominates the alternative option of business-as-usual (treatment without previous test). We apply the model to the KRAS test for colorectal cancer, the PCA3 test for prostate cancer and the PCR test for the X-fragile syndrome, to illustrate how the parameters and variables of the model interact. Implementation of personalized medicine requires, as a necessary condition, having some tests with high discriminatory power. This is not a sufficient condition and expected health outcomes must be taken into account to make a decision. When the specificity and the sensitivity of the test are low, the health authority prefers to apply a treatment to all patients without using the test. When both characteristic of the test are high, the health authorities prefer to personalize the treatments when expected health outcomes are better than those under the standard treatment. When we applied the model to the three aforementioned tests, the results illustrate how decisions are adopted in real world. Although promising, the use of personalized medicine is still under scrutiny as there are important issues demanding a response. Personalized medicine may have an impact in the drug development processes, and contribute to the efficiency and effectiveness of health care delivery. Nevertheless, more accurate statistical and economic information related to tests results and treatment costs as well as additional medical information on the efficacy of the treatments are needed to adopt decisions that incorporate economic rationality.
Bright, Felicity; Kayes, Nicola; Cott, Cheryl A
2016-01-01
Introduction Person-centredness is a philosophy for organising and delivering healthcare based on patients’ needs, preferences and experiences. Although widely endorsed, the concept suffers from a lack of detail and clarification, in turn accounting for ambiguous implementation and outcomes. While a conceptual framework based on a systematic review defines person/patient-centred care components (Scholl et al, 2014), it applies across healthcare contexts and may not be sensitive to the nuances of the rehabilitation of adults with physical impairments. Accordingly, this study aims to build a conceptual framework, based on existing literature, of what person-centredness means in the rehabilitation of adults with physical impairments in the clinical encounter and broader health service delivery. Methods and analysis We will use a scoping review methodology. Searches on relevant databases will be conducted first, combining keywords for ‘rehabilitation’, ‘person-centered’ and associated terms (including patient preferences/experiences). Next, snowball searches (citation tracking, references lists) will be performed. Papers will be included if they fall within predefined selection categories (seen as most likely informative on elements pertaining to person-centred rehabilitation) and are written in English, regardless of design (conceptual, qualitative, quantitative). Two reviewers will independently screen titles and abstracts, followed by screening of the full text to determine inclusion. Experts will then be consulted to identify relevant missing papers. This can include elements other than the peer-reviewed literature (eg, book chapters, policy/legal papers). Finally, information that helps to build the concept and practice of person-centred rehabilitation will be abstracted independently by two reviewers and analysed by inductive thematic analysis to build the conceptual framework. Dissemination The resulting framework will aid clarification regarding person-centred rehabilitation, which in turn is expected to conceptually ground and inform its operationalisation (eg, measurement, implementation, improvement). Findings will be disseminated through local, national and international stakeholders, both at the clinical and service organisation levels. PMID:27436670
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Sharing sensitive health information through social media in the Arab world.
Asiri, Eman; Khalifa, Mohamed; Shabir, Syed-Abdul; Hossain, Md Nassif; Iqbal, Usman; Househ, Mowafa
2017-02-01
Sharing daily activities on social media has become a part of our lifestyle, but little is known about sharing sensitive health information in the Arab world. The objective of this study is to explore how social media users in the Arab world share sensitive health information through Facebook. A retrospective qualitative analysis was used in the study. A total of 110 Facebook groups, related to HIV, sickle cell and depression were screened between 5 June and 1 December 2014. Forty four Facebook groups met the inclusion criteria. 28 471 posts were extracted, of which 649 met inclusion criteria. Forty two percent of health information exchanged were related to HIV, 34% to depression and 24% to sickle cell diseases. The majority of postings were from Egypt 21.1%, Saudi Arabia 20%, Algeria 10% and Libya 9.2%. Male posts were 54.2% while 45.8% were posted by females. Individuals utilized Facebook groups to share personal experiences of their disease 31%, in addition to being used for seeking queries 13.6%, offering explicit advice 8.3%, reporting signs and symptoms of the disease 7.3% and posting their communication with the health-care provider 6.6%. Users in the Arab world use social media to exchange sensitive health information, which could have serious implications regarding the privacy of the information shared with other members of the group. On the other hand, sharing health information could have positive effects for patients, such as sharing disease experiences and peer support. However, more work is needed to ensure that Facebook users in the Arab world are aware of the potential consequences of sharing sensitive health information through social media. © The Author 2016. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com
Mapping Discrimination Experienced by Indonesian Trans* FtM Persons.
Gordon, Danny; Pratama, Mario Prajna
2017-01-01
This work sought to document how Indonesian trans* FtM persons experienced discrimination across the interlinked domains of social networks, religious and educational institutions, employment and the workplace, and health care institutions. Objectives were (1) to map the discrimination experienced by trans* FtM individuals in Indonesia, and (2) to establish the specific priorities of the Indonesian trans* FtM community. In-depth interviews, focus groups, and participant observation was used involving 14 respondents. Findings revealed that respondents experienced othering through rejection, misidentification, harassment, "correction," and bureaucratic discrimination across the five preestablished domains. Health care and a lack of information emerged as areas of particular concern for respondents. This work calls for health care that is sensitive to the needs of trans* FtM people coupled with high-quality information to alleviate the cycles through which discrimination is sustained.
General Factor of Personality Questionnaire (GFPQ): only one factor to understand personality?
Amigó, Salvador; Caselles, Antonio; Micó, Joan C
2010-05-01
This study proposes a psychometric approach to assess the General Factor of Personality (GFP) to explain the whole personality. This approach defends the existence of one basic factor that represents the overall personality. The General Factor of Personality Questionnaire (GFPQ) is presented to measure the basic, combined trait of the complete personality. The questionnaire includes 20 items and is constituted by two scales with 10 items each one: the Extraversion Scale (ES) and the Introversion Scale (IS). The GFPQ shows adequate internal consistency and construct validity, while the relationships with the personality factors of other models and with psychopathology are as expected. It correlates positively and significantly with Extraversion (E) and Psychoticism (P), and negatively with Neuroticism (N) of Eysenck's EPQ (Eysenck Personality Questionnaire); it correlates positively and significantly with the Sensation Seeking Scaled (SSS) of Zuckerman, and is inside the expected direction with Sensitivity to Reward (SR) and Sensitivity to Punishment (SP) of the Sensitivity to Punishment and Sensitivity to Reward Questionnaire (SPSRQ), which represent the approach and avoidance trends of behavior, respectively. It not only relates negatively with the personality disorders of the anxiety spectrum, but also with the emotional disorders in relation to anxiety and depression, and it relates positively with the antisocial personality disorder.
Listou Grimen, Hanne; Diseth, Åge
2016-12-01
The aim of the present study was to examine the factor structure of a Norwegian version of the Highly Sensitive Person Scale (HSPS) and to investigate how sensory processing sensitivity (SPS) is related to personality traits of neuroticism, extraversion, and openness and to subjective health complaints (SHC) in a sample of 167 undergraduate psychology students. The results showed that the variance in a shortened version of the HSPS was best described by three separate factors: ease of excitation (EOE), aesthetic sensitivity (AES), and low sensory threshold (LST). Furthermore, the result showed than an overall SPS factor (EOE, LST, and AES combined) was predicted positively by neuroticism and openness and negatively by extraversion. With respect to SHC, the results showed that EOE and LST were positively associated with psychological health complaints. However, the personality trait of neuroticism contributed more than the SPS factors as predictor of SHC. In conclusion, the present study supported a shortened version of the HSPS and its relation to personality factors and SHC. © The Author(s) 2016.
Placing the face in context: cultural differences in the perception of facial emotion.
Masuda, Takahiko; Ellsworth, Phoebe C; Mesquita, Batja; Leu, Janxin; Tanida, Shigehito; Van de Veerdonk, Ellen
2008-03-01
Two studies tested the hypothesis that in judging people's emotions from their facial expressions, Japanese, more than Westerners, incorporate information from the social context. In Study 1, participants viewed cartoons depicting a happy, sad, angry, or neutral person surrounded by other people expressing the same emotion as the central person or a different one. The surrounding people's emotions influenced Japanese but not Westerners' perceptions of the central person. These differences reflect differences in attention, as indicated by eye-tracking data (Study 2): Japanese looked at the surrounding people more than did Westerners. Previous findings on East-West differences in contextual sensitivity generalize to social contexts, suggesting that Westerners see emotions as individual feelings, whereas Japanese see them as inseparable from the feelings of the group.
Navigating legal constraints in clinical data warehousing: a case study in personalized medicine.
Jefferys, Benjamin R; Nwankwo, Iheanyi; Neri, Elias; Chang, David C W; Shamardin, Lev; Hänold, Stefanie; Graf, Norbert; Forgó, Nikolaus; Coveney, Peter
2013-04-06
Personalized medicine relies in part upon comprehensive data on patient treatment and outcomes, both for analysis leading to improved models that provide the basis for enhanced treatment, and for direct use in clinical decision-making. A data warehouse is an information technology for combining and standardizing multiple databases. Data warehousing of clinical data is constrained by many legal and ethical considerations, owing to the sensitive nature of the data being stored. We describe an unconstrained clinical data warehousing architecture, some of the legal constraints that have led us to reconsider this architecture, and the legal and technical solutions to these constraints developed for the clinical data warehouse in the personalized medicine project p-medicine. We also propose some changes to the legal constraints that will further enable clinical research.
Oullier, Olivier; Basso, Frédéric
2010-01-01
To date, experiments in economics are restricted to situations in which individuals are not influenced by the physical presence of other people. In such contexts, interactions remain at an abstract level, agents guessing what another person is thinking or is about to decide based on money exchange. Physical presence and bodily signals are therefore left out of the picture. However, in real life, social interactions (involving economic decisions or not) are not solely determined by a person's inference about someone else's state-of-mind. In this essay, we argue for embodied economics: an approach to neuroeconomics that takes into account how information provided by the entire body and its coordination dynamics influences the way we make economic decisions. Considering the role of embodiment in economics—movements, posture, sensitivity to mimicry and every kind of information the body conveys—makes sense. This is what we claim in this essay which, to some extent, constitutes a plea to consider bodily interactions between agents in social (neuro)economics. PMID:20026467
Enhancing privacy and data protection in electronic medical environments.
Gritzalis, Stefanos
2004-12-01
Raising awareness and providing guidance to on-line data protection is by all means a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics become even more critical when referring to medical environments and thus to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is therefore a rather straightforward task to construct "patient profiles " that capture the electronic medical behavior of a patient, or even reveal sensitive information in regard with her/his medical history. Clearly, the consequence from maintaining such profiles is the violation of the patient's privacy. This paper studies medical environments that can support electronic medical transactions or/and the provision of medical information through the Web. Specifically it focuses on the countermeasures that the various actor categories can employ for protecting the privacy of personal and medical data transmitted during electronic medical transactions.
Oullier, Olivier; Basso, Frédéric
2010-01-27
To date, experiments in economics are restricted to situations in which individuals are not influenced by the physical presence of other people. In such contexts, interactions remain at an abstract level, agents guessing what another person is thinking or is about to decide based on money exchange. Physical presence and bodily signals are therefore left out of the picture. However, in real life, social interactions (involving economic decisions or not) are not solely determined by a person's inference about someone else's state-of-mind. In this essay, we argue for embodied economics: an approach to neuroeconomics that takes into account how information provided by the entire body and its coordination dynamics influences the way we make economic decisions. Considering the role of embodiment in economics--movements, posture, sensitivity to mimicry and every kind of information the body conveys--makes sense. This is what we claim in this essay which, to some extent, constitutes a plea to consider bodily interactions between agents in social (neuro)economics.
Pullman, Daryl; Buehler, Sharon K.; Felt, Larry; Gallagher, Katherine; House, Jeannie; Keough, T. Montgomery; McDonald, Lucy; Power, Angela; Ryan, Ann
2009-01-01
This study, conducted in Newfoundland and Labrador, assessed the level of awareness, perceptions and concerns of healthcare providers, health researchers, data managers and the general public about the collection, use and disclosure of personal health information (PHI) for research purposes. Data collection involved surveys and follow-up focus groups with participants. Results indicate a poor understanding generally with regard to privacy rights and responsibilities. Many professionals are unfamiliar with the legislative environment for PHI, particularly as it pertains to the access and use of PHI for research purposes. Lack of familiarity with basic requirements for patient-based research, coupled with heightened sensitivity to privacy issues owing to various federal and provincial regulatory initiatives, could have a chilling effect on health research. Importantly, our results indicate that the public is much less concerned about the use of their PHI for health research purposes than are professionals who collect, store and share it. PMID:20436810
A Study of the Relationship Between Personality Characteristics and Ethical Sensitivity in Business.
1992-09-01
Functional Preferences. and Descriptions of the Sixteen Personality Tvyes ISTJ ISFJ INFJ INTJ ISTP ISFP INFP INTP ESTP ESFP ENFP ENTP ESTJ ESFJ ENFJ ENTJ...AD-A258 421lE li(( I U~~l E l iIi - -H AFIT/GCNMLSMI92S-9 A STUDY OF THE RELATIONSHIP BETWEEN PERSONALITY CHARACTERISTICS AND ETHICAL SENSITIVITY IN...Codes Avail and/or Dist Speot8.i AFIT/GCM/LSM/92S-9 A STUDY OF THE RELATIONSHIP BETWEEN PERSONALITY CHARACTERISTICS AND ETHICAL SENSITIVITY IN BUSINESS
Tucker, Raymond P; Lengel, Greg J; Smith, Caitlin E; Capron, Dan W; Mullins-Sweatt, Stephanie N; Wingate, LaRicka R
2016-12-30
The current study investigated the relationship between maladaptive Five-Factor Model (FFM) personality traits, anxiety sensitivity cognitive concerns, and suicide ideation in a sample of 131 undergraduate students who were selected based on their scores on a screening questionnaire regarding Borderline Personality Disorder (BPD) symptoms. Those who endorsed elevated BPD symptoms in a pre-screen analyses completed at the beginning of each semester were oversampled in comparison to those with low or moderate symptoms. Indirect effect (mediation) results indicated that the maladaptive personality traits of anxious/uncertainty, dysregulated anger, self-disturbance, behavioral dysregulation, dissociative tendencies, distrust, manipulativeness, oppositional, and rashness had indirect effects on suicide ideation through anxiety sensitivity cognitive concerns. All of these personality traits correlated to suicide ideation as well. The maladaptive personality traits of despondence, affective dysregulation, and fragility were positive correlates of suicide ideation and predicted suicide ideation when all traits were entered in one linear regression model, but were not indirectly related through anxiety sensitivity cognitive concerns. The implication for targeting anxiety sensitivity cognitive concerns in evidence-based practices for reducing suicide risk in those with BPD is discussed. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Klonoff, David C.; Price, W. Nicholson
2017-01-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public’s level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI. PMID:27920271
Anatomisation with slicing: a new privacy preservation approach for multiple sensitive attributes.
Susan, V Shyamala; Christopher, T
2016-01-01
An enormous quantity of personal health information is available in recent decades and tampering of any part of this information imposes a great risk to the health care field. Existing anonymization methods are only apt for single sensitive and low dimensional data to keep up with privacy specifically like generalization and bucketization. In this paper, an anonymization technique is proposed that is a combination of the benefits of anatomization, and enhanced slicing approach adhering to the principle of k-anonymity and l-diversity for the purpose of dealing with high dimensional data along with multiple sensitive data. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes (SA) and yields two separate tables with non-overlapping attributes. In the enhanced slicing algorithm, vertical partitioning does the grouping of the correlated SA in ST together and thereby minimizes the dimensionality by employing the advanced clustering algorithm. In order to get the optimal size of buckets, tuple partitioning is conducted by MFA. The experimental outcomes indicate that the proposed method can preserve privacy of data with numerous SA. The anatomization approach minimizes the loss of information and slicing algorithm helps in the preservation of correlation and utility which in turn results in reducing the data dimensionality and information loss. The advanced clustering algorithms prove its efficiency by minimizing the time and complexity. Furthermore, this work sticks to the principle of k-anonymity, l-diversity and thus avoids privacy threats like membership, identity and attributes disclosure.
Luchsinger, José A; Burgio, Louis; Mittelman, Mary; Dunner, Ilana; Levine, Jed A; Kong, Jian; Silver, Stephanie; Ramirez, Mildred; Teresi, Jeanne A
2016-01-01
Introduction The prevalence of dementia is increasing without a known cure, resulting in an increasing number of informal caregivers. Caring for a person with dementia results in increased stress and depressive symptoms. There are several behavioural interventions designed to alleviate stress and depressive symptoms in caregivers of persons with dementia with evidence of efficacy. Two of the best-known interventions are the New York University Caregiver Intervention (NYUCI) and the Resources for Enhancing Alzheimer's Caregivers Health (REACH). The effectiveness of the NYUCI and REACH has never been compared. There is also a paucity of data on which interventions are more effective in Hispanics in New York City. Thus, we proposed the Northern Manhattan Hispanic Caregiver intervention Effectiveness Study (NHiCE), a pragmatic clinical trial designed to compare the effectiveness of adaptations of the NYUCI and the REACH in informal Hispanic caregivers of persons with dementia in New York City. Methods and analysis NHiCE is a 6-month randomised controlled trial comparing the effectiveness of adaptations of the NYUCI and REACH among 200 Hispanic informal adult caregivers of persons with dementia. The planned number of sessions of the NYUCI and REACH are similar. The primary outcome measures are changes from baseline to 6 months in the Zarit Caregiver Burden Scale and Geriatric Depression Scale. Our primary approach to analyses will be intent-to-treat. The primary analyses will use mixed random effects models, and a full information maximum likelihood approach, with sensitivity analyses using generalised estimating equation. Ethics and dissemination NHiCE is approved by the Institutional Review Board of Columbia University Medical Center (protocol AAAM5150). A Data Safety Monitoring Board monitors the progress of the study. Dissemination will include reports of the characteristics of the study participants, as well as a report of the results of the clinical trial. Trial registration number NCT02092987, Pre-results. PMID:27888180
Zhou, Gao; Zhou, Wenyu; Schüssler-Fiorenza Rose, Sophia Miryam; Perelman, Dalia; Colbert, Elizabeth; Runge, Ryan; Rego, Shannon; Sonecha, Ria; Datta, Somalee; McLaughlin, Tracey; Snyder, Michael P.
2017-01-01
A new wave of portable biosensors allows frequent measurement of health-related physiology. We investigated the use of these devices to monitor human physiological changes during various activities and their role in managing health and diagnosing and analyzing disease. By recording over 250,000 daily measurements for up to 43 individuals, we found personalized circadian differences in physiological parameters, replicating previous physiological findings. Interestingly, we found striking changes in particular environments, such as airline flights (decreased peripheral capillary oxygen saturation [SpO2] and increased radiation exposure). These events are associated with physiological macro-phenotypes such as fatigue, providing a strong association between reduced pressure/oxygen and fatigue on high-altitude flights. Importantly, we combined biosensor information with frequent medical measurements and made two important observations: First, wearable devices were useful in identification of early signs of Lyme disease and inflammatory responses; we used this information to develop a personalized, activity-based normalization framework to identify abnormal physiological signals from longitudinal data for facile disease detection. Second, wearables distinguish physiological differences between insulin-sensitive and -resistant individuals. Overall, these results indicate that portable biosensors provide useful information for monitoring personal activities and physiology and are likely to play an important role in managing health and enabling affordable health care access to groups traditionally limited by socioeconomic class or remote geography. PMID:28081144
An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity
NASA Astrophysics Data System (ADS)
Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.
2017-08-01
For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.
Caruso, Ronald D
2004-01-01
Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004
Planned Parenthood of Southern Arizona v. Lawall.
2002-01-01
Court Decision: 307 Federal Reporter, 3d Series 783; 2002 Oct 9 (date of decision). The U.S. Court of Appeals for the Ninth Circuit agreed with the lower court that Arizona's parental consent abortion law was constitutional because it adequately protected a minor's right to choose and privacy interests. Planned Parenthood brought an action contesting the constitutionality of Arizona's parental consent abortion law because it claimed the confidentiality provision did not comport with anonymity requirements upheld by the Supreme Court and a woman's informational privacy rights. The Ninth Circuit held that the confidentiality provision satisfied the required standard for anonymity because it took reasonable steps to prevent the public from learning the minor's identity. The court noted that complete anonymity was not required and, for this reason, the confidentiality provision did not unduly burden a woman's right to choose. The court also held that the law did not violate a woman's right of "informational" privacy (a privacy interest in avoiding disclosure of sensitive personal information) because the information was used in a manner that advanced a legitimate state interest, the law was sufficiently tailored to meet state interests, and the law provided adequate protection against unauthorized disclosure of personal information.
Carmichael, Marc G; Liu, Dikai
2015-01-01
Sensitivity of upper limb strength calculated from a musculoskeletal model was analyzed, with focus on how the sensitivity is affected when the model is adapted to represent a person with physical impairment. Sensitivity was calculated with respect to four muscle-tendon parameters: muscle peak isometric force, muscle optimal length, muscle pennation, and tendon slack length. Results obtained from a musculoskeletal model of average strength showed highest sensitivity to tendon slack length, followed by muscle optimal length and peak isometric force, which is consistent with existing studies. Muscle pennation angle was relatively insensitive. The analysis was repeated after adapting the musculoskeletal model to represent persons with varying severities of physical impairment. Results showed that utilizing the weakened model significantly increased the sensitivity of the calculated strength at the hand, with parameters previously insensitive becoming highly sensitive. This increased sensitivity presents a significant challenge in applications utilizing musculoskeletal models to represent impaired individuals.
Sensitivity to punishment and sensitivity to reward and traffic violations.
Castellà, Josep; Pérez, Jorge
2004-11-01
The aim of our study consists of contributing information on the relationship between the personality variables derived from Gray's model and the conduct that accompanies the infringement of the road traffic rules. Seven hundred and ninety-two adults of both sexes took part in the study (389 men and 403 women), all of whom had driving licences and drove frequently. The subjects answered "The Sensitivity to Punishment and Sensitivity to Reward Questionnaire", a scale of monotony avoidance, and two Likert scales of attitude and behaviour in connection with traffic violations. We found a high positive relationship between attitude and behaviour, with the men infringing the rules more than the women. Hypotheses regarding a relationship between traffic offences and sensibility to reward and monotony avoidance were confirmed. Those people with high scores in sensitivity to punishment and low ones in sensitivity to reward were those who drove within the law, while those with low sensitivity to punishment and high sensitivity to reward were those who broke it more. Sensitivity to reward was a stronger determinant in encouraging infringement of the rules than was sensitivity to punishment in discouraging the subjects to do so.
STRUCTURE OF THE UNIVERSITY PERSONALITY INVENTORY FOR CHINESE COLLEGE STUDENTS.
Zhang, Jieting; Lanza, Stephanie; Zhang, Minqiang; Su, Binyuan
2015-06-01
The University Personality Inventory, a mental health instrument for college students, is frequently used for screening in China. However, its unidimensionality has been questioned. This study examined its dimensions to provide more information about the specific mental problems for students at risk. Four subsamples were randomly created from a sample (N = 6,110; M age = 19.1 yr.) of students at a university in China. Principal component analysis with Promax rotation was applied on the first two subsamples to explore dimension of the inventory. Confirmatory factor analysis was conducted on the third subsample to verify the exploratory dimensions. Finally, the identified factors were compared to the Symptom Checklist-90 (SCL-90) to support validity, and sex differences were examined, based on the fourth subsample. Five factors were identified: Physical Symptoms, Cognitive Symptoms, Emotional Vulnerability, Social Avoidance, and Interpersonal Sensitivity, accounting for 60.3% of the variance. All the five factors were significantly correlated with the SCL-90. Women scored significantly higher than men on Cognitive Symptoms and Interpersonal Sensitivity.
2012-12-01
behavior unless it becomes criminal or involves the publishing of sensitive information. This means that malicious doxing, cyberbullying or other...workplace or background investigation realms, as well as the many forms of cyberbullying and malicious rumor-spreading online could be addressed. Doxing...None Sexually harass another person online None Engage in cyberbullying by using the Internet to send offensive, inappropriate verbal allack
Vortex Lattice UXO Mobility Model Integration
2015-03-01
law , no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB...predictions of the fate and transport of a broad-field UXO population are extremely sensitive to the initial state of that population, specifically: the...limit the model’s computational domain. This revised model software was built on the concept of interconnected geomorphic control cells consisting of
Finding, Weighting and Describing Venues: CSIRO at the 2012 TREC Contextual Suggestion Track
2012-11-01
commercial system (namely the Google Places API ), and whether the current experimental setup encourages diversity. The remaining two submissions...baseline systems that rely on the Google Places API and the user reviews it provides, and two more complex systems that incorporate information...from the Foursquare API , and are sensitive to personal preference and time. The remainder of this paper is structured as follows. The next section
Invisibly Sanitizable Digital Signature Scheme
NASA Astrophysics Data System (ADS)
Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.
Diergaarde, Brenda; Bowen, Deborah J; Ludman, Evette J; Culver, Julie O; Press, Nancy; Burke, Wylie
2007-03-15
Genetic information is used increasingly in health care. Some experts have argued that genetic information is qualitatively different from other medical information and, therefore, raises unique social issues. This view, called "genetic exceptionalism," has importantly influenced recent policy efforts. Others have argued that genetic information is like other medical information and that treating it differently may actually result in unintended disparities. Little is known about how the general public views genetic information. To identify opinions about implications of genetic and other medical information among the general population, we conducted a series of focus groups in Seattle, WA. Participants were women and men between ages 18 and 74, living within 30 miles of Seattle and members of the Group Health Cooperative. A structured discussion guide was used to ensure coverage of all predetermined topics. Sessions lasted approximately 2 hr; were audio taped and transcribed. The transcripts formed the basis of the current analysis. Key findings included the theme that genetic information was much like other medical information and that all sensitive medical information should be well protected. Personal choice (i.e., the right to choose whether to know health risk information and to control who else knows) was reported to be of crucial importance. Participants had an understanding of the tensions involved in protecting privacy versus sharing medical information to help another person. These data may guide future research and policy concerning the use and protection of medical information, including genetic information. (c) 2007 Wiley-Liss, Inc.
Moral Duties of Genomics Researchers: Why Personalized Medicine Requires a Collective Approach.
Vos, Shoko; van Delden, Johannes J M; van Diest, Paul J; Bredenoord, Annelien L
2017-02-01
Advances in genome sequencing together with the introduction of personalized medicine offer promising new avenues for research and precision treatment, particularly in the field of oncology. At the same time, the convergence of genomics, bioinformatics, and the collection of human tissues and patient data creates novel moral duties for researchers. After all, unprecedented amounts of potentially sensitive information are being generated. Over time, traditional research ethics principles aimed at protecting individual participants have become supplemented with social obligations related to the interests of society and the research enterprise at large, illustrating that genomic medicine is also a social endeavor. In this review we provide a comprehensive assembly of moral duties that have been attributed to genomics researchers and offer suggestions for responsible advancement of personalized genomic cancer care. Copyright © 2016 Elsevier Ltd. All rights reserved.
Navigating legal constraints in clinical data warehousing: a case study in personalized medicine
Jefferys, Benjamin R.; Nwankwo, Iheanyi; Neri, Elias; Chang, David C. W.; Shamardin, Lev; Hänold, Stefanie; Graf, Norbert; Forgó, Nikolaus; Coveney, Peter
2013-01-01
Personalized medicine relies in part upon comprehensive data on patient treatment and outcomes, both for analysis leading to improved models that provide the basis for enhanced treatment, and for direct use in clinical decision-making. A data warehouse is an information technology for combining and standardizing multiple databases. Data warehousing of clinical data is constrained by many legal and ethical considerations, owing to the sensitive nature of the data being stored. We describe an unconstrained clinical data warehousing architecture, some of the legal constraints that have led us to reconsider this architecture, and the legal and technical solutions to these constraints developed for the clinical data warehouse in the personalized medicine project p-medicine. We also propose some changes to the legal constraints that will further enable clinical research. PMID:24427531
High-sensitive factor I and C-reactive protein based biomarkers for coronary artery disease.
Zhao, Qing; Du, Jian-Shi; Han, Dong-Mei; Ma, Ying
2014-01-01
An analysis of high-sensitive factor I and C-reactive proteins as biomarkers for coronary artery disease has been performed from 19 anticipated cohort studies that included 21,567 participants having no information about coronary artery disease. Besides, the clinical implications of statin therapy initiated due to assessment of factor I and C-reactive proteins have also been modeled during studies. The measure of risk discrimination (C-index) was increased (by 0.0101) as per the prognostic model for coronary artery disease with respect to sex, smoking status, age, blood pressure, total cholesterol level along with diabetic history characteristic parameters. The C-index was further raised by 0.0045 and 0.0053 when factor I and C-reactive proteins based information were added, respectively which finally predicted 10-year risk categories as: high (> 20%), medium (10% to < 20%), and low (< 10%) risks. We found 2,254 persons (among 15,000 adults (age ≥ 45 years)) would initially be classified as being at medium risk for coronary artery disease when only conventional risk factors were used as calculated risk. Besides, persons with a predicted risk of more than 20% as well as for persons suffering from other risk factors (i.e. diabetes), statin therapy was initiated (irrespective of their decade old predicted risk). We conclude that under current treatment guidelines assessment of factor I and C-reactive proteins levels (as biomarker) in people at medium risk for coronary artery disease could prevent one additional coronary artery disease risk over a period a decade for every 390-500 people screened.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-01-01
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776
Sensitivity analysis in a Lassa fever deterministic mathematical model
NASA Astrophysics Data System (ADS)
Abdullahi, Mohammed Baba; Doko, Umar Chado; Mamuda, Mamman
2015-05-01
Lassa virus that causes the Lassa fever is on the list of potential bio-weapons agents. It was recently imported into Germany, the Netherlands, the United Kingdom and the United States as a consequence of the rapid growth of international traffic. A model with five mutually exclusive compartments related to Lassa fever is presented and the basic reproduction number analyzed. A sensitivity analysis of the deterministic model is performed. This is done in order to determine the relative importance of the model parameters to the disease transmission. The result of the sensitivity analysis shows that the most sensitive parameter is the human immigration, followed by human recovery rate, then person to person contact. This suggests that control strategies should target human immigration, effective drugs for treatment and education to reduced person to person contact.
Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J
2009-01-01
Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.
Ethical sharing of health data in online platforms - which values should be considered?
Riso, Brígida; Tupasela, Aaro; Vears, Danya F; Felzmann, Heike; Cockbain, Julian; Loi, Michele; Kongsholm, Nana C H; Zullo, Silvia; Rakic, Vojin
2017-08-21
Intensified and extensive data production and data storage are characteristics of contemporary western societies. Health data sharing is increasing with the growth of Information and Communication Technology (ICT) platforms devoted to the collection of personal health and genomic data. However, the sensitive and personal nature of health data poses ethical challenges when data is disclosed and shared even if for scientific research purposes.With this in mind, the Science and Values Working Group of the COST Action CHIP ME 'Citizen's Health through public-private Initiatives: Public health, Market and Ethical perspectives' (IS 1303) identified six core values they considered to be essential for the ethical sharing of health data using ICT platforms. We believe that using this ethical framework will promote respectful scientific practices in order to maintain individuals' trust in research.We use these values to analyse five ICT platforms and explore how emerging data sharing platforms are reconfiguring the data sharing experience from a range of perspectives. We discuss which types of values, rights and responsibilities they entail and enshrine within their philosophy or outlook on what it means to share personal health information. Through this discussion we address issues of the design and the development process of personal health data and patient-oriented infrastructures, as well as new forms of technologically-mediated empowerment.
Cognitive processing load as a determinant of stuttering: summary of a research programme.
Bosshardt, Hans-Georg
2006-07-01
The present paper integrates the results of experimental studies in which cognitive differences between stuttering and nonstuttering adults were investigated. In a monitoring experiment it was found that persons who stutter encode semantic information more slowly than nonstuttering persons. In dual-task experiments the two groups were compared in overt word-repetition and sentence-production experiments. The results of the two word-repetition experiments indicate that the speech of stuttering persons is sensitive to interference from concurrent attention-demanding cognitive processing-particularly when phonological coding is involved. In two sentence-generation and -production experiments it was found that under dual-task conditions stuttering persons produced sentences containing a smaller number of content units whereas persons who do not stutter did not show a significant single- vs. dual-task contrast. These results suggest that sentence generation and production required greater sustained attentional processing in stuttering than in nonstuttering persons and that persons who stutter reduce the amount of "conceptual work" in order to keep their stuttering rates low. Data from an fMRI-study indicate that in persons who stutter the neural systems activated during sentence generation and production overlap to a greater extent than those of persons who do not stutter. It is suggested that in persons who stutter neural subsystems involved in speech planning are "modularized" to a lesser extent than in persons who do not stutter.
An overview of depression-prone personality traits and the role of interpersonal sensitivity.
Boyce, P; Mason, C
1996-02-01
A number of personality styles have been proposed as vulnerability traits to depression. In this paper methodological problems associated with identifying such traits are discussed. These include state effects contaminating personality scales and the issue of depressive heterogeneity. Potential depression-prone personality traits are then discussed, including obsessionality, neuroticism, dependency and cognitive dysfunction. High interpersonal sensitivity as a risk factor to depression is then discussed.
Liu, Z; Sun, J; Smith, M; Smith, L; Warr, R
2013-11-01
Computer-assisted diagnosis (CAD) of malignant melanoma (MM) has been advocated to help clinicians to achieve a more objective and reliable assessment. However, conventional CAD systems examine only the features extracted from digital photographs of lesions. Failure to incorporate patients' personal information constrains the applicability in clinical settings. To develop a new CAD system to improve the performance of automatic diagnosis of melanoma, which, for the first time, incorporates digital features of lesions with important patient metadata into a learning process. Thirty-two features were extracted from digital photographs to characterize skin lesions. Patients' personal information, such as age, gender and, lesion site, and their combinations, was quantified as metadata. The integration of digital features and metadata was realized through an extended Laplacian eigenmap, a dimensionality-reduction method grouping lesions with similar digital features and metadata into the same classes. The diagnosis reached 82.1% sensitivity and 86.1% specificity when only multidimensional digital features were used, but improved to 95.2% sensitivity and 91.0% specificity after metadata were incorporated appropriately. The proposed system achieves a level of sensitivity comparable with experienced dermatologists aided by conventional dermoscopes. This demonstrates the potential of our method for assisting clinicians in diagnosing melanoma, and the benefit it could provide to patients and hospitals by greatly reducing unnecessary excisions of benign naevi. This paper proposes an enhanced CAD system incorporating clinical metadata into the learning process for automatic classification of melanoma. Results demonstrate that the additional metadata and the mechanism to incorporate them are useful for improving CAD of melanoma. © 2013 British Association of Dermatologists.
Croy, Ilona; Springborn, Maria; Lötsch, Jörn; Johnston, Amy N. B.; Hummel, Thomas
2011-01-01
Correlations between personality traits and a wide range of sensory thresholds were examined. Participants (N = 124) completed a personality inventory (NEO-FFI) and underwent assessment of olfactory, trigeminal, tactile and gustatory detection thresholds, as well as examination of trigeminal and tactile pain thresholds. Significantly enhanced odor sensitivity in socially agreeable people, significantly enhanced trigeminal sensitivity in neurotic subjects, and a tendency for enhanced pain tolerance in highly conscientious participants was revealed. It is postulated that varied sensory processing may influence an individual's perception of the environment; particularly their perception of socially relevant or potentially dangerous stimuli and thus, varied with personality. PMID:21556139
Croy, Ilona; Springborn, Maria; Lötsch, Jörn; Johnston, Amy N B; Hummel, Thomas
2011-04-27
Correlations between personality traits and a wide range of sensory thresholds were examined. Participants (N = 124) completed a personality inventory (NEO-FFI) and underwent assessment of olfactory, trigeminal, tactile and gustatory detection thresholds, as well as examination of trigeminal and tactile pain thresholds. Significantly enhanced odor sensitivity in socially agreeable people, significantly enhanced trigeminal sensitivity in neurotic subjects, and a tendency for enhanced pain tolerance in highly conscientious participants was revealed. It is postulated that varied sensory processing may influence an individual's perception of the environment; particularly their perception of socially relevant or potentially dangerous stimuli and thus, varied with personality.
The electrophotonic silicon biosensor
NASA Astrophysics Data System (ADS)
Juan-Colás, José; Parkin, Alison; Dunn, Katherine E.; Scullion, Mark G.; Krauss, Thomas F.; Johnson, Steven D.
2016-09-01
The emergence of personalized and stratified medicine requires label-free, low-cost diagnostic technology capable of monitoring multiple disease biomarkers in parallel. Silicon photonic biosensors combine high-sensitivity analysis with scalable, low-cost manufacturing, but they tend to measure only a single biomarker and provide no information about their (bio)chemical activity. Here we introduce an electrochemical silicon photonic sensor capable of highly sensitive and multiparameter profiling of biomarkers. Our electrophotonic technology consists of microring resonators optimally n-doped to support high Q resonances alongside electrochemical processes in situ. The inclusion of electrochemical control enables site-selective immobilization of different biomolecules on individual microrings within a sensor array. The combination of photonic and electrochemical characterization also provides additional quantitative information and unique insight into chemical reactivity that is unavailable with photonic detection alone. By exploiting both the photonic and the electrical properties of silicon, the sensor opens new modalities for sensing on the microscale.
Pané-Farré, Christiane A; Alius, Manuela G; Modeß, Christiane; Methling, Karen; Blumenthal, Terry; Hamm, Alfons O
2015-06-01
This study aimed to test how expectations and anxiety sensitivity influence respiratory and autonomic responses to caffeine. The current study investigated the effects of expected vs. unexpected caffeine ingestion in a group of persons prone to the anxiety-provoking effect of caffeine (high anxiety sensitive persons, that is, persons scoring at least one SD above the mean on the Anxiety Sensitivity Index (Peterson and Reiss 1992)) as compared to low-anxious controls. Autonomic arousal (heart rate, skin conductance level), respiratory responding (expired CO2, minute ventilation), and subjective report were assessed in high and low anxiety sensitive participants immediately after beverage consumption and at absorption peak (30 min post-consumption) in four separate sessions during which either coffee (expectation of caffeine) or bitter lemon soda (no expectation of caffeine) was crossed with 4 mg/kg caffeine vs. no drug. High and low anxiety sensitive persons showed comparable autonomic arousal and symptom reports to caffeine which was modulated by expectation, i.e., greater for coffee. Respiratory responding (CO2 decrease, minute ventilation increase) was more accentuated when caffeine was both expected and administered in the low anxiety sensitive group but more accentuated when caffeine was unexpectedly administered in the high anxiety sensitive group. Autonomic arousal and respiratory effects were observable within a few minutes after caffeine administration and were most pronounced at maximum absorption. The results highlight the modulating role of expectancies in respiratory responding to caffeine in low vs. high anxiety sensitive persons and might have important implications for the better understanding of unexpected panic attacks.
Protecting Patient Records from Unwarranted Access
NASA Astrophysics Data System (ADS)
Gardner, Ryan; Garera, Sujata; Rubin, Aviel D.; Rajan, Anand; Rozas, Carlos V.; Sastry, Manoj
Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.
NASA Astrophysics Data System (ADS)
Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo
2008-06-01
We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.
Jesus, Tiago S; Bright, Felicity; Kayes, Nicola; Cott, Cheryl A
2016-07-19
Person-centredness is a philosophy for organising and delivering healthcare based on patients' needs, preferences and experiences. Although widely endorsed, the concept suffers from a lack of detail and clarification, in turn accounting for ambiguous implementation and outcomes. While a conceptual framework based on a systematic review defines person/patient-centred care components (Scholl et al, 2014), it applies across healthcare contexts and may not be sensitive to the nuances of the rehabilitation of adults with physical impairments. Accordingly, this study aims to build a conceptual framework, based on existing literature, of what person-centredness means in the rehabilitation of adults with physical impairments in the clinical encounter and broader health service delivery. We will use a scoping review methodology. Searches on relevant databases will be conducted first, combining keywords for 'rehabilitation', 'person-centered' and associated terms (including patient preferences/experiences). Next, snowball searches (citation tracking, references lists) will be performed. Papers will be included if they fall within predefined selection categories (seen as most likely informative on elements pertaining to person-centred rehabilitation) and are written in English, regardless of design (conceptual, qualitative, quantitative). Two reviewers will independently screen titles and abstracts, followed by screening of the full text to determine inclusion. Experts will then be consulted to identify relevant missing papers. This can include elements other than the peer-reviewed literature (eg, book chapters, policy/legal papers). Finally, information that helps to build the concept and practice of person-centred rehabilitation will be abstracted independently by two reviewers and analysed by inductive thematic analysis to build the conceptual framework. The resulting framework will aid clarification regarding person-centred rehabilitation, which in turn is expected to conceptually ground and inform its operationalisation (eg, measurement, implementation, improvement). Findings will be disseminated through local, national and international stakeholders, both at the clinical and service organisation levels. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Shabani, Mahsa; Borry, Pascal
2018-02-01
Genetic data contain sensitive health and non-health-related information about the individuals and their family members. Therefore, adopting adequate privacy safeguards is paramount when processing genetic data for research or clinical purposes. One of the major legal instruments for personal data protection in the EU is the new General Data Protection Regulation (GDPR), which has entered into force in May 2016 and repealed the Directive 95/46/EC, with an ultimate goal of enhancing effectiveness and harmonization of personal data protection in the EU. This paper explores the major provisions of the new Regulation with regard to processing genetic data, and assesses the influence of such provisions on reinforcing the legal safeguards when sharing genetic data for research purposes. The new Regulation attempts to elucidate the scope of personal data, by recognizing pseudonymized data as personal (identifiable) data, and including genetic data in the catalog of special categories of data (sensitive data). Moreover, a set of new rules is laid out in the Regulation for processing personal data under the scientific research exemption. For instance, further use of genetic data for scientific research purposes, without obtaining additional consent will be allowed, if the specific conditions is met. The new Regulation has already fueled concerns among various stakeholders, owing to the challenges that may emerge when implementing the Regulation across the countries. Notably, the provided definition for pseudonymized data has been criticized because it leaves too much room for interpretations, and it might undermine the harmonization of the data protection across the countries.
Comprehensive restriction enzyme lists to update any DNA sequence computer program.
Raschke, E
1993-04-01
Restriction enzyme lists are presented for the practical working geneticist to update any DNA computer program. These lists combine formerly scattered information and contain all presently known restriction enzymes with a unique recognition sequence, a cut site, or methylation (in)sensitivity. The lists are in the shortest possible form to also be functional with small DNA computer programs, and will produce clear restriction maps without any redundancy or loss of information. The lists discern between commercial and noncommercial enzymes, and prototype enzymes and different isoschizomers are cross-referenced. Differences in general methylation sensitivities and (in)sensitivities against Dam and Dcm methylases of Escherichia coli are indicated. Commercial methylases and intron-encoded endonucleases are included. An address list is presented to contact commercial suppliers. The lists are constantly updated and available in electronic form as pure US ASCII files, and in formats for the DNA computer programs DNA-Strider for Apple Macintosh, and DNAsis for IBM personal computers or compatibles via e-mail from the internet address: NETSERV@EMBL-HEIDELBERG.DE by sending only the message HELP RELIBRARY.
Danguilan, M
1995-04-01
The Philippine Commission on Population (POPCOM) sets and coordinates the country's population policy. POPCOM launched Gender I in early 1994 in the attempt to find out how aware and sensitive its board of commissioners, staff, and the provincial and city population officers were on gender and population issues. The assessment covered the respondents' gender relations at the workplace; gender, work, and family responsibilities; job satisfaction; their perceptions about gender-related issues in reproductive health; personal sex attitudes; and general perceptions on gender issues. The project also explored respondents' knowledge and perceptions on population growth and structure; population information generation and use; quality of life; reproductive health; law, ethics, and policy; and men's and women's roles. Having completed the institutional assessment, POPCOM has now implemented the Gender II project designed to strengthen the formulation, coordination, and implementation of gender-aware population and reproductive health policies and programs. Project activities include policy review and framework development, capability building through gender and reproductive health training and information management, and special research projects.
Personality traits as vulnerability factors in body dysmorphic disorder.
Schieber, Katharina; Kollei, Ines; de Zwaan, Martina; Müller, Astrid; Martin, Alexandra
2013-11-30
Cognitive behavioural models consider certain personality traits to be risk factors for the development of Body Dysmorphic Disorder (BDD). Research on personality traits in BDD is scarce, therefore this study examined perfectionism, aesthetic sensitivity and the behavioural inhibition system (BIS) in BDD. Furthermore, the association between these personality traits and the extent of dysmorphic concerns was investigated. Individuals with BDD (n=58) and a population based control sample (n=2071), selected from a representative German population survey, completed self-report questionnaires assessing DSM-5 criteria of BDD, dysmorphic concerns, perfectionism, aesthetic sensitivity and BIS-reactivity. Individuals with BDD reported significantly higher degrees of perfectionism as well as of BIS-reactivity compared to the population based control sample, whereas the groups did not differ significantly regarding aesthetic sensitivity. However, for the total sample, each of the personality traits was related dimensionally to dysmorphic concerns. Current BDD models consider perfectionism and aesthetic sensitivity to be vulnerability factors. In addition to these concepts, the present study suggests that BIS-reactivity is related to BDD. Self-reported aesthetic sensitivity was not found to be specifically pronounced in BDD, but along with perfectionism and BIS-reactivity aesthetic sensitivity was generally associated with dysmorphic concerns. © 2013 Elsevier Ireland Ltd. All rights reserved.
Thibodeau, Eric L; August, Gerald J; Cicchetti, Dante; Symons, Frank J
2016-03-01
Preventive interventions that target high-risk youth, via one-size-fits-all approaches, have demonstrated modest effects in reducing rates of substance use. Recently, substance use researchers have recommended personalized intervention strategies. Central to these approaches is matching preventatives to characteristics of an individual that have been shown to predict outcomes. One compelling body of literature on person × environment interactions is that of environmental sensitivity theories, including differential susceptibility theory and vantage sensitivity. Recent experimental evidence has demonstrated that environmental sensitivity (ES) factors moderate substance abuse outcomes. We propose that ES factors may augment current personalization strategies such as matching based on risk factors/severity of problem behaviors (risk severity (RS)). Specifically, individuals most sensitive to environmental influence may be those most responsive to intervention in general and thus need only a brief-type or lower-intensity program to show gains, while those least sensitive may require more comprehensive or intensive programming for optimal responsiveness. We provide an example from ongoing research to illustrate how ES factors can be incorporated into prevention trials aimed at high-risk adolescents.
Person perception and the bounded rationality of social judgment.
Wright, J C; Dawson, V L
1988-11-01
In this article, we develop a bounded rationality view of the relation between person perception and social behavior. Two theses of this approach are that behaviors vary in their significance to observers, and that observers pursue bounded rather than global utility in forming personality impressions. Observers are expected to be sensitive to targets' overall behavioral tendencies and to the variability of their behavior across situations, but both sensitivities are bounded, being greater for behaviors that directly affect observers' outcomes. In two investigations involving extensive hourly and 6-s observations, we examined the bounded utility of people's impressions of personality, demonstrating how impression accuracy is linked to the significance of behaviors. Observers were sensitive to the organization of aggressive behaviors, but less sensitive to the organization of withdrawn behaviors, even when the consistency of those behaviors was comparable. The results clarify the relation between people's inferential shortcomings in laboratory paradigms and the bounded utility of person perception in the natural environment.
Bijttebier, Patricia; Beck, Ilse; Claes, Laurence; Vandereycken, Walter
2009-07-01
Gray's Reinforcement Sensitivity Theory (RST) presupposes individual differences in the sensitivity of basic brain systems that respond to punishing and reinforcing stimuli. These differences are thought to underlie the personality dimensions of anxiety and impulsivity, and to have relevance for psychopathology. The present article aims at reviewing RST-based research on personality-psychopathology associations. First, RST and its revisions are described and the link between RST systems and personality dimensions is discussed. Second, studies investigating associations between RST systems and specific types of psychopathology are summarized. Although the available research yields a rather consistent picture with respect to constellations of BIS/BAS sensitivity that are associated with specific types of psychopathology, it also provides a clear indication that much work remains to be done. The discussion section highlights several topics that deserve future research attention.
Ferreira, Ana Paula A; Póvoa, Luciana C; Zanier, José F C; Ferreira, Arthur S
2017-02-01
The aim of this study was to develop and validate a multivariate prediction model, guided by palpation and personal information, for locating the seventh cervical spinous process (C7SP). A single-blinded, cross-sectional study at a primary to tertiary health care center was conducted for model development and temporal validation. One-hundred sixty participants were prospectively included for model development (n = 80) and time-split validation stages (n = 80). The C7SP was located using the thorax-rib static method (TRSM). Participants underwent chest radiography for assessment of the inner body structure located with TRSM and using radio-opaque markers placed over the skin. Age, sex, height, body mass, body mass index, and vertex-marker distance (D V-M ) were used to predict the distance from the C7SP to the vertex (D V-C7 ). Multivariate linear regression modeling, limits of agreement plot, histogram of residues, receiver operating characteristic curves, and confusion tables were analyzed. The multivariate linear prediction model for D V-C7 (in centimeters) was D V-C7 = 0.986D V-M + 0.018(mass) + 0.014(age) - 1.008. Receiver operating characteristic curves had better discrimination of D V-C7 (area under the curve = 0.661; 95% confidence interval = 0.541-0.782; P = .015) than D V-M (area under the curve = 0.480; 95% confidence interval = 0.345-0.614; P = .761), with respective cutoff points at 23.40 cm (sensitivity = 41%, specificity = 63%) and 24.75 cm (sensitivity = 69%, specificity = 52%). The C7SP was correctly located more often when using predicted D V-C7 in the validation sample than when using the TRSM in the development sample: n = 53 (66%) vs n = 32 (40%), P < .001. Better accuracy was obtained when locating the C7SP by use of a multivariate model that incorporates palpation and personal information. Copyright © 2016. Published by Elsevier Inc.
Taiwan Regulation of Biobanks.
Fan, Chien-Te; Hung, Tzu-Hsun; Yeh, Chan-Kun
2015-01-01
This paper introduces legal framework and governance structure in relation to the management and development of biobanks in Taiwan. At first, we briefly describe Taiwan's population, political system and health care system. Secondly, this research introduces biobanking framework of Taiwan including 25 biobanks established with the approval of the Ministry of Health and Welfare. In those biobanks, "Taiwan Biobank" is the first and the largest government-supported biobank which comprises population-based cohort study and disease- oriented study. Since the collection of information, data, and biological specimen of biobanks often involve highly sensitive personal information, in the legal framework of Taiwan, there is a specific regulation, "Human Biobank Management Act" (HBMA), which plays an important role in regulating biobanks in Taiwan. HBMA, the Personal Information Act and other regulations constitute a comprehensive legal and regulatory privacy framework of biobanks. Through the introduction and analysis of the current legal framework applicable to biobanks, we found that there are several challenges that need to be solved appropriately that involve duplicate review systems, the obstacles in the international collaboration, and data sharing between biobanks in Taiwan. © 2015 American Society of Law, Medicine & Ethics, Inc.
A personalized health-monitoring system for elderly by combining rules and case-based reasoning.
Ahmed, Mobyen Uddin
2015-01-01
Health-monitoring system for elderly in home environment is a promising solution to provide efficient medical services that increasingly interest by the researchers within this area. It is often more challenging when the system is self-served and functioning as personalized provision. This paper proposed a personalized self-served health-monitoring system for elderly in home environment by combining general rules with a case-based reasoning approach. Here, the system generates feedback, recommendation and alarm in a personalized manner based on elderly's medical information and health parameters such as blood pressure, blood glucose, weight, activity, pulse, etc. A set of general rules has used to classify individual health parameters. The case-based reasoning approach is used to combine all different health parameters, which generates an overall classification of health condition. According to the evaluation result considering 323 cases and k=2 i.e., top 2 most similar retrieved cases, the sensitivity, specificity and overall accuracy are achieved as 90%, 97% and 96% respectively. The preliminary result of the system is acceptable since the feedback; recommendation and alarm messages are personalized and differ from the general messages. Thus, this approach could be possibly adapted for other situations in personalized elderly monitoring.
Bashapoor, Sajjad; Hosseini-Kiasari, Seyyedeh Tayebeh; Daneshvar, Somayeh; Kazemi-Taskooh, Zeinab
2015-01-01
Sensory information processing and alexithymia are two important factors in determining behavioral reactions. Some studies explain the effect of the sensitivity of sensory processing and alexithymia in the tendency to substance abuse. Giving that, the aim of the current study was to compare the styles of sensory information processing and alexithymia between substance-dependent people and normal ones. The research method was cross-sectional and the statistical population of the current study comprised of all substance-dependent men who are present in substance quitting camps of Masal, Iran, in October 2013 (n = 78). 36 persons were selected randomly by simple randomly sampling method from this population as the study group, and 36 persons were also selected among the normal population in the same way as the comparison group. Both groups was evaluated by using Toronto alexithymia scale (TAS) and adult sensory profile, and the multivariate analysis of variance (MANOVA) test was applied to analyze data. The results showed that there are significance differences between two groups in low registration (P < 0.020, F = 5.66), sensation seeking (P < 0.050, F = 1.92), and sensory avoidance (P < 0.008, F = 7.52) as a components of sensory processing and difficulty in describing emotions (P < 0.001, F = 15.01) and difficulty in identifying emotions (P < 0.002, F = 10.54) as a components of alexithymia. However, no significant difference were found between two groups in components of sensory sensitivity (P < 0.170, F = 1.92) and external oriented thinking style (P < 0.060, F = 3.60). These results showed that substance-dependent people process sensory information in a different way than normal people and show more alexithymia features than them.
Bashapoor, Sajjad; Hosseini-Kiasari, Seyyedeh Tayebeh; Daneshvar, Somayeh; Kazemi-Taskooh, Zeinab
2015-01-01
Background Sensory information processing and alexithymia are two important factors in determining behavioral reactions. Some studies explain the effect of the sensitivity of sensory processing and alexithymia in the tendency to substance abuse. Giving that, the aim of the current study was to compare the styles of sensory information processing and alexithymia between substance-dependent people and normal ones. Methods The research method was cross-sectional and the statistical population of the current study comprised of all substance-dependent men who are present in substance quitting camps of Masal, Iran, in October 2013 (n = 78). 36 persons were selected randomly by simple randomly sampling method from this population as the study group, and 36 persons were also selected among the normal population in the same way as the comparison group. Both groups was evaluated by using Toronto alexithymia scale (TAS) and adult sensory profile, and the multivariate analysis of variance (MANOVA) test was applied to analyze data. Findings The results showed that there are significance differences between two groups in low registration (P < 0.020, F = 5.66), sensation seeking (P < 0.050, F = 1.92), and sensory avoidance (P < 0.008, F = 7.52) as a components of sensory processing and difficulty in describing emotions (P < 0.001, F = 15.01) and difficulty in identifying emotions (P < 0.002, F = 10.54) as a components of alexithymia. However, no significant difference were found between two groups in components of sensory sensitivity (P < 0.170, F = 1.92) and external oriented thinking style (P < 0.060, F = 3.60). Conclusion These results showed that substance-dependent people process sensory information in a different way than normal people and show more alexithymia features than them. PMID:26885354
Methodological and ethical issues related to qualitative telephone interviews on sensitive topics.
Mealer, Meredith; Jones Rn, Jacqueline
2014-03-01
To explore the methodological and ethical issues of conducting qualitative telephone interviews about personal or professional trauma with critical care nurses. The most common method for conducting interviews is face-to-face. However, there is evidence to support telephone interviewing on a variety of sensitive topics including post-traumatic stress disorder (PTSD). Qualitative telephone interviews can limit emotional distress because of the comfort experienced through virtual communication. Critical care nurses are at increased risk of developing PTSD due to the cumulative exposure to work-related stress in the intensive care unit. We explored the methodological and ethical issues of conducting qualitative telephone interviews, drawing on our experiences communicating with a group of critical care nurses. Qualitative research interviews with 27 critical care nurses. Fourteen of the nurses met the diagnostic criteria for PTSD; 13 did not and had scores consistent with high levels of resilience. This is a methodology paper on the authors' experiences of interviewing critical care nurses on sensitive topics via the telephone. The authors found that establishing rapport and connections with the participants and the therapeutic use of non-verbal communication were essential, and fostered trust and compassion. The ethical issues of this mode of communication include protecting the privacy and confidentiality associated with the disclosure of sensitive information, and minimising the risk of psychological harm to the researcher and participants. Qualitative telephone interviews are a valuable method of collecting information on sensitive topics. This paper explores a method of interviewing in the workplace. It will help inform interventions to promote healthy adaptation following trauma exposure in the intensive care unit.
Frazier, T; Yount, K M
2017-02-01
Detecting sensitive health information in clinical settings is of scientific and practical importance. The purpose of this study was to determine whether mode of screening influenced disclosure of intimate partner violence (IPV) in patterns similar to other forms of sensitive information. This cross sectional study was designed to compare effects of face-to-face vs computer self-assessment for sensitive health information on disclosure rates. Multivariate logistic regression was used for the analysis. Data were collected in 2012 from 639 eligible African American consenting women receiving services in women, infants and children (WIC) clinics. Women were randomized to complete assessments of sensitive exposures via computer-assisted self-interview (CASI) or face-to-face interview (FTFI). Those with complete information were included in the analysis (n = 616). Of 39 sensitive health exposures, reporting was higher for FTFI than CASI for exposure to IPV (7 of 7 outcomes), tobacco use (2 of 3 outcomes) and reproductive health care (2 of 3 outcomes). For example, face-to-face improved disclosure of IPV in the last year (adjusted odds ratios [aOR] = 2.27; 95% CI = 1.60-3.21) and any drug, tobacco or alcohol in the last week (aOR = 1.39; 95% CI = 1.00-1.93). Trained personnel may enhance disclosure above computer-based assessments for IPV for African American women receiving public assistance through The Special Supplemental Nutrition Program for Women, Infants and Children (WIC) Propensities to disclose sexual health behaviour and drug use by CASI may not apply to IPV in this population. The context and personal motivations influence women's decision to disclose IPV. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
The Role of Reinforcement Sensitivity in the Development of Childhood Personality
ERIC Educational Resources Information Center
Slobodskaya, Helena R.; Kuznetsova, Valeriya B.
2013-01-01
The study examined the contribution of reinforcement sensitivity to childhood personality at three levels of the hierarchical structure, mid-level traits, the Big Five and two higher-order factors, and the moderating role of sex and age in a sample of 3-18-year-olds. The canonical correlation analyses indicated that reinforcement sensitivity and…
QuickCash: Secure Transfer Payment Systems
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
2017-01-01
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846
QuickCash: Secure Transfer Payment Systems.
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
2017-06-13
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.
van der Meulen, Ineke; van de Sandt-Koenderman, W Mieke E; Duivenvoorden, Hugo J; Ribbers, Gerard M
2010-01-01
This study explores the psychometric qualities of the Scenario Test, a new test to assess daily-life communication in severe aphasia. The test is innovative in that it: (1) examines the effectiveness of verbal and non-verbal communication; and (2) assesses patients' communication in an interactive setting, with a supportive communication partner. To determine the reliability, validity, and sensitivity to change of the Scenario Test and discuss its clinical value. The Scenario Test was administered to 122 persons with aphasia after stroke and to 25 non-aphasic controls. Analyses were performed for the entire group of persons with aphasia, as well as for a subgroup of persons unable to communicate verbally (n = 43). Reliability (internal consistency, test-retest reliability, inter-judge, and intra-judge reliability) and validity (internal validity, convergent validity, known-groups validity) and sensitivity to change were examined using standard psychometric methods. The Scenario Test showed high levels of reliability. Internal consistency (Cronbach's alpha = 0.96; item-rest correlations = 0.58-0.82) and test-retest reliability (ICC = 0.98) were high. Agreement between judges in total scores was good, as indicated by the high inter- and intra-judge reliability (ICC = 0.86-1.00). Agreement in scores on the individual items was also good (square-weighted kappa values 0.61-0.92). The test demonstrated good levels of validity. A principal component analysis for categorical data identified two dimensions, interpreted as general communication and communicative creativity. Correlations with three other instruments measuring communication in aphasia, that is, Spontaneous Speech interview from the Aachen Aphasia Test (AAT), Amsterdam-Nijmegen Everyday Language Test (ANELT), and Communicative Effectiveness Index (CETI), were moderate to strong (0.50-0.85) suggesting good convergent validity. Group differences were observed between persons with aphasia and non-aphasic controls, as well as between persons with aphasia unable to use speech to convey information and those able to communicate verbally; this indicates good known-groups validity. The test was sensitive to changes in performance, measured over a period of 6 months. The data support the reliability and validity of the Scenario Test as an instrument for examining daily-life communication in aphasia. The test focuses on multimodal communication; its psychometric qualities enable future studies on the effect of Alternative and Augmentative Communication (AAC) training in aphasia.
Gender differences in the influence of personality traits on spicy food liking and intake
Byrnes, Nadia K.; Hayes, John E.
2015-01-01
It has been proposed, and only minimally explored, that personality factors may play a role in determining an individual's sensitivity to and preference for capsaicin containing foods. We explored these relationships further here. Participants rated a number of foods and sensations on a generalized liking scale in a laboratory setting; after leaving the laboratory, they filled out an online personality survey, which included Arnett's Inventory of Sensation Seeking (AISS) and the Sensitivity to Punishment-Sensitivity to Reward Questionnaire (SPSRQ). Recently, we reported strong and moderate correlations between the liking of a spicy meal and the personality constructs of Sensation Seeking (AISS) and Sensitivity to Reward (SPSRQ), respectively. Here, we use moderation models to explore the relationships between personality traits, perceived intensity of the burn of capsaicin, and the liking and consumption of spicy foods. Limited evidence of moderation was observed; however differential effects of the personality traits were seen in men versus women. In men, Sensitivity to Reward associated more strongly with liking and consumption of spicy foods, while in women, Sensation Seeking associated more strongly with liking and intake of spicy foods. These differences suggest that in men and women, there may be divergent mechanisms leading to the intake of spicy foods; specifically, men may respond more to extrinsic factors, while women may respond more to intrinsic factors. PMID:25663751
Cook, Karon F; Kallen, Michael A; Bombardier, Charles; Bamer, Alyssa M; Choi, Seung W; Kim, Jiseon; Salem, Rana; Amtmann, Dagmar
2017-01-01
To evaluate whether items of three measures of depressive symptoms function differently in persons with spinal cord injury (SCI) than in persons from a primary care sample. This study was a retrospective analysis of responses to the Patient Health Questionnaire depression scale, the Center for Epidemiological Studies Depression scale, and the National Institutes of Health Patient-Reported Outcomes Measurement Information System (PROMIS ® ) version 1.0 eight-item depression short form 8b (PROMIS-D). The presence of differential item function (DIF) was evaluated using ordinal logistic regression. No items of any of the three target measures were flagged for DIF based on standard criteria. In a follow-up sensitivity analyses, the criterion was changed to make the analysis more sensitive to potential DIF. Scores were corrected for DIF flagged under this criterion. Minimal differences were found between the original scores and those corrected for DIF under the sensitivity criterion. The three depression screening measures evaluated in this study did not perform differently in samples of individuals with SCI compared to general and community samples. Transdiagnostic symptoms did not appear to spuriously inflate depression severity estimates when administered to people with SCI.
Lewis, Cara C; Matheson, Deborah H; Brimacombe, C A Elizabeth
2011-09-01
The focus of the current study is whether, and why, female patients limit or alter their personal histories when discussing sensitive subject matter with their physician in birth control clinics. Fifty-six female patients (M = 21.6 years, SD = 3.05) completed anonymous questionnaires exploring their comfort with and ability to disclose personal histories in the immediately preceding interview with the physician. The present study used communication privacy management (CPM) as the theoretical lens through which to view the interaction. Approximately one-half of the sample (46%) reported limiting or altering information. Patients with a highly permeable privacy orientation, as evidenced by a history of open communication regarding sexual issues, were those who reported fully disclosing to their physicians. Of the physician characteristics considered to map onto patient privacy rules, the physician's gender, hurriedness, friendliness, use of a first-name introduction, and open-ended questions were significantly related to patients' reported ease in fully disclosing personal information (p < .05). This study presents a novel application of CPM and has implications for training medical students and for parent-child communication regarding sexual issues.
Asher, Lucy; Furrer, Sibylle; Lechner, Isabel; Würbel, Hanno; Melotti, Luca
2017-01-01
In humans, the personality dimension ‘sensory processing sensitivity (SPS)’, also referred to as “high sensitivity”, involves deeper processing of sensory information, which can be associated with physiological and behavioral overarousal. However, it has not been studied up to now whether this dimension also exists in other species. SPS can influence how people perceive the environment and how this affects them, thus a similar dimension in animals would be highly relevant with respect to animal welfare. We therefore explored whether SPS translates to dogs, one of the primary model species in personality research. A 32-item questionnaire to assess the “highly sensitive dog score” (HSD-s) was developed based on the “highly sensitive person” (HSP) questionnaire. A large-scale, international online survey was conducted, including the HSD questionnaire, as well as questions on fearfulness, neuroticism, “demographic” (e.g. dog sex, age, weight; age at adoption, etc.) and “human” factors (e.g. owner age, sex, profession, communication style, etc.), and the HSP questionnaire. Data were analyzed using linear mixed effect models with forward stepwise selection to test prediction of HSD-s by the above-mentioned factors, with country of residence and dog breed treated as random effects. A total of 3647 questionnaires were fully completed. HSD-, fearfulness, neuroticism and HSP-scores showed good internal consistencies, and HSD-s only moderately correlated with fearfulness and neuroticism scores, paralleling previous findings in humans. Intra- (N = 447) and inter-rater (N = 120) reliabilities were good. Demographic and human factors, including HSP score, explained only a small amount of the variance of HSD-s. A PCA analysis identified three subtraits of SPS, comparable to human findings. Overall, the measured personality dimension in dogs showed good internal consistency, partial independence from fearfulness and neuroticism, and good intra- and inter-rater reliability, indicating good construct validity of the HSD questionnaire. Human and demographic factors only marginally affected the HSD-s suggesting that, as hypothesized for human SPS, a genetic basis may underlie this dimension within the dog species. PMID:28520773
Blood Transcriptomics and Metabolomics for Personalized Medicine
2015-10-31
the network by taking addi- tional information as priors. For example, genes with cis-eQTLs (cis means locally acting on a genomic sequence ) could be...Lander ES. Initial impact of the sequencing of the human genome . Nature 2011; 470(7333):187–97. [9] Manolio TA, et al. Finding the missing heritability of...2010;6(2). [80] Hoffman JM, et al. Effects of age, sex, and genotype on high-sensitivity metabolomic profiles in the fruit fly, Drosophila melanogaster
Aoun, Samar M; O'Brien, Mary R; Breen, Lauren J; O'Connor, Margaret
2018-04-15
The diagnosis of Motor Neurone Disease (MND) is devastating for people with MND (PwMND) and their families. The objective of this study is to describe the experiences of PwMND in receiving the diagnosis in order to inform a more person-centred approach to communicating such bad news. The design was an anonymous postal survey facilitated by all MND associations across Australia (2014-15). Survey questions centred on the SPIKES protocol for communicating bad news; each question contained an area for written responses, which were thematically analysed for content. Two hundred and forty-eight responses were received from people with MND (29% response rate). Four themes emerged: challenges in being diagnosed with MND; the emotions experienced; the good and the bad; and links to further information and support. Receiving such a diagnosis requires preparation, forethought, sensitive and individualised care on the part of the neurologist, including where and how the diagnosis is given; the supports required; and timing, amounts and sources of giving information. The emotional reactions of the neurologist also caused a lasting impression on those receiving the diagnosis. This study could form the basis for best practice programs implementing a more person-centred approach to caring for PwMND right from the diagnosis stage. The focus needs to shift on the person's values, preferences, psychosocial and existential concerns in the context of the underlying disease experience and the manner clinical practice is delivered. Copyright © 2018 Elsevier B.V. All rights reserved.
Genes and social justice: a Rawlsian reply to Moore.
Farrelly, Colin
2002-02-01
In this article I critically examine Adam Moore's claim that the threshold for overriding intangible property rights and privacy rights is higher, in relation to genetic enhancement techniques and sensitive personal information, than is commonly suggested. I argue that Moore fails to see how important advances in genetic research are to social justice. Once this point is emphasized one sees that the issue of how formidable overriding these rights are is open to much debate. There are strong reasons, on grounds of social justice, for thinking the importance of such rights is likely to be diminished in the interests of ensuring a more just distribution of genes essential to pursuing what John Rawls calls a person's 'rational plan of life'.
Talk with Tiff: teen's inquiries to a sexual health website.
Buzi, Ruth S; Smith, Peggy B; Barrera, Cristina
2015-01-01
Because of its availability, anonymity, and low cost of access, the Internet is an increasingly common way for adolescents to find information about sensitive issues. Sexual health website question portals are an important way for adolescents to seek personalized information tailored to their individualized needs. Few studies have examined the content within anonymous e-mails sent to these question portals. The purpose of this qualitative evaluation was to analyze thematic content of anonymous e-mails sent through a question portal on a comprehensive sexual health clinic website for an adolescent family planning clinic in a large city in the southwest United States. Between August 2009 and June 2012, the e-mail server received questions from 484 individuals who were seeking sexual health-related information. The authors used a content analysis to identify recurrent themes in the questions submitted. The most common questions regarded the cost of the clinic's services and testing for sexually transmitted diseases. The questions revealed that adolescents lack basic sexual health knowledge and hold many misconceptions. The findings support the usefulness of online question portals as effective venues for teenagers to quickly and anonymously obtain accurate information on sensitive issues.
Interoceptive threat leads to defensive mobilization in highly anxiety sensitive persons.
Melzig, Christiane A; Holtz, Katharina; Michalowski, Jaroslaw M; Hamm, Alfons O
2011-06-01
To study defensive mobilization elicited by the exposure to interoceptive arousal sensations, we exposed highly anxiety sensitive students to a symptom provocation task. Symptom reports, autonomic arousal, and the startle eyeblink response were monitored during guided hyperventilation and a recovery period in 26 highly anxiety sensitive persons and 22 controls. Normoventilation was used as a non-provocative comparison condition. Hyperventilation led to autonomic arousal and a marked increase in somatic symptoms. While high and low anxiety sensitive persons did not differ in their defensive activation during hyperventilation, group differences were detected during early recovery. Highly anxiety sensitive students exhibited a potentiation of startle response magnitudes and increased autonomic arousal after hyper- as compared to after normoventilation, indicating defensive mobilization evoked by the prolonged presence of feared somatic sensations. Copyright © 2010 Society for Psychophysiological Research.
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
STRUCTURE OF THE UNIVERSITY PERSONALITY INVENTORY FOR CHINESE COLLEGE STUDENTS1,2
ZHANG, JIETING; LANZA, STEPHANIE; ZHANG, MINQIANG; SU, BINYUAN
2016-01-01
Summary The University Personality Inventory, a mental health instrument for college students, is frequently used for screening in China. However, its unidimensionality has been questioned. This study examined its dimensions to provide more information about the specific mental problems for students at risk. Four subsamples were randomly created from a sample (N = 6,110; M age = 19.1 yr.) of students at a university in China. Principal component analysis with Promax rotation was applied on the first two subsamples to explore dimension of the inventory. Confirmatory factor analysis was conducted on the third subsample to verify the exploratory dimensions. Finally, the identified factors were compared to the Sympton Checklist–90 (SCL–90) to support validity, and sex differences were examined, based on the fourth subsample. Five factors were identified: Physical Symptoms, Cognitive Symptoms, Emotional Vulnerability, Social Avoidance, and Interpersonal Sensitivity, accounting for 60.3% of the variance. All the five factors were significantly correlated with the SCL–90. Women significantly scored higher than men on Cognitive Symptoms and Interpersonal Sensitivity. PMID:25933045
Luchsinger, José A; Burgio, Louis; Mittelman, Mary; Dunner, Ilana; Levine, Jed A; Kong, Jian; Silver, Stephanie; Ramirez, Mildred; Teresi, Jeanne A
2016-11-25
The prevalence of dementia is increasing without a known cure, resulting in an increasing number of informal caregivers. Caring for a person with dementia results in increased stress and depressive symptoms. There are several behavioural interventions designed to alleviate stress and depressive symptoms in caregivers of persons with dementia with evidence of efficacy. Two of the best-known interventions are the New York University Caregiver Intervention (NYUCI) and the Resources for Enhancing Alzheimer's Caregivers Health (REACH). The effectiveness of the NYUCI and REACH has never been compared. There is also a paucity of data on which interventions are more effective in Hispanics in New York City. Thus, we proposed the Northern Manhattan Hispanic Caregiver intervention Effectiveness Study (NHiCE), a pragmatic clinical trial designed to compare the effectiveness of adaptations of the NYUCI and the REACH in informal Hispanic caregivers of persons with dementia in New York City. NHiCE is a 6-month randomised controlled trial comparing the effectiveness of adaptations of the NYUCI and REACH among 200 Hispanic informal adult caregivers of persons with dementia. The planned number of sessions of the NYUCI and REACH are similar. The primary outcome measures are changes from baseline to 6 months in the Zarit Caregiver Burden Scale and Geriatric Depression Scale. Our primary approach to analyses will be intent-to-treat. The primary analyses will use mixed random effects models, and a full information maximum likelihood approach, with sensitivity analyses using generalised estimating equation. NHiCE is approved by the Institutional Review Board of Columbia University Medical Center (protocol AAAM5150). A Data Safety Monitoring Board monitors the progress of the study. Dissemination will include reports of the characteristics of the study participants, as well as a report of the results of the clinical trial. NCT02092987, Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
NASA Astrophysics Data System (ADS)
Zhang, N.; Huang, H.; Duarte, M.; Zhang, J.
2016-06-01
Social media has developed extremely fast in metropolises in recent years resulting in more and more rumors disturbing our daily lives. Knowing the characteristics of rumor propagation in metropolises can help the government make efficient rumor refutation plans. In this paper, we established a dynamic spatio-temporal comprehensive risk assessment model for rumor propagation based on an improved 8-state ICSAR model (Ignorant, Information Carrier, Information Spreader, Advocate, Removal), large personal activity trajectory data, and governmental rumor refutation (anti-rumor) scenarios. Combining these relevant data with the 'big' traffic data on the use of subways, buses, and taxis, we simulated daily oral communications among inhabitants in Beijing. In order to analyze rumor and anti-rumor competition in the actual social network, personal resistance, personal preference, conformity, rumor intensity, government rumor refutation and other influencing factors were considered. Based on the developed risk assessment model, a long-term dynamic rumor propagation simulation for a seven day period was conducted and a comprehensive rumor propagation risk distribution map was obtained. A set of the sensitivity analyses were conducted for different social media and propagation routes. We assessed different anti-rumor coverage ratios and the rumor-spreading thresholds at which the government started to launch anti-rumor actions. The results we obtained provide worthwhile references useful for governmental decision making towards control of social-disrupting rumors.
Liang, Zhiqiang; Wei, Jianming; Zhao, Junyu; Liu, Haitao; Li, Baoqing; Shen, Jie; Zheng, Chunlei
2008-01-01
This paper presents a new algorithm making use of kurtosis, which is a statistical parameter, to distinguish the seismic signal generated by a person's footsteps from other signals. It is adaptive to any environment and needs no machine study or training. As persons or other targets moving on the ground generate continuous signals in the form of seismic waves, we can separate different targets based on the seismic waves they generate. The parameter of kurtosis is sensitive to impulsive signals, so it's much more sensitive to the signal generated by person footsteps than other signals generated by vehicles, winds, noise, etc. The parameter of kurtosis is usually employed in the financial analysis, but rarely used in other fields. In this paper, we make use of kurtosis to distinguish person from other targets based on its different sensitivity to different signals. Simulation and application results show that this algorithm is very effective in distinguishing person from other targets. PMID:27873804
Perception of biomechanical motions by infants: implementation of various processing constraints.
Bertenthal, B I; Proffitt, D R; Kramer, S J
1987-11-01
Geometry informs us that there exist a large number of possible connectivity patterns consistent with a point-light display of a person walking. Yet there is only one pattern consistent with a "stick figure" representation of the human form, and that pattern is uniquely specified by those pairwise connections that remain locally rigid. In this study, sensitivity to local rigidity in biomechanical displays was investigated in 3- and 5-month-old infants. The results of Experiment 1 revealed that by 5 months of age, infants discriminate a locally rigid point-light walker display from one in which local rigidity is perturbed. In Experiment 2 we tested infants' sensitivity to the same stimuli when those stimuli were inverted. Contrary to the preceding experiment, the results revealed no evidence of discrimination. Taken together, these findings suggest that infants are sensitive to local rigidity in biomechanical displays but that this sensitivity is orientation specific. Possible mechanisms for this specificity are discussed in the context of additional constraints on the processing of biomechanical displays.
Rudolph, Abby E; Young, April M; Havens, Jennifer R
2017-11-01
Analyses that link contextual factors with individual-level data can improve our understanding of the "risk environment"; however, the accuracy of information provided by participants about locations where illegal/stigmatized behaviors occur may be influenced by privacy/confidentiality concerns that may vary by setting and/or data collection approach. We recruited thirty-five persons who use drugs from a rural Appalachian town and a Mid-Atlantic city to participate in in-depth interviews. Through thematic analyses, we identified and compared privacy/confidentiality concerns associated with two survey methods that (1) collect self-reported addresses/cross-streets and (2) use an interactive web-based map to find/confirm locations in rural and urban settings. Concerns differed more by setting than between methods. For example, (1) rural participants valued interviewer rapport and protections provided by the Certificate of Confidentiality more; (2) locations considered to be sensitive differed in rural (i.e., others' homes) and urban (i.e., where drugs were used) settings; and (3) urban participants were more likely to view providing cross-streets as an acceptable alternative to providing exact addresses for sensitive locations and to prefer the web-based map approach. Rural-urban differences in privacy/confidentiality concerns reflect contextual differences (i.e., where drugs are used/purchased, population density, and prior drug-related arrests). Strategies to alleviate concerns include: (1) obtain a Certificate of Confidentiality, (2) collect geographic data at the scale necessary for proposed analyses, and (3) permit participants to provide intersections/landmarks in close proximity to actual locations rather than exact addresses or to skip questions where providing an intersection/landmark would not obfuscate the actual address. Copyright © 2017 Elsevier Ltd. All rights reserved.
Privacy, confidentiality and abortion statistics: a question of public interest?
McHale, Jean V; Jones, June
2012-01-01
The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.
Collaborative Information Retrieval Method among Personal Repositories
NASA Astrophysics Data System (ADS)
Kamei, Koji; Yukawa, Takashi; Yoshida, Sen; Kuwabara, Kazuhiro
In this paper, we describe a collaborative information retrieval method among personal repositorie and an implementation of the method on a personal agent framework. We propose a framework for personal agents that aims to enable the sharing and exchange of information resources that are distributed unevenly among individuals. The kernel of a personal agent framework is an RDF(resource description framework)-based information repository for storing, retrieving and manipulating privately collected information, such as documents the user read and/or wrote, email he/she exchanged, web pages he/she browsed, etc. The repository also collects annotations to information resources that describe relationships among information resources and records of interaction between the user and information resources. Since the information resources in a personal repository and their structure are personalized, information retrieval from other users' is an important application of the personal agent. A vector space model with a personalized concept-base is employed as an information retrieval mechanism in a personal repository. Since a personalized concept-base is constructed from information resources in a personal repository, it reflects its user's knowledge and interests. On the other hand, it leads to another problem while querying other users' personal repositories; that is, simply transferring query requests does not provide desirable results. To solve this problem, we propose a query equalization scheme based on a relevance feedback method for collaborative information retrieval between personalized concept-bases. In this paper, we describe an implementation of the collaborative information retrieval method and its user interface on the personal agent framework.
Sesquiterpene lactone dermatitis in the young: is atopy a risk factor?
Paulsen, Evy; Otkjaer, Aksel; Andersen, Klaus E
2008-07-01
Screening for Compositae contact allergy has documented fairly high prevalence in adults, and recent studies indicate that the allergy may be more common in children than previously believed. However, detailed information on sensitization in this age group is sparse. The objective of this study was to present another 2 cases in children and review the literature. Screening with sesquiterpene lactone (SL) mix has shown prevalence of 0.5% and 1.8% in 2 studies, while screening with 2 different Compositae mixes detected 4.2% and 2.6% positives among children and adolescents. All individual case reports describe sensitization in atopic children, and the largest screening study showed a prevalence of Compositae mix sensitization that was significantly higher in children with atopic dermatitis compared with non-atopics. Compositae sensitization should be considered in children with a family or personal history of atopy, summer-related, or -exacerbated dermatitis of any kind, and a history of plant exposure. Screening with SL mix is recommended but should be supplemented with plant extracts based on exposure history. Compositae weeds, especially dandelions, seem to be important sensitizers in children.
Mikulski, Marek A; Leonard, Stephanie A; Sanderson, Wayne T; Hartley, Patrick G; Sprince, Nancy L; Fuortes, Laurence J
2011-03-01
The nuclear weapons industry has long been known as a source of beryllium exposure. A total of 1,004 former workers from a nuclear weapons assembly site in the Midwest were screened for sensitization to beryllium (BeS). The screenings were part of the Department of Energy (DOE) Former Worker Program established in 1996. Twenty-three (2.3%) workers were found sensitized to beryllium and this prevalence was comparable to other DOE sites. Occasional, direct exposure to beryllium through machining and grinding of copper-beryllium (Cu-Be) 2% alloy tools was found to increase the risk of sensitization compared to background exposure (OR = 3.83; 95% CI: 1.04-14.03) with a statistically significant trend (P = 0.03) revealing that particular jobs are associated with sensitization. Exposure potential in this study was estimated based on job titles and not personal exposure information. These results confirm the need to screen workers using beryllium alloy tools in other industries and for consideration of altering work practices. Copyright © 2010 Wiley-Liss, Inc.
Herbert, Matthew S.; Goodin, Burel R.; Pero, Samuel T.; Schmidt, Jessica K.; Sotolongo, Adriana; Bulls, Hailey W.; Glover, Toni L.; King, Christopher D.; Sibille, Kimberly T.; Cruz-Almeida, Yenisel; Staud, Roland; Fessler, Barri J.; Bradley, Laurence A.; Fillingim, Roger B.
2014-01-01
Background Pain hypervigilance is an important aspect of the fear-avoidance model of pain that may help explain individual differences in pain sensitivity among persons with knee osteoarthritis (OA). Purpose The purpose of this study was to examine the contribution of pain hypervigilance to clinical pain severity and experimental pain sensitivity in persons with symptomatic knee OA. Methods We analyzed cross-sectional data from 168 adults with symptomatic knee OA. Quantitative sensory testing was used to measure sensitivity to heat pain, pressure pain, and cold pain, as well as temporal summation of heat pain, a marker of central sensitization. Results Pain hypervigilance was associated with greater clinical pain severity, as well as greater pressure pain. Pain hypervigilance was also a significant predictor of temporal summation of heat pain. Conclusions Pain hypervigilance may be an important contributor to pain reports and experimental pain sensitivity among persons with knee OA. PMID:24352850
2014-02-01
aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information...if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE February 2014 2... Akre , et al., 2006) content and evidence-based clinical decision support (CDS) tools were embedded into the EHR of one large health care system. Since
Ciguatera fish poisoning - New York City, 2010-2011.
2013-02-01
During August 2010-July 2011, the New York City Department of Health and Mental Hygiene (DOHMH) received reports of six outbreaks and one single case of ciguatera fish poisoning (CFP), involving a total of 28 persons. CFP results from consumption of certain large, predatory, tropical reef fish that have bioaccumulated ciguatoxins (CTX). CFP is characterized by various gastrointestinal, cardiovascular, and neurologic symptoms. A prolonged period of acute illness can result, and the neurologic symptoms can last months, with variable asymptomatic and symptomatic periods. The first two outbreaks and the single case, involving 13 persons, were reported during August 6-September 13, 2010. DOHMH distributed a health alert in November 2010 requesting health-care providers be alert for CFP signs and symptoms. The health alert resulted in identification of 11 more cases that month and an additional two outbreaks involving four persons in July 2011. In comparison, only four CFP outbreaks, involving 21 persons total, had been reported in New York City (NYC) during the preceding 10 years (2000-2009). DOHMH's investigation revealed that 13 persons became ill after eating barracuda, and 15 became ill after eating grouper. Although specific and highly sensitive laboratory analyses can detect and confirm CTX in fish, no practical field tests are available for fish monitoring programs. CFP prevention depends on educating the public, seafood suppliers, and distributors about known CFP endemic areas and high-risk fish species. Traceback investigations of fish associated with outbreaks provide valuable information regarding fishing areas associated with CFP. Not all fish from CFP endemic areas are ciguatoxic, but persons who eat fish from endemic regions are at higher risk for CFP. If an illness is suspected to be CFP, public health authorities should be notified and informed of the case history for possible investigation and intervention measures.
Gao, Yong; Zhu, Weimo
2011-05-01
The purpose of this study was to identify subgroup-sensitive physical activities (PA) using differential item functioning (DIF) analysis. A sub-unweighted sample of 1857 (men=923 and women=934) from the 2003-2004 National Health and Nutrition Examination Survey PA questionnaire data was used for the analyses. Using the Mantel-Haenszel, the simultaneous item bias test, and the ANOVA DIF methods, 33 specific leisure-time moderate and/or vigorous PA (MVPA) items were analyzed for DIF across race/ethnicity, gender, education, income, and age groups. Many leisure-time MVPA items were identified as large DIF items. When participating in the same amount of leisure-time MVPA, non-Hispanic blacks were more likely to participate in basketball and dance activities than non-Hispanic whites (NHW); NHW were more likely to participated in golf and hiking than non-Hispanic blacks; Hispanics were more likely to participate in dancing, hiking, and soccer than NHW, whereas NHW were more likely to engage in bicycling, golf, swimming, and walking than Hispanics; women were more likely to participate in aerobics, dancing, stretching, and walking than men, whereas men were more likely to engage in basketball, fishing, golf, running, soccer, weightlifting, and hunting than women; educated persons were more likely to participate in jogging and treadmill exercise than less educated persons; persons with higher incomes were more likely to engage in golf than those with lower incomes; and adults (20-59 yr) were more likely to participate in basketball, dancing, jogging, running, and weightlifting than older adults (60+ yr), whereas older adults were more likely to participate in walking and golf than younger adults. DIF methods are able to identify subgroup-sensitive PA and thus provide useful information to help design group-sensitive, targeted interventions for disadvantaged PA subgroups. © 2011 by the American College of Sports Medicine
Loas, G; Monestes, J-L; Wallier, J; Berthoz, S; Corcos, M
2010-04-01
Dependent personality disorder is a new diagnosis introduced in the third version of the DSM (DSM-III). Contrary to other disorders of personality, as the borderline or the schizotypal personalities, there are no specific interviews or questionnaires focusing on dependent personality. Thus the study of dependent personality disorder requires the use of global interviews or questionnaire as the SCID -II or SIDP-IV. Recently, Tyrer and colleagues (2004) have proposed an 8-item questionnaire, the DPQ (Dependent Personality Questionnaire). Each item of the DPQ is rated from 0 to 3 with a total score ranging from 0 to 24. Using a sample of 30 psychiatric patients presenting various diagnoses and a dependent personality disorder for the half of the sample, the authors have determined the cutoff score allowing the diagnosis of DSM-IV Dependent Personality Disorder. A cutoff of 10 was associated with the best sensitivity (87.5%), specificity (87.5%) and positive predictive value (87.5%). Moreover, the value of the Youden coefficient (Sensitivity+Specificity - 100) was 75. The aim of the study was to present the French version of the DPQ and to determine its psychometric properties as well as the cutoff score. One hundred and thirty-eight psychiatric inpatients (97 females, 41 males) with a mean age of 42.26 years were included in the study. The patients were hospitalized in an inpatients unit receiving mood disorders, neurotic disorders or suicide attempters. The subjects filled out the French versions of the DPQ and the Personality Disorders Questionnaire of Hyler, PDQ-4+. Using the PDQ-4+ two groups were built: 25 subjects filled out the diagnoses of dependent personality disorder and 20 subjects did not meet any criteria of dependent personality disorder. Then, for different values of the DPQ, sensitivity, specificity and positive predictive value and Youden indicia (Sensitivity+Specificity - 100) were calculated. The best values of Youden indicia (74) were obtained for the cutoff of 13 on the DPQ. The corresponding sensitivity, specificity and positive predictive value were respectively 84, 90 and 91.3%. The French version of the DPQ is now available and permits detection of dependent personality in French populations. Our results must be replicated using structured interviews of personality disorder instead of questionnaires (PDQ-4+) and other samples with different prevalence of dependent personality disorders must be used to test the potential cutoff scores of the DPQ. 2009 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
How children aged 2;6 tailor verbal expressions to interlocutor informational needs.
Abbot-Smith, Kirsten; Nurmsoo, Erika; Croll, Rebecca; Ferguson, Heather; Forrester, Michael
2016-11-01
Although preschoolers are pervasively underinformative in their actual usage of verbal reference, a number of studies have shown that they nonetheless demonstrate sensitivity to listener informational needs, at least when environmental cues to this are obvious. We investigated two issues. The first concerned the types of visual cues to interlocutor informational needs which children aged 2;6 can process whilst producing complex referring expressions. The second was whether performance in experimental tasks related to naturalistic conversational proficiency. We found that 2;6-year-olds used fewer complex expressions when the objects were dissimilar compared to highly similar objects, indicating that they tailor their verbal expressions to the informational needs of another person, even when the cue to the informational need is relatively opaque. We also found a correlation between conversational skills as rated by the parents and the degree to which 2;6-year-olds could learn from feedback to produce complex referring expressions.
Crowell, Sheila E.; Beauchaine, Theodore P.; Linehan, Marsha M.
2009-01-01
Over the past several decades, research has focused increasingly on developmental precursors to psychological disorders that were previously assumed to emerge only in adulthood. This change in focus follows from the recognition that complex transactions between biological vulnerabilities and psychosocial risk factors shape emotional and behavioral development beginning at conception. To date, however, empirical research on the development of borderline personality is extremely limited. Indeed, in the decade since M. M. Linehan initially proposed a biosocial model of the development of borderline personality disorder, there have been few attempts to test the model among at-risk youth. In this review, diverse literatures are reviewed that can inform understanding of the ontogenesis of borderline pathology, and testable hypotheses are proposed to guide future research with at-risk children and adolescents. One probable pathway is identified that leads to borderline personality disorder; it begins with early vulnerability, expressed initially as impulsivity and followed by heightened emotional sensitivity. These vulnerabilities are potentiated across development by environmental risk factors that give rise to more extreme emotional, behavioral, and cognitive dysregulation. PMID:19379027
Factors perceived as being related to accidental falls by persons with multiple sclerosis.
Nilsagård, Ylva; Denison, Eva; Gunnarsson, Lars-Gunnar; Boström, Katrin
2009-01-01
This study explores and describes factors that persons with multiple sclerosis (MS) perceive as being related to accidental falls. A qualitative content analysis with primarily deductive approach was conducted using the International Classification of Functioning, Disability and Health. Twelve persons with MS, and identified as fallers, were interviewed. Factors perceived to cause accidental falls that had not previously been targeted in MS populations in relation to falls were identified as divided attention, reduced muscular endurance, fatigue and heat sensitivity. Previously reported risk factors such as changed gait pattern, limited walking ability, impaired proprioception, vision and spasticity were supported. Activities involving walking, recreation and leisure, maintaining and changing body position, lifting or carrying, taking care of the home, washing the body, moving around, preparing meals and housekeeping were limited and considered to be risk activities. Supportive persons and assistive device reduced falls, and unsuitable physical environments and climate conditions induced falls. Several preventative strategies were described as partially compensating for the impairments, limitations and restrictions. Investigating accidental falls using the perspective of the patient gave important information about variables not earlier targeted in MS research.
Crowell, Sheila E; Beauchaine, Theodore P; Linehan, Marsha M
2009-05-01
Over the past several decades, research has focused increasingly on developmental precursors to psychological disorders that were previously assumed to emerge only in adulthood. This change in focus follows from the recognition that complex transactions between biological vulnerabilities and psychosocial risk factors shape emotional and behavioral development beginning at conception. To date, however, empirical research on the development of borderline personality is extremely limited. Indeed, in the decade since M. M. Linehan initially proposed a biosocial model of the development of borderline personality disorder, there have been few attempts to test the model among at-risk youth. In this review, diverse literatures are reviewed that can inform understanding of the ontogenesis of borderline pathology, and testable hypotheses are proposed to guide future research with at-risk children and adolescents. One probable pathway is identified that leads to borderline personality disorder; it begins with early vulnerability, expressed initially as impulsivity and followed by heightened emotional sensitivity. These vulnerabilities are potentiated across development by environmental risk factors that give rise to more extreme emotional, behavioral, and cognitive dysregulation. (PsycINFO Database Record (c) 2009 APA, all rights reserved).
The impact of the EU general data protection regulation on scientific research.
Chassang, Gauthier
2017-01-01
The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals' privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018.
The impact of the EU general data protection regulation on scientific research
Chassang, Gauthier
2017-01-01
The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals’ privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018. PMID:28144283
Molecular imaging in the framework of personalized cancer medicine.
Belkić, Dzevad; Belkić, Karen
2013-11-01
With our increased understanding of cancer cell biology, molecular imaging offers a strategic bridge to oncology. This complements anatomic imaging, particularly magnetic resonance (MR) imaging, which is sensitive but not specific. Among the potential harms of false positive findings is lowered adherence to recommended surveillance post-therapy and by persons at increased cancer risk. Positron emission tomography (PET) plus computerized tomography (CT) is the molecular imaging modality most widely used in oncology. In up to 40% of cases, PET-CT leads to changes in therapeutic management. Newer PET tracers can detect tumor hypoxia, bone metastases in androgen-sensitive prostate cancer, and human epidermal growth factor receptor type 2 (HER2)-expressive tumors. Magnetic resonance spectroscopy provides insight into several metabolites at the same time. Combined with MRI, this yields magnetic resonance spectroscopic imaging (MRSI), which does not entail ionizing radiation and is thus suitable for repeated monitoring. Using advanced signal processing, quantitative information can be gleaned about molecular markers of brain, breast, prostate and other cancers. Radiation oncology has benefited from molecular imaging via PET-CT and MRSI. Advanced mathematical approaches can improve dose planning in stereotactic radiosurgery, stereotactic body radiotherapy and high dose-rate brachytherapy. Molecular imaging will likely impact profoundly on clinical decision making in oncology. Molecular imaging via MR could facilitate early detection especially in persons at high risk for specific cancers.
Schneider, Stefan; Choi, Seung W; Junghaenel, Doerte U; Schwartz, Joseph E; Stone, Arthur A
2013-09-01
The Patient-Reported Outcomes (PRO) Measurement Information System (PROMIS(®)) has developed assessment tools for numerous PROs, most using a 7-day recall format. We examined whether modifying the recall period for use in daily diary research would affect the psychometric characteristics of several PROMIS measures. Daily versions of short-forms for three PROMIS domains (pain interference, fatigue, depression) were administered to a general population sample (n = 100) for 28 days. Analyses used multilevel item response theory (IRT) models. We examined differential item functioning (DIF) across recall periods by comparing the IRT parameters from the daily data with the PROMIS 7-day recall IRT parameters. Additionally, we examined whether the IRT parameters for day-to-day within-person changes are invariant to those for between-person (cross-sectional) differences in PROs. Dimensionality analyses of the daily data suggested a single dimension for each PRO domain, consistent with PROMIS instruments. One-third of the daily items showed uniform DIF when compared with PROMIS 7-day recall, but the impact of DIF on the scale level was minor. IRT parameters for within-person changes differed from between-person parameters for 3 depression items, which were more sensitive for measuring change than between-person differences, but not for pain interference and fatigue items. Notably, mean scores from daily diaries were significantly lower than the PROMIS 7-day recall norms. The results provide initial evidence supporting the adaptation of PROMIS measures for daily diary research. However, scores from daily diaries cannot be directly interpreted on PROMIS norms established for 7-day recall.
Berezowska, Aleksandra; Fischer, Arnout R H; Ronteltap, Amber; Kuznesof, Sharron; Macready, Anna; Fallaize, Rosalind; van Trijp, Hans C M
2014-01-01
Personalised nutrition (PN) may provide major health benefits to consumers. A potential barrier to the uptake of PN is consumers' reluctance to disclose sensitive information upon which PN is based. This study adopts the privacy calculus to explore how PN service attributes contribute to consumers' privacy risk and personalisation benefit perceptions. Sixteen focus groups (n = 124) were held in 8 EU countries and discussed 9 PN services that differed in terms of personal information, communication channel, service provider, advice justification, scope, frequency, and customer lock-in. Transcripts were content analysed. The personal information that underpinned PN contributed to both privacy risk perception and personalisation benefit perception. Disclosing information face-to-face mitigated the perception of privacy risk and amplified the perception of personalisation benefit. PN provided by a qualified expert and justified by scientific evidence increased participants' value perception. Enhancing convenience, offering regular face-to face support, and employing customer lock-in strategies were perceived as beneficial. This study suggests that to encourage consumer adoption, PN has to account for face-to-face communication, expert advice providers, support, a lifestyle-change focus, and customised offers. The results provide an initial insight into service attributes that influence consumer adoption of PN. © 2014 S. Karger AG, Basel.
Chlorine Dioxide Induced Multiple Chemical Sensitivity: MMPI Validity Problems.
ERIC Educational Resources Information Center
Tentoni, Stuart C.
This paper discusses Minnesota Multiphasic Personality Inventory (MMPI) data obtained from individuals exposed to chlorine dioxide in the workplace who developed Multiple Chemical Sensitivity Syndrome. The paper explores current research on chlorine dioxide exposed persons who were misdiagnosed on the basis of MMPI interpretations. Difficulties…
Bilbrey, Ann Choryan; Humber, Marika B; Plowey, Edward D; Garcia, Iliana; Chennapragada, Lakshmi; Desai, Kanchi; Rosen, Allyson; Askari, Nusha; Gallagher-Thompson, Dolores
2018-01-01
Increasing the number of Latino persons with dementia who consent to brain donation (BD) upon death is an important public health goal that has not yet been realized. This study identified the need for culturally sensitive materials to answer questions and support the decision-making process for the family. Information about existing rates of BD was obtained from the Alzheimer's Disease Centers. Several methods of data collection (query NACC database, contacting Centers, focus groups, online survey, assessing current protocol and materials) were used to give the needed background to create culturally appropriate BD materials. A decision was made that a brochure for undecided enrollees would be beneficial to discuss BD with family members. For those needing further details, a step-by-step handout would provide additional information. Through team collaboration and engagement of others in the community who work with Latinos with dementia, we believe this process allowed us to successfully create culturally appropriate informational materials that address a sensitive topic for Hispanic/Latino families. Brain tissue is needed to further knowledge about underlying biological mechanism of neurodegenerative diseases, however it is a sensitive topic. Materials assist with family discussion and facilitate the family's follow-through with BD.
Neuroscience and approach/avoidance personality traits: a two stage (valuation-motivation) approach.
Corr, Philip J; McNaughton, Neil
2012-11-01
Many personality theories link specific traits to the sensitivities of the neural systems that control approach and avoidance. But there is no consensus on the nature of these systems. Here we combine recent advances in economics and neuroscience to provide a more solid foundation for a neuroscience of approach/avoidance personality. We propose a two-stage integration of valuation (loss/gain) sensitivities with motivational (approach/avoidance/conflict) sensitivities. Our key conclusions are: (1) that valuation of appetitive and aversive events (e.g. gain and loss as studied by behavioural economists) is an independent perceptual input stage--with the economic phenomenon of loss aversion resulting from greater negative valuation sensitivity compared to positive valuation sensitivity; (2) that valuation of an appetitive stimulus then interacts with a contingency of presentation or omission to generate a motivational 'attractor' or 'repulsor', respectively (vice versa for an aversive stimulus); (3) the resultant behavioural tendencies to approach or avoid have distinct sensitivities to those of the valuation systems; (4) while attractors and repulsors can reinforce new responses they also, more usually, elicit innate or previously conditioned responses and so the perception/valuation-motivation/action complex is best characterised as acting as a 'reinforcer' not a 'reinforcement'; and (5) approach-avoidance conflict must be viewed as activating a third motivation system that is distinct from the basic approach and avoidance systems. We provide examples of methods of assessing each of the constructs within approach-avoidance theories and of linking these constructs to personality measures. We sketch a preliminary five-element reinforcer sensitivity theory (RST-5) as a first step in the integration of existing specific approach-avoidance theories into a coherent neuroscience of personality. Copyright © 2012 Elsevier Ltd. All rights reserved.
Hill, P; Dederichs, H; Pillath, J; Schlecht, W; Hille, R; Artemev, O; Ptitskaya, L; Akhmetov, M
2002-01-01
The joint projects performed since 1995 by the Jülich Research Centre in co-operation with the Kazakh National Nuclear Centre in the area of the former nuclear test site near Semipalatinsk, in eastern Kazakhstan, have assessed the current dose rate of the population at and around the test site, as well as determining retrospectively the dose rate of persons affected by the atmospheric tests. Measurements of the population by personal dosemeters depend on reliably wearing these dosemeters over prolonged periods of time, and of a sufficient dosemeter return. In the past, such measurements have been particularly successful whenever short wearing times were possible. This requires high sensitivity of the dosemeters. The suitability of the highly sensitive TLD material of the BICRON TLD 700H type for such personal dosimetry measurements was investigated. It was tested in practical field application at the Semipalatinsk nuclear test site in September 2000. Initial results are available from individual doses received by a group of geologists and a group of herdsmen at the test site. For the first time, the individual dose was measured directly in these population groups. Detection limits below 1 microSv permit informative measurements for wearing times of less than two weeks. Most individual doses did not arise significantly out of local fluctuations of natural background. A conservative assessment from the aspect of practical health physics yielded a mean personal dose of 0.55 microSv per day for the herdsmen, whereas the geologists received a mean personal dose of 0.45 microSv per day. For an annual exposure period of typically, about three months, the radiation dose received by the persons investigated, in addition to the natural radiation exposure, is thus well below the international limit value of 1 mSv x a(-1) for the population dose.
Gritzalis, Stefanos; Lambrinoudakis, Costas; Lekkas, Dimitrios; Deftereos, Spyros
2005-09-01
Raising awareness and providing guidance to on-line data protection is undoubtedly a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics gain extra attention when referring to medical environments and, thus, to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is, therefore, a rather straightforward task to capture the electronic medical behavior of a patient, thus constructing "patient profiles," or reveal sensitive information related to a patient's medical history. The consequence is clearly a potential violation of the patient's privacy. We performed a risk analysis study for a Greek shared care environment for the treatment of patients suffering from beta-thalassemia, an empirically embedded scenario that is representative of many other electronic medical environments; we capitalized on its results to provide an assessment of the associated risks, focusing on the description of countermeasures, in the form of technical guidelines that can be employed in such medical environments for protecting the privacy of personal and medical information.
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-01-01
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-09-03
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
Gans, Jerome S
2011-04-01
Unwitting self-disclosures (USDs), unconscious yet observable parts of personality, are often behavioral relics of past suffering and, as such, constitute valuable though frequently underutilized clinical information. While ego-syntonic aspects of personality can be commented on with impunity, dealing therapeutically with patients' USDs--manifestations of their blind spots--requires sensitivity, empathy, and timing. Providing many clinical examples of patient and therapist USDs from individual and group psychotherapy, this report discusses the origins, possible meanings, and the countertransference and empathic challenges encountered in the handling of these blind spots. The importance of establishing a narcissistic alliance and of employing the methods of the existential school of psychotherapy in processing USDs is described. Self-aware therapists can minimize the clinical impasse that may result when therapist-patient blind spots overlap.
Patient privacy in the genomic era.
Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre
2014-05-07
According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.
ERIC Educational Resources Information Center
Sezer, Gönül Onur; Kahraman, Pinar Bagçeli
2016-01-01
Teachers first need to participate in cultural activities and must be enthusiastic about improving themselves. It is thought that supporting personal qualifications of teacher candidates through different ways can have positive effects on intercultural sensitivity. The aim of this study is to investigate the relationship between personal…
Impulsivity, Rejection Sensitivity, and Reactions to Stressors in Borderline Personality Disorder
Berenson, Kathy R.; Gregory, Wesley Ellen; Glaser, Erin; Romirowsky, Aliza; Rafaeli, Eshkol; Yang, Xiao; Downey, Geraldine
2016-01-01
This research investigated baseline impulsivity, rejection sensitivity, and reactions to stressors in individuals with borderline personality disorder compared to healthy individuals and those with avoidant personality disorder. The borderline group showed greater impulsivity than the avoidant and healthy groups both in a delay-discounting task with real monetary rewards and in self-reported reactions to stressors; moreover, these findings could not be explained by co-occurring substance use disorders. Distress reactions to stressors were equally elevated in both personality disorder groups (relative to the healthy group). The borderline and avoidant groups also reported more maladaptive reactions to a stressor of an interpersonal vs. non-interpersonal nature, whereas the healthy group did not. Finally, self-reported impulsive reactions to stressors were associated with baseline impulsivity in the delay-discounting task, and greater self-reported reactivity to interpersonal than non-interpersonal stressors was associated with rejection sensitivity. This research highlights distinct vulnerabilities contributing to impulsive behavior in borderline personality disorder. PMID:27616800
Janssen, Ellen M; Jerome, Gerald J; Dalcin, Arlene T; Gennusa, Joseph V; Goldsholl, Stacy; Frick, Kevin D; Wang, Nae-Yuh; Appel, Lawrence J; Daumit, Gail L
2017-06-01
In the ACHIEVE randomized controlled trial, an 18-month behavioral intervention accomplished weight loss in persons with serious mental illness who attended community psychiatric rehabilitation programs. This analysis estimates costs for delivering the intervention during the study. It also estimates expected costs to implement the intervention more widely in a range of community mental health programs. Using empirical data, costs were calculated from the perspective of a community psychiatric rehabilitation program delivering the intervention. Personnel and travel costs were calculated using time sheet data. Rent and supply costs were calculated using rent per square foot and intervention records. A univariate sensitivity analysis and an expert-informed sensitivity analysis were conducted. With 144 participants receiving the intervention and a mean weight loss of 3.4 kg, costs of $95 per participant per month and $501 per kilogram lost in the trial were calculated. In univariate sensitivity analysis, costs ranged from $402 to $725 per kilogram lost. Through expert-informed sensitivity analysis, it was estimated that rehabilitation programs could implement the intervention for $68 to $85 per client per month. Costs of implementing the ACHIEVE intervention were in the range of other intensive behavioral weight loss interventions. Wider implementation of efficacious lifestyle interventions in community mental health settings will require adequate funding mechanisms. © 2017 The Obesity Society.
Individual olfactory perception reveals meaningful nonolfactory genetic information
Secundo, Lavi; Snitz, Kobi; Weissler, Kineret; Pinchover, Liron; Shoenfeld, Yehuda; Loewenthal, Ron; Agmon-Levin, Nancy; Frumin, Idan; Bar-Zvi, Dana; Shushan, Sagit; Sobel, Noam
2015-01-01
Each person expresses a potentially unique subset of ∼400 different olfactory receptor subtypes. Given that the receptors we express partially determine the odors we smell, it follows that each person may have a unique nose; to capture this, we devised a sensitive test of olfactory perception we termed the “olfactory fingerprint.” Olfactory fingerprints relied on matrices of perceived odorant similarity derived from descriptors applied to the odorants. We initially fingerprinted 89 individuals using 28 odors and 54 descriptors. We found that each person had a unique olfactory fingerprint (P < 10−10), which was odor specific but descriptor independent. We could identify individuals from this pool using randomly selected sets of 7 odors and 11 descriptors alone. Extrapolating from this data, we determined that using 34 odors and 35 descriptors we could individually identify each of the 7 billion people on earth. Olfactory perception, however, fluctuates over time, calling into question our proposed perceptual readout of presumably stable genetic makeup. To test whether fingerprints remain informative despite this temporal fluctuation, building on the linkage between olfactory receptors and HLA, we hypothesized that olfactory perception may relate to HLA. We obtained olfactory fingerprints and HLA typing for 130 individuals, and found that olfactory fingerprint matching using only four odorants was significantly related to HLA matching (P < 10−4), such that olfactory fingerprints can save 32% of HLA tests in a population screen (P < 10−6). In conclusion, a precise measure of olfactory perception reveals meaningful nonolfactory genetic information. PMID:26100865
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users’ sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users’ decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens’ sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants’ partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness. PMID:26950064
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.
Sensory-processing sensitivity and its relation to introversion and emotionality.
Aron, E N; Aron, A
1997-08-01
Over a series of 7 studies that used diverse samples and measures, this research identified a unidimensional core variable of high sensory-processing sensitivity and demonstrated its partial independence from social introversion and emotionality, variables with which it had been confused or subsumed in most previous theorizing by personality researchers. Additional findings were that there appear to be 2 distinct clusters of highly sensitive individuals (a smaller group with an unhappy childhood and related variables, and a larger group similar to nonhighly sensitive individuals except for their sensitivity) and that sensitivity moderates, at least for men; the relation of parental environment to reporting having had an unhappy childhood. This research also demonstrated adequate reliability and content, convergent, and discriminant validity for a 27-item Highly Sensitive Person Scale.
Natural personal care products-analysis of ingredient lists and legal situation.
Klaschka, Ursula
2016-01-01
Many natural substances are classified as dangerous substances according to the European regulation on classification and labelling. Are they used in natural personal care products today? One hundred ingredient lists were analyzed to find this out. All products with natural substances contained dangerous natural substances or they contained natural substances, for which the information about their classification as dangerous substances is not available. 54 natural substances quoted in the ingredient lists were found to be classified, with 37 substances being classified due to hazardous effects for skin and eyes. However, the most frequently used natural substances are not classified as dangerous. Natural substances are multi-constituent compounds, leading to two main problems in personal care products: the potential interactions of a multitude of substances and the fact that dangerous constituents are not disclosed in the ingredient lists. For example, the fragrance allergens citral, farnesol, limonene, and linalool are frequent components of the natural substances employed. In addition, 82 products listed allergenic fragrance ingredients as single substances in their ingredient lists. Recommendations for sensitive skin in a product's name do not imply that the '26 fragrance allergens' are omitted. Furthermore, 80 products listed 'parfum'/'aroma', and 50 products listed ethanol. The data show that the loopholes for natural substances and for personal care products in the present European chemical legislation (e.g. the exception for classification and labelling of cosmetic products and the exception for information transfer in the supply chain) are not in line with an adequate consumer and environmental protection.
41 CFR 109-43.307-52 - Nuclear-related or proliferation-sensitive personal property.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Nuclear-related or... Excess § 109-43.307-52 Nuclear-related or proliferation-sensitive personal property. (a) Recognizing that property disposal officials will not have the technical knowledge to identify nuclear-related and...
41 CFR 109-43.307-52 - Nuclear-related or proliferation-sensitive personal property.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Nuclear-related or... Excess § 109-43.307-52 Nuclear-related or proliferation-sensitive personal property. (a) Recognizing that property disposal officials will not have the technical knowledge to identify nuclear-related and...
41 CFR 109-43.307-52 - Nuclear-related or proliferation-sensitive personal property.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Nuclear-related or... Excess § 109-43.307-52 Nuclear-related or proliferation-sensitive personal property. (a) Recognizing that property disposal officials will not have the technical knowledge to identify nuclear-related and...
41 CFR 109-43.307-52 - Nuclear-related or proliferation-sensitive personal property.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Nuclear-related or... Excess § 109-43.307-52 Nuclear-related or proliferation-sensitive personal property. (a) Recognizing that property disposal officials will not have the technical knowledge to identify nuclear-related and...
41 CFR 109-43.307-52 - Nuclear-related or proliferation-sensitive personal property.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Nuclear-related or... Excess § 109-43.307-52 Nuclear-related or proliferation-sensitive personal property. (a) Recognizing that property disposal officials will not have the technical knowledge to identify nuclear-related and...
Video redaction: a survey and comparison of enabling technologies
NASA Astrophysics Data System (ADS)
Sah, Shagan; Shringi, Ameya; Ptucha, Raymond; Burry, Aaron; Loce, Robert
2017-09-01
With the prevalence of video recordings from smart phones, dash cams, body cams, and conventional surveillance cameras, privacy protection has become a major concern, especially in light of legislation such as the Freedom of Information Act. Video redaction is used to obfuscate sensitive and personally identifiable information. Today's typical workflow involves simple detection, tracking, and manual intervention. Automated methods rely on accurate detection mechanisms being paired with robust tracking methods across the video sequence to ensure the redaction of all sensitive information while minimizing spurious obfuscations. Recent studies have explored the use of convolution neural networks and recurrent neural networks for object detection and tracking. The present paper reviews the redaction problem and compares a few state-of-the-art detection, tracking, and obfuscation methods as they relate to redaction. The comparison introduces an evaluation metric that is specific to video redaction performance. The metric can be evaluated in a manner that allows balancing the penalty for false negatives and false positives according to the needs of particular application, thereby assisting in the selection of component methods and their associated hyperparameters such that the redacted video has fewer frames that require manual review.
Anticipation of interoceptive threat in highly anxiety sensitive persons.
Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O
2008-10-01
Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.
78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
...] Proposed Information Collection; United States Park Police Personal History Statement AGENCY: National Park... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military data...
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
Süssenbach, Philipp; Gollwitzer, Mario; Mieth, Laura; Buchner, Axel; Bell, Raoul
2016-01-01
People who are high in victim-sensitivity—a personality trait characterized by a strong fear of being exploited by others—are more likely to attend to social cues associated with untrustworthiness rather than to cues associated with trustworthiness compared with people who are low in victim-sensitivity. But how do these people react when an initial expectation regarding a target’s trustworthiness turns out to be false? Results from two studies show that victim-sensitive compared with victim-insensitive individuals show enhanced source memory and greater change in person perception for negatively labeled targets that violated rather than confirmed negative expectations (the “trustworthy trickster”). These findings are in line with recent theorizing on schema inconsistency and expectancy violation effects in social cognition and with research on the different facets of justice sensitivity in personality psychology. PMID:28082945
Privacy-protected biometric templates: acoustic ear identification
NASA Astrophysics Data System (ADS)
Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.
2004-08-01
Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].
Involving mental health service users in suicide-related research: a qualitative inquiry model.
Lees, David; Procter, Nicholas; Fassett, Denise; Handley, Christine
2016-03-01
To describe the research model developed and successfully deployed as part of a multi-method qualitative study investigating suicidal service-users' experiences of mental health nursing care. Quality mental health care is essential to limiting the occurrence and burden of suicide, however there is a lack of relevant research informing practice in this context. Research utilising first-person accounts of suicidality is of particular importance to expanding the existing evidence base. However, conducting ethical research to support this imperative is challenging. The model discussed here illustrates specific and more generally applicable principles for qualitative research regarding sensitive topics and involving potentially vulnerable service-users. Researching into mental health service users with first-person experience of suicidality requires stakeholder and institutional support, researcher competency, and participant recruitment, consent, confidentiality, support and protection. Research with service users into their experiences of sensitive issues such as suicidality can result in rich and valuable data, and may also provide positive experiences of collaboration and inclusivity. If challenges are not met, objectification and marginalisation of service-users may be reinforced, and limitations in the evidence base and service provision may be perpetuated.
Baillie, Lesley; Thomas, Nicola
2018-01-01
Person-centred care is internationally recognised as best practice for the care of people with dementia. Personal information documents for people with dementia are proposed as a way to support person-centred care in healthcare settings. However, there is little research about how they are used in practice. The aim of this study was to analyse healthcare staff 's perceptions and experiences of using personal information documents, mainly Alzheimer's Society's 'This is me', for people with dementia in healthcare settings. The method comprised a secondary thematic analysis of data from a qualitative study, of how a dementia awareness initiative affected care for people with dementia in one healthcare organisation. The data were collected through 12 focus groups (n = 58 participants) and 1 individual interview, conducted with a range of healthcare staff, both clinical and non-clinical. There are four themes presented: understanding the rationale for personal information documents; completing personal information documents; location for personal information documents and transfer between settings; impact of personal information documents in practice. The findings illuminated how healthcare staff use personal information documents in practice in ways that support person-centred care. Practical issues about the use of personal information documents were revealed and these may affect the optimal use of the documents in practice. The study indicated the need to complete personal information documents at an early stage following diagnosis of dementia, and the importance of embedding their use across care settings, to support communication and integrated care.
Premorbid personality and behavioral symptoms in Alzheimer disease. Some cautions.
Strauss, M E; Lee, M M; DiFilippo, J M
1997-03-01
To evaluate the extent to which the previously reported relationship between premorbid personality and psychopathological symptoms after the onset of Alzheimer disease (AD) is due to the use of a single informant for both personality and symptom information. Premorbid personality descriptions of patients with AD were obtained from 2 sources, primary caregivers and secondary informants, using the Personality Assessment Schedule and NEO-PI-R Neuroticism Scale, respectively. All information regarding depression and anxiety since the onset of AD was obtained from primary caregivers using clinical interviews and the Cornell Scale for Depression in Dementia. When data were obtained from the same informant, significant relationships were found between premorbid personality and both presence of depression and the severity of anxiety symptoms. When data were obtained from 2 different informants, the only significant relationship was between premorbid neuroticism and anxiety severity. As in a previous report, there was a relationship between premorbid personality and depressive symptoms in AD, but only when personality and symptom information was obtained from the same informant. On the other hand, there was a relationship between premorbid personality and severity of anxiety symptoms both when personality and symptom information came from different informants as well as from the same informant. These data suggest that retrospective bias contributes to the apparent consistency between premorbid personality and some aspects of psychiatric symptoms in AD, specifically depression.
Review of Extracting Information From the Social Web for Health Personalization
Karlsen, Randi; Bonander, Jason
2011-01-01
In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049
Leue, Anja; Chavanon, Mira-Lynn; Wacker, Jan; Stemmler, Gerhard
2009-11-01
Task- and personality-related modulations of the N2 were probed within the framework of the revised Reinforcement Sensitivity Theory (RST). Using an appetitive choice task, we investigated 58 students with extreme scores on the behavioral inhibition system and behavioral approach system (BIS/BAS) scales. The baseline-to-peak N2 amplitude was sensitive to the strength of decision conflict and demonstrated RST-related personality differences. In addition to the baseline N2 amplitude, temporal PCA results suggested two N2 components accounting for a laterality effect and capturing different N2 patterns for BIS/BAS groups with increasing conflict level. Evidence for RST-related personality differences was obtained for baseline-to-peak N2 and tPCA components in the present task. The results support the RST prediction that BAS sensitivity modulates conflict processing and confirm the cognitive-motivational conflict concept of RST.
Yoshida, Hiroshi; Shimetani, Naoto
2014-11-01
The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.
Personality factors predict spicy food liking and intake
Byrnes, Nadia K.; Hayes, John E.
2012-01-01
A number of factors likely affect the liking of capsaicin-containing foods such as social influences, repeated exposure to capsaicin, physiological differences in chemosensation, and personality. For example, it is well known that repeated exposure to capsaicin and chilies can result in chronic desensitization. Here, we explore the relationship between multiple personality variables – body awareness/consciousness, sensation seeking, and sensitivity to punishment, and sensitivity to reward – and the liking and consumption of capsaicin-containing foods. As expected, a strong relationship was found between liking of spicy foods and frequency of chili consumption. However, no association was observed between frequency of chili consumption and the perceived burn/sting of sampled capsaicin. Nor was there any association between perceived burn/sting of capsaicin and any of the personality measures. Private Body Consciousness did not relate to any of the measures used in the current study. Sensation Seeking showed positive correlations with the liking of spicy foods, but not non-spicy control foods. Sensitivity to Punishment showed no relation with frequency of chili consumption, and nonsignificant negative trends with liking of spicy foods. Conversely, Sensitivity to Reward was weakly though significantly correlated with the liking of a spicy meal, and similar nonsignificant trends were seen for other spicy foods. Frequency of chili consumption was positively associated with Sensation Seeking and Sensitivity to Reward. Present data indicate individuals who enjoy spicy foods exhibit higher Sensation Seeking and Sensitivity to Reward traits. Rather than merely showing reduced response to the irritating qualities of capsaicin as might be expected under the chronic desensitization hypothesis, these findings support the hypothesis that personality differences may drive differences in spicy food liking and intake. PMID:23538555
Smith, Cynthia L.; Spinrad, Tracy L.; Eisenberg, Nancy; Gaertner, Bridget M.; Popp, Tierney K.; Maxon, Elizabeth
2007-01-01
SYNOPSIS Objective Longitudinal associations among maternal personality, emotional expressions, and parenting were examined. Design Maternal parenting (sensitivity and intrusiveness) and positive emotional expressions were observed during a free-play session with toddlers at 18 (T1, n = 246) and 30 (T3, n = 216) months. Mothers completed a personality measure at T1 and a questionnaire measuring their emotional expressiveness (positive and negative) when toddlers were 24 months old (T2, n = 213). Results Dimensions of maternal personality and maternal emotional expressiveness were related to individual differences in maternal parenting behaviors, in particular to maternal sensitivity. Conscientiousness and Agreeableness at T1 were positively associated with observed positive emotional expressions at T1. Agreeableness, Openness to Experience, and Extraversion at T1 also were positively related to positive emotional expressions reported by mothers at T2. Maternal positive emotional expressions (T1 and T2), in turn, were associated with more sensitive behavior observed with toddlers at T3. Conclusion In addition to direct effects of maternal personality on maternal parenting, mothers’ emotional expressiveness was found to be a possible pathway for explaining relations of maternal personality and parenting. PMID:18174914
Papousek, Ilona; Schulter, Günter; Rominger, Christian; Fink, Andreas; Weiss, Elisabeth M
2016-01-30
The fear of other persons' laughter (gelotophobia) occurs in the context of several psychiatric conditions, particularly in the schizophrenia spectrum and social phobia. It entails severe personal and inter-personal problems including heightened aggression and possibly violence. Individuals with gelotophobia (n=30; 24 with social phobia or Cluster A diagnosis) and matched symptom-free controls (n=30) were drawn from a large screening sample (n=1440). EEG coherences were recorded during the confrontation with other people's affect expressions, to investigate the brain's modulatory control over the emotionally laden perceptual input. Gelotophobia was associated with more loose functional coupling of prefrontal and posterior cortex during the processing of expressions of anger and aggression, thus leaving the individual relatively unprotected from becoming affected by these social signals. The brain's response to social signals of anger/aggression and the accompanied heightened permeability for this kind of information explains the particular sensitivity to actual or supposed malicious aspects of laughter (and possibly of other ambiguous social signals) in individuals with gelotophobia, which represents the core feature of the condition. Heightened perception of stimuli that could be perceived as offensive, which is inherent in several psychiatric conditions, may be particularly evident in the fear of other persons' laughter. Copyright © 2015. Published by Elsevier Ireland Ltd.
Routes for breaching and protecting genetic privacy
Erlich, Yaniv; Narayanan, Arvind
2014-01-01
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications. PMID:24805122
Host Genes and Resistance/Sensitivity to Military Priority Pathogens
2013-06-01
NZB/BlnJ (stock no. 684), C3H/HeJ (stock no. 659), BALB/cByJ (stock no. 1026), AKR /J (stock no. 648), B10.D2-H2/ oSnJ (stock no. 461), A /J (stock...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control... A ; Williams, Robert W.; Boon, Adranius; Bix, Mark; Marion, Tony. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S
Routes for breaching and protecting genetic privacy.
Erlich, Yaniv; Narayanan, Arvind
2014-06-01
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.
Rossignol, Lisa
2015-01-01
A census of 43 third-year medical students at the University of New Mexico School of Medicine participated in Parents Reaching Out: Families as Faculty program during their pediatric rotation. Analysis of variance revealed statistical significance for the factor "appropriate disclosure" (meaning students have become more sensitive to the level of intimacy that the other person is seeking and the student is willing to offer more information). There was a positive correlation between pretest and posttests in social experience, wit, and social confirmation.
2014-05-01
provision of law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid...pressure of three of the strongest motives, fear, honor, and interest. And it was not we who set the example, for it has always been the law that the...institutions such as the WTO, NAFTA and the European Union are examples.” Making the International: Economic Interdependence and Political Order: a
Jiang, Xiaoming; Zhou, Xiaolin
2015-01-01
Verbal communication is often ambiguous. By employing the event-related potential (ERP) technique, this study investigated how a comprehender resolves referential ambiguity by using information concerning the social status of communicators. Participants read a conversational scenario which included a minimal conversational context describing a speaker and two other persons of the same or different social status and a directly quoted utterance. A singular, second-person pronoun in the respectful form (nin/nin-de in Chinese) in the utterance could be ambiguous with respect to which of the two persons was the addressee (the “Ambiguous condition”). Alternatively, the pronoun was not ambiguous either because one of the two persons was of higher social status and hence should be the addressee according to social convention (the “Status condition”) or because a word referring to the status of a person was additionally inserted before the pronoun to help indicate the referent of the pronoun (the “Referent condition”). Results showed that the perceived ambiguity decreased over the Ambiguous, Status, and Referent conditions. Electrophysiologically, the pronoun elicited an increased N400 in the Referent than in the Status and the Ambiguous conditions, reflecting an increased integration demand due to the necessity of linking the pronoun to both its antecedent and the status word. Relative to the Referent condition, a late, sustained positivity was elicited for the Status condition starting from 600 ms, while a more delayed, anterior negativity was elicited for the Ambiguous condition. Moreover, the N400 effect was modulated by individuals' sensitivity to the social status information, while the late positivity effect was modulated by individuals' empathic ability. These findings highlight the neurocognitive flexibility of contextual bias in referential processing during utterance comprehension. PMID:26557102
Psychometric Comparison of Self- and Informant-Reports of Personality
Olino, Thomas M.; Klein, Daniel N.
2017-01-01
Self-reports are the most relied on assessment method in psychology. In the area of personality, informant-reports are a reasonable alternative assessment strategy. However, agreement between self- and informant-reports of personality is only moderately good. A portion of the observed discrepancies between self- and informant-reports of personality may come from differences in psychometric measurement across raters. That is, it is unknown whether the constructs assessed via self- and informant-reports are psychometrically identical. We examined four key personality scales—Well-Being, Social Closeness, Stress Reaction, and Harm Avoidance—in male and female dyads who provided self- and informant-reports for their partner. Similarities in self- and informant-reports of personality were evaluated by testing measurement invariance. Overall, models supported configural, metric, and scalar invariance for each of the four personality dimensions. These results suggest that the same psychometric constructs are assessed via self- and informant-reports of these personality dimensions. Informant-reports can be used in studies to avoid biases from relying solely on self-reports. PMID:25612626
ERIC Educational Resources Information Center
Balogh, Robert S.; Ouellette-Kuntz, Helene; Brownell, Marni; Colantonio, Angela
2011-01-01
Background: There is evidence that the primary care provided for persons with an intellectual disability living in the community has been inadequate. Hospitalization rates for ambulatory care sensitive (ACS) conditions are considered an indicator for access to, and quality of, primary care. The objective of this research was to identify ACS…
Trends in occupational hygiene in Finland.
Pääkkönen, Rauno; Koponen, Milja
2018-03-01
The aim of this work is to evaluate and describe the current status of, and prospects for, the future of occupational hygiene in Finland. The main sources of information include a seminar held in the annual meeting of Finnish Occupational Hygiene Society and interviews with different stakeholders. Nanotechnology and other new materials, changing work environments, circular economy including green jobs, new medical methods and advances of construction methods were recognized as future challenges. Future work opportunities for occupational hygiene experts included exposure assessments in indoor air surveys, private consulting and entrepreneurship in general, international activities and product safety issues. Unclear topics needing more attention in the future were thought to be in new exposures, sensitive persons, combined effects, skin exposures and applicability of personal protective equipment. Occupational hygiene should broaden its view; occupational hygienists should have to cooperate with other specialists and grasp new challenges.
Predicting non-melanoma skin cancer via a multi-parameterized artificial neural network.
Roffman, David; Hart, Gregory; Girardi, Michael; Ko, Christine J; Deng, Jun
2018-01-26
Ultraviolet radiation (UVR) exposure and family history are major associated risk factors for the development of non-melanoma skin cancer (NMSC). The objective of this study was to develop and validate a multi-parameterized artificial neural network based on available personal health information for early detection of NMSC with high sensitivity and specificity, even in the absence of known UVR exposure and family history. The 1997-2015 NHIS adult survey data used to train and validate our neural network (NN) comprised of 2,056 NMSC and 460,574 non-cancer cases. We extracted 13 parameters for our NN: gender, age, BMI, diabetic status, smoking status, emphysema, asthma, race, Hispanic ethnicity, hypertension, heart diseases, vigorous exercise habits, and history of stroke. This study yielded an area under the ROC curve of 0.81 and 0.81 for training and validation, respectively. Our results (training sensitivity 88.5% and specificity 62.2%, validation sensitivity 86.2% and specificity 62.7%) were comparable to a previous study of basal and squamous cell carcinoma prediction that also included UVR exposure and family history information. These results indicate that our NN is robust enough to make predictions, suggesting that we have identified novel associations and potential predictive parameters of NMSC.
Corr, Philip J; Cooper, Andrew J
2016-11-01
We report the development and validation of a questionnaire measure of the revised reinforcement sensitivity theory (rRST) of personality. Starting with qualitative responses to defensive and approach scenarios modeled on typical rodent ethoexperimental situations, exploratory and confirmatory factor analyses (CFAs) revealed a robust 6-factor structure: 2 unitary defensive factors, fight-flight-freeze system (FFFS; related to fear) and the behavioral inhibition system (BIS; related to anxiety); and 4 behavioral approach system (BAS) factors (Reward Interest, Goal-Drive Persistence, Reward Reactivity, and Impulsivity). Theoretically motivated thematic facets were employed to sample the breadth of defensive space, comprising FFFS (Flight, Freeze, and Active Avoidance) and BIS (Motor Planning Interruption, Worry, Obsessive Thoughts, and Behavioral Disengagement). Based on theoretical considerations, and statistically confirmed, a separate scale for Defensive Fight was developed. Validation evidence for the 6-factor structure came from convergent and discriminant validity shown by correlations with existing personality scales. We offer the Reinforcement Sensitivity Theory of Personality Questionnaire to facilitate future research specifically on rRST and, more broadly, on approach-avoidance theories of personality. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Integrating functional genomics to accelerate mechanistic personalized medicine.
Tyner, Jeffrey W
2017-03-01
The advent of deep sequencing technologies has resulted in the deciphering of tremendous amounts of genetic information. These data have led to major discoveries, and many anecdotes now exist of individual patients whose clinical outcomes have benefited from novel, genetically guided therapeutic strategies. However, the majority of genetic events in cancer are currently undrugged, leading to a biological gap between understanding of tumor genetic etiology and translation to improved clinical approaches. Functional screening has made tremendous strides in recent years with the development of new experimental approaches to studying ex vivo and in vivo drug sensitivity. Numerous discoveries and anecdotes also exist for translation of functional screening into novel clinical strategies; however, the current clinical application of functional screening remains largely confined to small clinical trials at specific academic centers. The intersection between genomic and functional approaches represents an ideal modality to accelerate our understanding of drug sensitivities as they relate to specific genetic events and further understand the full mechanisms underlying drug sensitivity patterns.
Witkiewicz, Agnieszka K; Balaji, Uthra; Eslinger, Cody; McMillan, Elizabeth; Conway, William; Posner, Bruce; Mills, Gordon B; O'Reilly, Eileen M; Knudsen, Erik S
2016-08-16
Pancreatic ductal adenocarcinoma (PDAC) harbors the worst prognosis of any common solid tumor, and multiple failed clinical trials indicate therapeutic recalcitrance. Here, we use exome sequencing of patient tumors and find multiple conserved genetic alterations. However, the majority of tumors exhibit no clearly defined therapeutic target. High-throughput drug screens using patient-derived cell lines found rare examples of sensitivity to monotherapy, with most models requiring combination therapy. Using PDX models, we confirmed the effectiveness and selectivity of the identified treatment responses. Out of more than 500 single and combination drug regimens tested, no single treatment was effective for the majority of PDAC tumors, and each case had unique sensitivity profiles that could not be predicted using genetic analyses. These data indicate a shortcoming of reliance on genetic analysis to predict efficacy of currently available agents against PDAC and suggest that sensitivity profiling of patient-derived models could inform personalized therapy design for PDAC. Copyright © 2016 The Author(s). Published by Elsevier Inc. All rights reserved.
Health hazard evaluation report HETA 85-538-1667, General Telephone Company, Sherman, Texas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pettigrew, G.L.
1986-02-01
Following an employee request, potential health problems among telephone cable splicers were investigated at the General Telephone Company Sherman, Texas. Information was collected on materials used, work procedures, and personal protective equipment employed. Materials of primary concern were petrolatum in the filled cable, petroleum distillates used as cable cleaner, and isocyanates in the two-part reenterable encapsulant. Personal air samples taken by OSHA during pouring operations with the encapsulant revealed no detectable isocyanate concentrations. Observation of a large splicing operation showed the head of the splicer was positioned over the top of the casing while pouring encapsulant components allowing potential exposure.more » Petrolatum was determined to be physiologically inert. Nine of 32 potentially exposed workers completed questionnaires. The most frequently reported symptoms were head congestion and headaches at work; 67% reported warts and 33% reported skin rashes. The author concludes that a health hazard to employees does not exist under normal operating conditions. Workers are advised not to use cable cleaner for personal cleanup. To avoid potential isocyanate sensitization, minimizing exposure, use of personal protective equipment, and good work practices are recommended. Cuts and abrasions among splicers may be implicated in wart formation.« less
Personal, Anticipated Information Need
ERIC Educational Resources Information Center
Bruce, Harry
2005-01-01
Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…
Contextual constraints for the design of patient-centered health IT tools.
Gonzales, Michael J; O'Connor, Maria Francesca; Riek, Laurel D
2013-01-01
Technologists are constantly working to improve clinical practice by developing new health information technology (Health IT) tools, yet may not always consider the context of how these tools may be used. Patient preferences can vary widely as a result of demographics, health conditions, physical limitations, and personal inclinations, with healthcare providers having to adapt clinical encounters to better suit patient needs. Health IT tools, too, need to be agile across different healthcare contexts, with each stakeholder's specific needs in mind. In this paper, we discuss the challenges and limitations associated with the design and automation of contextually sensitive devices in the healthcare environment. We target the various contexts in which health information is presented in patient-provider encounters, and discuss contextual constraints that may apply to the aforementioned situations. In addition, we present a number of suggestions for informational constraints and the design of informational tools in these settings so that patient and provider informational needs can be better met in clinical communication contexts.
Loxton, Natalie J; Dawe, Sharon
2006-11-01
Biologically based personality traits such as reward and punishment sensitivity, and family factors, such as maternal dysfunctional eating and parental alcohol abuse, have been linked to hazardous drinking and disordered eating. However, specific relationships between personality and family factors in the development of these disorders are still unclear. A total of 443 women completed measures of reward and punishment sensitivity, family environment, maternal eating and parental drinking. Reward sensitivity was directly associated with both dysfunctional eating and drinking. Punishment sensitivity was associated with dysfunctional eating but not hazardous drinking. Punishment sensitivity mediated a chaotic family environment and daughters' dysfunctional eating. It is suggested that reward and punishment sensitivity are key traits to examine when investigating vulnerability to risky behaviour. Future research into disordered eating is likely to be advanced by an active search for mediators and moderators of family risk.
Context and sequelae of food insecurity in children's development.
Belsky, Daniel W; Moffitt, Terrie E; Arseneault, Louise; Melchior, Maria; Caspi, Avshalom
2010-10-01
The authors examined the role of food insecurity in the etiology of children's cognitive and mental health problems. Data from a prospective longitudinal study of 1,116 United Kingdom families with twins (sample constructed in 1999-2000) were used to test associations among household food insecurity; income; maternal personality; household sensitivity to children's needs; and children's cognitive, behavioral, and emotional development. Food-insecure children had lower IQs and higher levels of behavioral and emotional problems relative to their peers. After differences in household income, the personalities of children's mothers, and the sensitivity of household organization to children's needs were accounted for, food-insecure children had moderately higher levels of emotional problems relative to food-secure children (β = 0.22, P = 0.02). Differences in children's cognitive development were accounted for by household income, and differences in their behavioral development were accounted for by their mothers' personalities and their households' sensitivity to children's needs. Results suggest that food insecurity was associated with school-aged children's emotional problems but not with their cognitive or behavioral problems after accounting for differences in the home environments in which children were reared. Mothers' personality and household sensitivity to children's needs may present challenges to improving outcomes of children with food insecurity.
Nucleic Acids for Ultra-Sensitive Protein Detection
Janssen, Kris P. F.; Knez, Karel; Spasic, Dragana; Lammertyn, Jeroen
2013-01-01
Major advancements in molecular biology and clinical diagnostics cannot be brought about strictly through the use of genomics based methods. Improved methods for protein detection and proteomic screening are an absolute necessity to complement to wealth of information offered by novel, high-throughput sequencing technologies. Only then will it be possible to advance insights into clinical processes and to characterize the importance of specific protein biomarkers for disease detection or the realization of “personalized medicine”. Currently however, large-scale proteomic information is still not as easily obtained as its genomic counterpart, mainly because traditional antibody-based technologies struggle to meet the stringent sensitivity and throughput requirements that are required whereas mass-spectrometry based methods might be burdened by significant costs involved. However, recent years have seen the development of new biodetection strategies linking nucleic acids with existing antibody technology or replacing antibodies with oligonucleotide recognition elements altogether. These advancements have unlocked many new strategies to lower detection limits and dramatically increase throughput of protein detection assays. In this review, an overview of these new strategies will be given. PMID:23337338
Van Dongen, Isabella; Josephsson, Staffan; Ekstam, Lisa
2014-09-01
This qualitative study explored how some working Austrians experienced and coped with changes in their daily occupations after becoming informal carers of persons who had had a stroke. The study provides insights into the working carers' occupational experiences and strategies during a period of pronounced life changes. Three participants, who were employed in full- or part-time work, as well as being informal carers of persons who had had a stroke, were interviewed on two occasions. The data from these interviews were analysed using Interpretative Phenomenological Analyses. Carers found themselves in an ongoing process, ranging from the disruption of daily occupations to their eventual restructure. First, the stroke led to involuntary changes in the carers' daily life, which resulted in challenges in their own, and in shared, occupations. Second, carers actively changed their values and performance of occupations, which appeared to be a strategy to shape their well-being. Paid work was found to be a stabilizing and balancing occupation, which contributed to coping and the well-being of carers. The authors' findings demonstrate the benefits of paid work and engagement in meaningful occupation for the carers' well-being. These results should encourage occupational therapists to be sensitive to the complexity of the lives of working informal carers.
Vie, Loryana L.; Griffith, Kevin N.; Scheier, Lawrence M.; Lester, Paul B.; Seligman, Martin E. P.
2013-01-01
The Department of Defense (DoD) strives to efficiently manage the large volumes of administrative data collected and repurpose this information for research and analyses with policy implications. This need is especially present in the United States Army, which maintains numerous electronic databases with information on more than one million Active-Duty, Reserve, and National Guard soldiers, their family members, and Army civilian employees. The accumulation of vast amounts of digitized health, military service, and demographic data thus approaches, and may even exceed, traditional benchmarks for Big Data. Given the challenges of disseminating sensitive personal and health information, the Person-Event Data Environment (PDE) was created to unify disparate Army and DoD databases in a secure cloud-based enclave. This electronic repository serves the ultimate goal of achieving cost efficiencies in psychological and healthcare studies and provides a platform for collaboration among diverse scientists. This paper provides an overview of the uses of the PDE to perform command surveillance and policy analysis for Army leadership. The paper highlights the confluence of both economic and behavioral science perspectives elucidating empirically-based studies examining relations between psychological assets, health, and healthcare utilization. Specific examples explore the role of psychological assets in major cost drivers such as medical expenditures both during deployment and stateside, drug use, attrition from basic training, and low reenlistment rates. Through creation of the PDE, the Army and scientific community can now capitalize on the vast amounts of personnel, financial, medical, training and education, deployment, and security systems that influence Army-wide policies and procedures. PMID:24379795
Vie, Loryana L; Griffith, Kevin N; Scheier, Lawrence M; Lester, Paul B; Seligman, Martin E P
2013-01-01
The Department of Defense (DoD) strives to efficiently manage the large volumes of administrative data collected and repurpose this information for research and analyses with policy implications. This need is especially present in the United States Army, which maintains numerous electronic databases with information on more than one million Active-Duty, Reserve, and National Guard soldiers, their family members, and Army civilian employees. The accumulation of vast amounts of digitized health, military service, and demographic data thus approaches, and may even exceed, traditional benchmarks for Big Data. Given the challenges of disseminating sensitive personal and health information, the Person-Event Data Environment (PDE) was created to unify disparate Army and DoD databases in a secure cloud-based enclave. This electronic repository serves the ultimate goal of achieving cost efficiencies in psychological and healthcare studies and provides a platform for collaboration among diverse scientists. This paper provides an overview of the uses of the PDE to perform command surveillance and policy analysis for Army leadership. The paper highlights the confluence of both economic and behavioral science perspectives elucidating empirically-based studies examining relations between psychological assets, health, and healthcare utilization. Specific examples explore the role of psychological assets in major cost drivers such as medical expenditures both during deployment and stateside, drug use, attrition from basic training, and low reenlistment rates. Through creation of the PDE, the Army and scientific community can now capitalize on the vast amounts of personnel, financial, medical, training and education, deployment, and security systems that influence Army-wide policies and procedures.
Asthma and the hygiene hypothesis. Does cleanliness matter?
Weber, Juliane; Illi, Sabina; Nowak, Dennis; Schierl, Rudolf; Holst, Otto; von Mutius, Erika; Ege, Markus J
2015-03-01
The early hygiene hypothesis explained the development of allergies by a lack of infections; nowadays, the aspect of excessive cleanliness in affluent populations seems to have replaced this concept. Yet, no investigation has shown that home or personal cleanliness relate to allergic diseases. To relate personal and home cleanliness to risk of asthma and allergies. Comprehensive questionnaire information on home or personal cleanliness and allergic health conditions at school age was collected in 399 participants of the urban Perinatale Asthma Umwelt Langzeit Allergie Studie (PAULA) birth cohort. Bacterial markers were assessed in floor and mattress dust and were related to cleanliness and allergic diseases. Personal cleanliness was inversely related to bacterial compounds on floors and mattresses, whereas home cleanliness effectively reduced dust amount but not microbial markers. Exposure to muramic acid related to a lower prevalence of school-age asthma (adjusted odds ratio, 0.59 [95% confidence interval, 0.39; 0.90]). Mattress endotoxin in the first year of life was inversely associated with atopic sensitization (0.73 [0.56-0.96]) and asthma at school age (0.72 [0.55-0.95]). Despite the associations of dust parameters both with cleanliness and allergic health conditions, the development of allergies was not related to home and personal cleanliness. Bacterial exposure in house dust determined childhood asthma and allergies. Personal cleanliness, such as washing hands, and home cleanliness were objectively reflected by dust parameters in homes. However, neither personal nor home cleanliness was associated with a risk for asthma and allergies. Other microbial components in house dust not affected by personal hygiene are likely to play a role.
Burkill, Sarah; Copas, Andrew; Couper, Mick P.; Clifton, Soazig; Prah, Philip; Datta, Jessica; Conrad, Frederick; Wellings, Kaye; Johnson, Anne M.; Erens, Bob
2016-01-01
Background Interviewer-administered surveys are an important method of collecting population-level epidemiological data, but suffer from declining response rates and increasing costs. Web surveys offer more rapid data collection and lower costs. There are concerns, however, about data quality from web surveys. Previous research has largely focused on selection biases, and few have explored measurement differences. This paper aims to assess the extent to which mode affects the responses given by the same respondents at two points in time, providing information on potential measurement error if web surveys are used in the future. Methods 527 participants from the third British National Survey of Sexual Attitudes and Lifestyles (Natsal-3), which uses computer assisted personal interview (CAPI) and self-interview (CASI) modes, subsequently responded to identically-worded questions in a web survey. McNemar tests assessed whether within-person differences in responses were at random or indicated a mode effect, i.e. higher reporting of more sensitive responses in one mode. An analysis of pooled responses by generalized estimating equations addressed the impact of gender and question type on change. Results Only 10% of responses changed between surveys. However mode effects were found for about a third of variables, with higher reporting of sensitive responses more commonly found on the web compared with Natsal-3. Conclusions The web appears a promising mode for surveys of sensitive behaviours, most likely as part of a mixed-mode design. Our findings suggest that mode effects may vary by question type and content, and by the particular mix of modes used. Mixed-mode surveys need careful development to understand mode effects and how to account for them. PMID:26866687
Rhodes, Ramona L; Elwood, Bryan; Lee, Simon C; Tiro, Jasmin A; Halm, Ethan A; Skinner, Celette S
2017-07-01
Studies have identified racial differences in advance care planning and use of hospice for care at the end of life. Multiple reasons for underuse among African American patients and their families have been proposed and deserve further exploration. The goal of this study was to examine perceptions of advance care planning, palliative care, and hospice among a diverse sample of African Americans with varying degrees of personal and professional experience with end-of-life care and use these responses to inform a culturally sensitive intervention to promote awareness of these options. Semistructured interviews and focus groups were conducted with African Americans who had varying degrees of experience and exposure to end-of-life care both personally and professionally. We conducted in-depth qualitative analyses of these interviews and focus group transcripts and determined that thematic saturation had been achieved. Several themes emerged. Participants felt that advance care planning, palliative care, and hospice can be beneficial to African American patients and their families but identified specific barriers to completion of advance directives and hospice enrollment, including lack of knowledge, fear that these measures may hasten death or cause providers to deliver inadequate care, and perceived conflict with patients' faith and religious beliefs. Providers described approaches they use to address these barriers in their practices. Findings, which are consistent with and further elucidate those identified from previous research, will inform design of a culturally sensitive intervention to increase awareness and understanding of advance care planning, palliative care, and hospice among members of the African American community.
Exploring Environmental Variation in Residential Care Facilities for Older People.
Nordin, Susanna; McKee, Kevin; Wijk, Helle; Elf, Marie
2017-01-01
The aim of this study was to explore variation in environmental quality in Swedish residential care facilities (RCFs) using the Swedish version of the Sheffield Care Environment Assessment Matrix (S-SCEAM). Well-designed physical environments can positively impact on health and well-being among older persons with frail health living in RCFs and are essential for supporting person-centered care. However, the evidence base for informing the design of RCFs is weak, partly due to a lack of valid and reliable instruments that could provide important information on the environmental quality. Twenty RCFs were purposively sampled from several regions, varying in their building design, year of construction, size, and geographic location. The RCFs were assessed using S-SCEAM and the data were analyzed to examine variation in environmental quality between and within facilities. There was substantial variation in the quality of the physical environment between and within RCFs, reflected in S-SCEAM scores related to specific facility locations and with regard to domains reflecting residents' needs. In general, private apartments and dining areas had high S-SCEAM scores, while gardens had lower scores. Scores on the safety domain were high in the majority of RCFs, whereas scores for cognitive support and privacy were relatively low. Despite high building standard requirements, the substantial variations regarding environmental quality between and within RCFs indicate the potential for improvements to support the needs of older persons. We conclude that S-SCEAM is a sensitive and unique instrument representing a valuable contribution to evidence-based design that can support person-centered care.
Haversath, Julia; Gärttner, Kathrin M; Kliem, Sören; Vasterling, Ilka; Strauss, Bernhard; Kröger, Christoph
2017-08-21
There have not been any population-based surveys in Germany to date on the frequency of various types of sexual behavior. The topic is of interdisciplinary interest, particularly with respect to the prevention and treatment of sexually transmitted infections. Within the context of a survey that dealt with multiple topics, information was obtained from 2524 persons about their sexual orientation, sexual practices, sexual contacts outside relationships, and contraception. Most of the participating women (82%) and men (86%) described themselves as heterosexual. Most respondents (88%) said they had engaged in vaginal intercourse at least once, and approximately half said they had engaged in oral intercourse at least once (either actively or passively). 4% of the men and 17% of the women said they had been the receptive partner in anal intercourse at least once. 5% of the respondents said they had had unprotected sexual intercourse outside their primary partnership on a single occasion, and 8% said they had done so more than once; only 2% of these persons said they always used a condom during sexual intercourse with their primary partner. Among persons reporting unprotected intercourse outside their primary partnership, 25% said they had undergone a medical examination afterward because of concern about a possible sexually transmitted infection. Among some groups of persons, routine sexual-medicine examinations may help contain the spread of sexually transmitted infections. One component of such examinations should be sensitive questioning about the types of sexual behavior that are associated with a high risk of infection. Information should be provided about the potential modes of transmission, including unprotected vaginal, oral, and anal intercourse outside the primary partnership.
Ferro, T; Klein, D N
1997-01-01
The present study examined the concordance of the Family History Interview for Personality Disorders (FHIPD) with diagnoses based on direct interviews and between pairs of informants. Subjects were 224 probands participating in a series of studies of the familial transmission of mood and personality disorders and their first-degree relatives. Proband informants and relatives provided information about themselves on the Structured Clinical Interview for DSM-III-R (SCID), Personality Disorder Examination (PDE), and Eysenck Personality Questionnaire (EPQ). Information from informants about relatives was collected with the FHIPD. All assessments were made blindly and independently. Using Kappa, concordance between proband informants' family histories and relative direct reports on specific personality disorders was low, ranging from -.01 to .28, with a median of .10. Kappa for a diagnosis of any personality disorder was .16. When two independent informant reports were compared, Kappas for specific Axis II disorders ranged from .10 to .72, with a median of .28. Kappa for a diagnosis of any personality disorder was .36. These data suggest that subjects and informants provide different perspectives on Axis II psychopathology, and support the use of both sources of information whenever possible.
Age changes and differences in personality traits and states of the old and very old.
Martin, Peter; Long, M Valora; Poon, Leonard W
2002-03-01
The purpose of this study was to examine stability and change in personality traits and states for 3 age groups: centenarians, octogenarians, and sexagenarians. One hundred seventy-nine older adults participated in the 2-wave study. Results concerning age-group differences indicated that centenarians scored higher in Suspiciousness but lower in Intelligence and Stress when compared with the other 2 age groups. Octogenarians were lower in the personality traits Intelligence, Dominance, and Conscientiousness when compared with sexagenarians. Octogenarians were lower in the personality state Arousal, but higher on Regression. Results from the longitudinal analyses for centenarians indicated lower scores for Sensitivity, but higher scores for Radicalism (both personality traits), as well as higher scores of Fatigue and Depression (personality states) at follow-up. For the younger 2 age groups, age changes included higher scores for Sensitivity and Suspiciousness (personality traits). Stability scores for traits and states were considerably lower for centenarians when compared with the younger age groups.
Content Sharing Based on Personal Information in Virtually Secured Space
NASA Astrophysics Data System (ADS)
Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.
User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.
32 CFR 806b.43 - Placing personal information on shared drives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...
32 CFR 806b.43 - Placing personal information on shared drives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...
32 CFR 806b.43 - Placing personal information on shared drives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...
32 CFR 806b.43 - Placing personal information on shared drives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...
Person Name Disambiguation in the Multicultural and Online Setting
ERIC Educational Resources Information Center
Treeratpituk, Pucktada
2012-01-01
With the recent rise in popularity of social network sites, more and more personal information is becoming available online. Since a person's information is generally available in various formats across multiple sites, there are ever increasing interests in consolidating such personal information from multiple information sources. The goal of…
22 CFR 1003.5 - Access to personal information from Inter-American Foundation records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Access to personal information from Inter-American Foundation records. 1003.5 Section 1003.5 Foreign Relations INTER-AMERICAN FOUNDATION RULES SAFEGUARDING PERSONAL INFORMATION IN IAF RECORDS § 1003.5 Access to personal information from Inter-American...
ERIC Educational Resources Information Center
Balogh, R.; Brownell, M.; Ouellette-Kuntz, H.; Colantonio, A.
2010-01-01
Background: There is evidence that persons with an intellectual disability (ID) face barriers to primary care; however, this has not been extensively studied at the population level. Rates of hospitalisation for ambulatory care sensitive conditions are used as an indicator of access to, and quality of, primary care. The objective of the study was…
NASA Astrophysics Data System (ADS)
Chandrashekar, Varsha; B, Prabadevi
2017-11-01
Providing services to user is the main functionality of every search engine. Recently services based on users’ current location has also been enabled with the help of GPS in every smartphone. But how safe are their searches and how trustworthy is the search engine. Why are users tracked even when they turn off the tracking. Where lies the solution. Unless there is a security system to prevent ad trackers from misusing user’ s location, any application which relies on user’ s location will be of no use. We know that location information is highly sensitive personal data. Knowing where a person was at a particular time, one can infer his/her personal activities, political views, health status, and launch unsolicited advertising, physical attacks or harassment. Therefore, mechanisms to preserve users' privacy and anonymity are mandatory in any application that involves users’ location. So there comes the need to hide the location of the users. This proposed application aims to implement some of the features required for preserving users’ privacy and also a secure user login so that services provided to users can be used by them without danger of their searches being misused.
Roles for Agent Assistants in Field Science: Understanding Personal Projects and Collaboration
NASA Technical Reports Server (NTRS)
Clancey, William J.
2003-01-01
A human-centered approach to computer systems design involves reframing analysis in terms of the people interacting with each other. The primary concern is not how people can interact with computers, but how shall we design work systems (facilities, tools, roles, and procedures) to help people pursue their personal projects, as they work independently and collaboratively? Two case studies provide empirical requirements. First, an analysis of astronaut interactions with CapCom on Earth during one traverse of Apollo 17 shows what kind of information was conveyed and what might be automated today. A variety of agent and robotic technologies are proposed that deal with recurrent problems in communication and coordination during the analyzed traverse. Second, an analysis of biologists and a geologist working at Haughton Crater in the High Canadian Arctic reveals how work interactions between people involve independent personal projects, sensitively coordinated for mutual benefit. In both cases, an agent or robotic system's role would be to assist people, rather than collaborating, because today's computer systems lack the identity and purpose that consciousness provides.
Piloting a Deceased Subject Integrated Data Repository and Protecting Privacy of Relatives
Huser, Vojtech; Kayaalp, Mehmet; Dodd, Zeyno A.; Cimino, James J.
2014-01-01
Use of deceased subject Electronic Health Records can be an important piloting platform for informatics or biomedical research. Existing legal framework allows such research under less strict de-identification criteria; however, privacy of non-decedent must be protected. We report on creation of the decease subject Integrated Data Repository (dsIDR) at National Institutes of Health, Clinical Center and a pilot methodology to remove secondary protected health information or identifiable information (secondary PxI; information about persons other than the primary patient). We characterize available structured coded data in dsIDR and report the estimated frequencies of secondary PxI, ranging from 12.9% (sensitive token presence) to 1.1% (using stricter criteria). Federating decedent EHR data from multiple institutions can address sample size limitations and our pilot study provides lessons learned and methodology that can be adopted by other institutions. PMID:25954378
Piloting a deceased subject integrated data repository and protecting privacy of relatives.
Huser, Vojtech; Kayaalp, Mehmet; Dodd, Zeyno A; Cimino, James J
2014-01-01
Use of deceased subject Electronic Health Records can be an important piloting platform for informatics or biomedical research. Existing legal framework allows such research under less strict de-identification criteria; however, privacy of non-decedent must be protected. We report on creation of the decease subject Integrated Data Repository (dsIDR) at National Institutes of Health, Clinical Center and a pilot methodology to remove secondary protected health information or identifiable information (secondary PxI; information about persons other than the primary patient). We characterize available structured coded data in dsIDR and report the estimated frequencies of secondary PxI, ranging from 12.9% (sensitive token presence) to 1.1% (using stricter criteria). Federating decedent EHR data from multiple institutions can address sample size limitations and our pilot study provides lessons learned and methodology that can be adopted by other institutions.
Construct validity of the MMPI-2 College Maladjustment (Mt) Scale.
Barthlow, Deanna L; Graham, John R; Ben-Porath, Yossef S; McNulty, John L
2004-09-01
The construct validity of the MMPI-2 (Minnesota Multiphasic Personality Inventory-2) College Maladjustment (Mt) Scale was examined using 376 student clients at a university psychological clinic. A principal components analysis and correlations of Mt scale scores with clients' and therapists' ratings of symptoms and functioning showed that the Mt scale identifies the presence of maladjustment as defined in terms of depressive and anxious symptoms. There is no evidence to show that the scale is specific to college students or that it is sensitive to severe psychological disturbance. The Mt scale does not inform the clinician as to why a person is distressed. In addition, there is no evidence from this study to suggest the superiority of the Mt scale over other MMPI-2 maladjustment measures. Therapists should use the entire MMPI-2 profile, not just the Mt scale, to gain the most comprehensive and specific understanding of clients.
No blank slates: Pre-existing schemas about pharmaceuticals predict memory for side effects.
Heller, Monika K; Chapman, Sarah C E; Horne, Rob
2017-04-01
Attribution of symptoms as medication side effects is informed by pre-existing beliefs about medicines and perceptions of personal sensitivity to their effects (pharmaceutical schemas). We tested whether (1) pharmaceutical schemas were associated with memory (recall/recognition) for side effect information (2) memory explained the attribution of a common unrelated symptom as a side effect. In this analogue study participants saw the patient leaflet of a fictitious asthma drug listing eight side effects. We measured recall and recognition memory for side effects and used a vignette to test whether participants attributed an unlisted common symptom (headache) as a side effect. Participants who perceived pharmaceuticals as more harmful in general recalled fewer side effects correctly (r Correct Recall = -.273), were less able to differentiate between listed and unlisted side effects (r Recognition Sensitivity = -.256) and were more likely to attribute the unlisted headache symptom as a side effect (r side effect attribution = .381, ps < .01). The effect of harm beliefs on side effect attribution was partially mediated by correct recall of side effects. Pharmaceutical schemas are associated with memory for side effect information. Memory may explain part of the association between pharmaceutical schemas and the attribution of unrelated symptoms as side effects.
The Effects of Cultural Transmission Are Modulated by the Amount of Information Transmitted
ERIC Educational Resources Information Center
Griffiths, Thomas L.; Lewandowsky, Stephan; Kalish, Michael L.
2013-01-01
Information changes as it is passed from person to person, with this process of cultural transmission allowing the minds of individuals to shape the information that they transmit. We present mathematical models of cultural transmission which predict that the amount of information passed from person to person should affect the rate at which that…
Optical security system for the protection of personal identification information.
Doh, Yang-Hoi; Yoon, Jong-Soo; Choi, Kyung-Hyun; Alam, Mohammad S
2005-02-10
A new optical security system for the protection of personal identification information is proposed. First, authentication of the encrypted personal information is carried out by primary recognition of a personal identification number (PIN) with the proposed multiplexed minimum average correlation energy phase-encrypted (MMACE_p) filter. The MMACE_p filter, synthesized with phase-encrypted training images, can increase the discrimination capability and prevent the leak of personal identification information. After the PIN is recognized, speedy authentication of personal information can be achieved through one-to-one optical correlation by means of the optical wavelet filter. The possibility of information counterfeiting can be significantly decreased with the double-identification process. Simulation results demonstrate the effectiveness of the proposed technique.
Interpersonal sensitivity is correlated with sociotropy but not with autonomy in healthy subjects.
Otani, Koichi; Suzuki, Akihito; Kamata, Mitsuhiro; Matsumoto, Yoshihiko; Shibuya, Naoshi; Sadahiro, Ryoichi
2012-02-01
Interpersonal sensitivity is a depression-prone personality trait closely related to anxious attachment, whereas sociotropy and autonomy are personality vulnerability factors in the cognitive theory of depression. In the present study, the relationships of interpersonal sensitivity with sociotropy and autonomy were studied in 362 healthy subjects. Interpersonal sensitivity was assessed using the Interpersonal Sensitivity Measure (IPSM), whereas sociotropy and autonomy were evaluated using the Sociotropy and Autonomy subscales, respectively, of the Sociotropy-Autonomy Scale. The IPSM was significantly correlated with the Sociotropy subscale (β = 0.61, p < 0.001) but not with the Autonomy subscale. All subscales of the IPSM correlated significantly with the Sociotropy subscale, and the correlation for the Separation Anxiety subscale (β = 0.56, p < 0.001) was strongest. The present study suggests that interpersonal sensitivity is correlated with sociotropy but not with autonomy in healthy subjects.
Impulsivity in men with prescription of benzodiazepines and methadone in prison.
Moreno-Ramos, Luis; Fernández-Serrano, María José; Pérez-García, Miguel; Verdejo-García, Antonio
2016-06-14
Benzodiazepines and methadone use has been associated with various neuropsychological impairments. However, to the best of our knowledge, no studies have been carried out on the effect of these substances (either separately or combined) on impulsive personality, including studies in prisoners. The aim of this study is to examine the impulsive personality of a sample of 134 male prisoners using the Sensitivity to Punishment and Sensitivity to Reward Questionnaire (Torrubia, Avila, Molto, & Caseras, 2001) and the UPPS-P Scale (Cyders et al., 2007). Some of these were methadone users, methadone and benzodiazepines users, polydrug users in abstinence and non-dependent drug users. The results showed that drug users have greater sensitivity to reward, positive urgency, negative urgency and sensation seeking than non-dependent users. Methadone users showed more sensitivity to punishment and lack of perseverance with respect to other users. No differences were found between methadone+benzodiazepines users and other groups. The secondary aim is to examine which impulsive personality dimensions are related to the two motivational systems proposed by Gray (BIS-BAS) using exploratory factor analysis. Results showed two different components. One component was defined by the subscales sensitivity to reinforcement, positive urgency, negative urgency and sensation seeking. The second component was defined by the subscales sensitivity to punishment, lack of perseverance and lack of premeditation.
Hsu, Jia-Lien; Hung, Ping-Cheng; Lin, Hung-Yen; Hsieh, Chung-Ho
2015-04-01
Breast cancer is one of the most common cause of cancer mortality. Early detection through mammography screening could significantly reduce mortality from breast cancer. However, most of screening methods may consume large amount of resources. We propose a computational model, which is solely based on personal health information, for breast cancer risk assessment. Our model can be served as a pre-screening program in the low-cost setting. In our study, the data set, consisting of 3976 records, is collected from Taipei City Hospital starting from 2008.1.1 to 2008.12.31. Based on the dataset, we first apply the sampling techniques and dimension reduction method to preprocess the testing data. Then, we construct various kinds of classifiers (including basic classifiers, ensemble methods, and cost-sensitive methods) to predict the risk. The cost-sensitive method with random forest classifier is able to achieve recall (or sensitivity) as 100 %. At the recall of 100 %, the precision (positive predictive value, PPV), and specificity of cost-sensitive method with random forest classifier was 2.9 % and 14.87 %, respectively. In our study, we build a breast cancer risk assessment model by using the data mining techniques. Our model has the potential to be served as an assisting tool in the breast cancer screening.
Epidemiological studies of particulate matter (PM) routinely use concentrations measured with stationary outdoor monitors as surrogates for personal exposure. Despite the frequently reported poor correlations between ambient concentrations and total personal exposure, the epidemi...
Personality traits of the relatives of autistic probands.
Murphy, M; Bolton, P F; Pickles, A; Fombonne, E; Piven, J; Rutter, M
2000-11-01
There is substantial evidence that the genetic liability to autism confers a risk for a range of more subtle social and communication impairments, as well as stereotyped and repetitive behaviours. Recent research suggests that increased expression of particular personality traits may be a manifestation of the liability to autism. To investigate this we examined the personality traits of the adult relatives of 99 autistic and 36 Down's syndrome probands, using the informant version of the Modified Personality Assessment Schedule. There was significantly increased expression of the traits anxious, impulsive, aloof, shy, over-sensitive, irritable and eccentric among the autism relatives with evidence of different profiles for male and female relatives and for parents and adult children. Factor analysis revealed three broad groups of traits, two of which ('withdrawn' and 'difficult') appeared to reflect impairments in social functioning and a third group of anxiety related traits ('tense'). Each of these factors differed in their pattern of associations with the factor we termed 'withdrawn' showing a similar pattern of association to that found for other autism related conditions. The 'tense' factor appeared in part to be related to the burden of caring for an autistic child. This study confirms the finding that particular personality traits may aggregate in the family members of autistic individuals and furthermore that some of these traits may be a manifestation of the liability to autism.
Poelen, Evelien A P; Schijven, Esmée P; Otten, Roy; Didden, Robert
2017-04-01
The aim of this study was to examine the role of the personality dimensions anxiety sensitivity, negative thinking, impulsivity and sensation seeking (as assessed by the revised version of the Substance Use Risk Profile Scale; SURPS) in substance use in individuals with mild to borderline intellectual disabilities (MBID). We tested the relationship between level of ID and SURPS personality dimensions and the relationship between SURPS personality dimensions and severity of alcohol and drug use. Participants were 118 persons (mean age 20.5 years) with a mean IQ of 71.1 admitted to care facilities for persons with MBID and severe behavioral problems. We found no significant relationship between level of ID and the four personality dimensions. In addition, findings showed that individuals with lower levels of anxiety sensitivity, higher levels of negative thinking, impulsivity and sensation seeking showed more severe alcohol use. Individuals with higher levels of negative thinking and sensation seeking had more severe drug use. The SURPS personality dimensions identify persons at increased risk for substance use disorders and might be useful in developing selective substance use interventions for individuals with MBID. Copyright © 2016 Elsevier Ltd. All rights reserved.
Debast, Inge; Rossi, Gina; Feenstra, Dineke; Hutsebaut, Joost
2017-04-01
Criterion D of the Diagnostic and Statistical Manual of Mental Disorders (5th ed.; DSM-5 ; American Psychiatric Association [APA], 2013) refers to a possible onset of personality disorders (PDs) in adolescence and in Section II the development/course in adolescence is described by some typical characteristics for several PDs. Yet, age-specific expressions of PDs are lacking in Section III. We urgently need a developmentally sensitive assessment instrument that differentiates developmental and contextual changes on the one hand from expressions of personality pathology on the other hand. Therefore we investigated which items of the Severity Indices for Personality Problems-118 (SIPP-118) were developmentally sensitive throughout adolescence and adulthood and which could be considered more age-specific markers requiring other content or thresholds over age groups. Applying item response theory (IRT) we detected differential item functioning (DIF) in 36% of the items in matched samples of 639 adolescents versus 639 adults. The DIF across age groups mainly reflected a different degree of symptom expressions for the same underlying level of functioning. The threshold for exhibiting symptoms given a certain degree of personality dysfunction was lower in adolescence for areas of personality functioning related to the Self and Interpersonal domains. Some items also measured a latent construct of personality functioning differently across adolescents and adults. This suggests that several facets of the SIPP-118 do not solely measure aspects of personality pathology in adolescents, but likely include more developmental issues. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Collmann, Jeff; Cooper, Ted
2007-01-01
This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
41 CFR 109-1.5109 - Control of sensitive items.
Code of Federal Regulations, 2010 CFR
2010-07-01
... administrative control of sensitive items assigned for general use within an organizational unit as appropriate... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Control of sensitive...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5109 Control of sensitive items...
ERIC Educational Resources Information Center
Mesch, Gustavo S.; Beker, Guy
2010-01-01
This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…
Information Security and Data Breach Notification Safeguards
2007-07-31
for unauthorized purposes. Data breach notification requirements obligate covered entities to provide notice to affected persons (e.g., cardholders...customers) about the occurrence of a data security breach involving personally identifiable information. The first data breach notification law was...computerized personal information to disclose any breach of a resident’s personal information. S.B. 1386 was the model for subsequent data breach notification
Recognition and pseudonymisation of medical records for secondary use.
Heurix, Johannes; Fenz, Stefan; Rella, Antonio; Neubauer, Thomas
2016-03-01
Health records rank among the most sensitive personal information existing today. An unwanted disclosure to unauthorised parties usually results in significant negative consequences for an individual. Therefore, health records must be adequately protected in order to ensure the individual's privacy. However, health records are also valuable resources for clinical studies and research activities. In order to make the records available for privacy-preserving secondary use, thorough de-personalisation is a crucial prerequisite to prevent re-identification. This paper introduces MEDSEC, a system which automatically converts paper-based health records into de-personalised and pseudonymised documents which can be accessed by secondary users without compromising the patients' privacy. The system converts the paper-based records into a standardised structure that facilitates automated processing and the search for useful information.
Wiley, Georgina; Piper, Amanda; Phyllis Butow, A M; Schofield, Penny; Douglas, Fiona; Roy, Jane; Nolte, Linda; Jefford, Michael
2018-01-01
Australia is a multicultural nation with a large migrant population. Migrants with cancer report inferior quality of life and the need for more information in their own language. This paper describes lessons learnt from developing culturally appropriate written information resources with and for Arabic, Italian, and Vietnamese cancer survivors and carers. The information needs of survivors from these language groups as well as guidelines for the development of written resources for culturally diverse populations were identified through literature review. Community consultation was undertaken with focus groups. The content was developed and tested with health professionals who spoke the appropriate language and focus group participants, ensuring relevance and appropriateness. Resource design and dissemination were informed through community consultation. A number of key tasks for developing resources were identified as follows: (1) community engagement and consultation; (2) culturally sensitive data collection; (3) focus group facilitators (recruitment and training); (4) content development; (5) translation and review process; (6) design; and (7) sustainability. This project reinforced literature review findings on the importance of cultural sensitivity in the development of resources. Engaging with community groups and incorporating culturally appropriate recruitment strategies optimises recruitment to focus groups and facilitates content development. Stakeholders and lay persons from the intended ethnic-minority communities should be involved in the development and formative evaluation of resources to ensure appropriateness and relevance and in the dissemination strategy to optimize penetration. We believe the lessons we have learnt will be relevant to any group intending to develop health information for culturally and linguistic diverse groups.
Wiley, Georgina; Piper, Amanda; Phyllis Butow, AM; Schofield, Penny; Douglas, Fiona; Roy, Jane; Nolte, Linda; Jefford, Michael
2018-01-01
Australia is a multicultural nation with a large migrant population. Migrants with cancer report inferior quality of life and the need for more information in their own language. This paper describes lessons learnt from developing culturally appropriate written information resources with and for Arabic, Italian, and Vietnamese cancer survivors and carers. The information needs of survivors from these language groups as well as guidelines for the development of written resources for culturally diverse populations were identified through literature review. Community consultation was undertaken with focus groups. The content was developed and tested with health professionals who spoke the appropriate language and focus group participants, ensuring relevance and appropriateness. Resource design and dissemination were informed through community consultation. A number of key tasks for developing resources were identified as follows: (1) community engagement and consultation; (2) culturally sensitive data collection; (3) focus group facilitators (recruitment and training); (4) content development; (5) translation and review process; (6) design; and (7) sustainability. This project reinforced literature review findings on the importance of cultural sensitivity in the development of resources. Engaging with community groups and incorporating culturally appropriate recruitment strategies optimises recruitment to focus groups and facilitates content development. Stakeholders and lay persons from the intended ethnic-minority communities should be involved in the development and formative evaluation of resources to ensure appropriateness and relevance and in the dissemination strategy to optimize penetration. We believe the lessons we have learnt will be relevant to any group intending to develop health information for culturally and linguistic diverse groups. PMID:29379844
32 CFR 1700.11 - Procedures for information concerning other persons.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... INFORMATION ACT § 1700.11 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the FOIA if the...
Personalized professional content recommendation
Xu, Songhua
2015-10-27
A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.
Selectivity to Translational Egomotion in Human Brain Motion Areas
Pitzalis, Sabrina; Sdoia, Stefano; Bultrini, Alessandro; Committeri, Giorgia; Di Russo, Francesco; Fattori, Patrizia; Galletti, Claudio; Galati, Gaspare
2013-01-01
The optic flow generated when a person moves through the environment can be locally decomposed into several basic components, including radial, circular, translational and spiral motion. Since their analysis plays an important part in the visual perception and control of locomotion and posture it is likely that some brain regions in the primate dorsal visual pathway are specialized to distinguish among them. The aim of this study is to explore the sensitivity to different types of egomotion-compatible visual stimulations in the human motion-sensitive regions of the brain. Event-related fMRI experiments, 3D motion and wide-field stimulation, functional localizers and brain mapping methods were used to study the sensitivity of six distinct motion areas (V6, MT, MST+, V3A, CSv and an Intra-Parietal Sulcus motion [IPSmot] region) to different types of optic flow stimuli. Results show that only areas V6, MST+ and IPSmot are specialized in distinguishing among the various types of flow patterns, with a high response for the translational flow which was maximum in V6 and IPSmot and less marked in MST+. Given that during egomotion the translational optic flow conveys differential information about the near and far external objects, areas V6 and IPSmot likely process visual egomotion signals to extract information about the relative distance of objects with respect to the observer. Since area V6 is also involved in distinguishing object-motion from self-motion, it could provide information about location in space of moving and static objects during self-motion, particularly in a dynamically unstable environment. PMID:23577096
Entwistle, Vikki Ann; France, Emma F; Wyke, Sally; Jepson, Ruth; Hunt, Kate; Ziebland, Sue; Thompson, Andrew
2011-12-01
To investigate people's views of using 'general facts' and information about other people's 'personal experiences' for health-related decision-making. Sixty-two people, who between them had experience of five different focal health issues, participated in 12 focus groups and 9 interviews. Exploration of uses of the two types of information was supported by discussion of illustrative excerpts. There was less discussion of 'general facts'; participants thought it obvious that good decisions required these. Participants reported having used 'personal experiences' information to: recognise decisions that needed consideration; identify options; appraise options and make selections (including by developing and reflecting on their reasoning about possible choices); and support coping strategies. Their inclination to use 'personal experiences' information was apparently moderated by assessments of personal relevance, the motives of information providers and the 'balance' of experiences presented. People can use 'personal experiences' information in various ways to support their decision-making, and exercise some discrimination as they do. 'Personal experiences' information may help people in a number of ways in relation to decision-making. However, 'personal experiences' information does not replace the need for 'general facts' and care should be taken when it is used in resources for patients. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Persson, Roger; Høgh, Annie; Grynderup, Matias Brødsgaard; Willert, Morten Vejs; Gullander, Maria; Hansen, Åse Marie; Kolstad, Henrik Albert; Mors, Ole; Mikkelsen, Eva Gemzøe; Kristensen, Ann Suhl; Kaerlev, Linda; Rugulies, Reiner; Bonde, Jens Peter Ellekilde
2016-09-01
To examine whether a shift in work-related bullying status, from being non-bullied to being bullied or vice versa, was associated with changes in reporting of personality characteristics. Data on bullying and personality (neuroticism, extraversion, and sense of coherence) were collected in three waves approximately 2 years apart (N = 4947). Using a within-subjects design, personality change scores that followed altered bullying status were evaluated with one-sample t tests. Sensitivity analyses targeted depressive symptoms. Shifts from non-bullied to frequently bullied were associated with increased neuroticism or decreased sense of coherence manageability scores. Shifts from bullied to non-bullied were associated with decreasing neuroticism and increasing extraversion scores, or increasing sense of coherence meaningfulness and comprehensibility scores. Excluding depressive cases had minor effects. Bullying seems to some extent to affect personality scale scores, which thus seem sensitive to environmental and social circumstances.
... After being exposed to a substance such as bee sting venom, the person's immune system becomes sensitized ... person. If the allergic reaction is from a bee sting, scrape the stinger off the skin with ...
Sato, João Ricardo; de Araujo Filho, Gerardo Maria; de Araujo, Thabata Bueno; Bressan, Rodrigo Affonsecca; de Oliveira, Pedro Paulo; Jackowski, Andrea Parolin
2012-09-01
Several recent studies in literature have identified brain morphological alterations associated to Borderline Personality Disorder (BPD) patients. These findings are reported by studies based on voxel-based-morphometry analysis of structural MRI data, comparing mean gray-matter concentration between groups of BPD patients and healthy controls. On the other hand, mean differences between groups are not informative about the discriminative value of neuroimaging data to predict the group of individual subjects. In this paper, we go beyond mean differences analyses, and explore to what extent individual BPD patients can be differentiated from controls (25 subjects in each group), using a combination of automated-morphometric tools for regional cortical thickness/volumetric estimation and Support Vector Machine classifier. The approach included a feature selection step in order to identify the regions containing most discriminative information. The accuracy of this classifier was evaluated using the leave-one-subject-out procedure. The brain regions indicated as containing relevant information to discriminate groups were the orbitofrontal, rostral anterior cingulate, posterior cingulate, middle temporal cortices, among others. These areas, which are distinctively involved in emotional and affect regulation of BPD patients, were the most informative regions to achieve both sensitivity and specificity values of 80% in SVM classification. The findings suggest that this new methodology can add clinical and potential diagnostic value to neuroimaging of psychiatric disorders. Copyright © 2012 Elsevier Ltd. All rights reserved.
Punishment sensitivity modulates the processing of negative feedback but not error-induced learning.
Unger, Kerstin; Heintz, Sonja; Kray, Jutta
2012-01-01
Accumulating evidence suggests that individual differences in punishment and reward sensitivity are associated with functional alterations in neural systems underlying error and feedback processing. In particular, individuals highly sensitive to punishment have been found to be characterized by larger mediofrontal error signals as reflected in the error negativity/error-related negativity (Ne/ERN) and the feedback-related negativity (FRN). By contrast, reward sensitivity has been shown to relate to the error positivity (Pe). Given that Ne/ERN, FRN, and Pe have been functionally linked to flexible behavioral adaptation, the aim of the present research was to examine how these electrophysiological reflections of error and feedback processing vary as a function of punishment and reward sensitivity during reinforcement learning. We applied a probabilistic learning task that involved three different conditions of feedback validity (100%, 80%, and 50%). In contrast to prior studies using response competition tasks, we did not find reliable correlations between punishment sensitivity and the Ne/ERN. Instead, higher punishment sensitivity predicted larger FRN amplitudes, irrespective of feedback validity. Moreover, higher reward sensitivity was associated with a larger Pe. However, only reward sensitivity was related to better overall learning performance and higher post-error accuracy, whereas highly punishment sensitive participants showed impaired learning performance, suggesting that larger negative feedback-related error signals were not beneficial for learning or even reflected maladaptive information processing in these individuals. Thus, although our findings indicate that individual differences in reward and punishment sensitivity are related to electrophysiological correlates of error and feedback processing, we found less evidence for influences of these personality characteristics on the relation between performance monitoring and feedback-based learning.
A new sensor for the assessment of personal exposure to volatile organic compounds
NASA Astrophysics Data System (ADS)
Chen, Cheng; Driggs Campbell, Katherine; Negi, Indira; Iglesias, Rodrigo A.; Owens, Patrick; Tao, Nongjian; Tsow, Francis; Forzani, Erica S.
2012-07-01
To improve our understanding of indoor and outdoor personal exposures to common environmental toxicants released into the environment, new technologies that can monitor and quantify the toxicants anytime anywhere are needed. This paper presents a wearable sensor to provide such capabilities. The sensor can communicate with a common smart phone and provides accurate measurement of volatile organic compound concentration at a personal level in real-time, providing environmental toxicants data every three minutes. The sensor has high specificity and sensitivity to aromatic, alkyl, and chlorinated hydrocarbons with a resolution as low as 4 parts-per-billion (ppb), with a detection range of 4 ppb-1000 ppm (parts-per-million). The sensor's performance was validated using Gas Chromatography and Selected Ion Flow Tube - Mass Spectrometry reference methods in a variety of environments and activities with overall accuracy higher than 81% (r2 > 0.9). Field tests examined personal exposure in various scenarios including: indoor and outdoor environments, traffic exposure in different cities which vary from 0 to 50 ppmC (part-per-million carbon from hydrocarbons), and pollutants near the 2010 Deepwater Horizon's oil spill. These field tests not only validated the performance but also demonstrated unprecedented high temporal and spatial toxicant information provided by the new technology.
Imagine the Feeling: An Aesthetic Science of Psychology.
Quigua, Fernando; Clegg, Joshua W
2015-09-01
We claim that static trait models have dominated contemporary personality psychology but fail to reflect adequately the persons they depict. Beginning from, but moving well beyond, this critique of the five factor model (and the personality psychology field over which it reigns), we shine an aesthetic and critical light on psychology's wider failings. We review the linguistic and methodological features that have undermined the discipline's faithful understandings of human beings and their experience. In its place, we champion an aesthetic (as opposed to an an-esthetic) science of the person, one that is responsive in spirit and in practice to the emotional and imaginative life of participants and to the contexts in which they move. Specifically, we suggest that the images of fantasy and of ordinary metaphor may afford poetic understandings of participant experience that surpass those produced by literal, discursive description. We also hold that these images may offer us the most sensitive and faithful expressions of how social and environmental contexts-and so-called structural and discursive realities-are felt. The paper concludes by sketching several methodological trajectories that may stimulate researcher imagination and empathy, making research more faithful to participants and the reaches of their experience. Research practices informed by feeling and image in this way may generate new knowledge as well as new obligations.
A New Sensor for the Assessment of Personal Exposure to Volatile Organic Compounds
Chen, Cheng; Campbell, Katherine Driggs; Negi, Indira; Iglesias, Rodrigo A.; Owens, Patrick; Tao, Nongjian; Tsow, Francis; Forzani, Erica
2012-01-01
To improve our understanding of indoor and outdoor personal exposures to common environmental toxicants released into the environment, new technologies that can monitor and quantify the toxicants anytime anywhere are needed. This paper presents a wearable sensor to provide such capabilities. The sensor can communicate with a common smart phone and provides accurate measurement of volatile organic compound concentration at a personal level in real time, providing environmental toxicants data every three minutes. The sensor has high specificity and sensitivity to aromatic, alkyl, and chlorinated hydrocarbons with a resolution as low as 4 parts per billion (ppb), with a detection range of 4 ppb to 1000 ppm (parts per million). The sensor's performance was validated using Gas Chromatography and Selected Ion Flow Tube - Mass Spectrometry reference methods in a variety of environments and activities with overall accuracy higher than 81% (r2 > 0.9). Field tests examined personal exposure in various scenarios including: indoor and outdoor environments, traffic exposure in different cities which vary from 0 to 50 ppmC (part-per-million carbon from hydrocarbons), and pollutants near the 2010 Deepwater Horizon's oil spill. These field tests not only validated the performance but also demonstrated unprecedented high temporal and spatial toxicant information provided by the new technology. PMID:22736952
Carvalho, Lucas de F; Pianowski, Giselle; Filho, Nelson H
2017-05-01
The Clinical Dimensional Personality Inventory (IDCP) is a 163-item self-report tool developed for the assessment of 12 dimensions of personality pathology. One of the scales comprising the instrument-the Dependency scale-is intended to provide psychometric information on traits closely related to the Dependent Personality Disorder (DPD). In the present study, we used both Item Response Theory modeling and Receiver Operating Characteristic curve analysis to establishing a clinically meaningful cutoff for the IDCP Dependency Scale. Participants were 2.481 adults, comprised by outpatients diagnosed with DPD, outpatients diagnosed with other PDs, and adults from the general population. The Wright's item map graphing technique revealed that outpatients were located at the very high levels in the latent scale continuum of the Dependency Scale, with a very large effect size for the mean difference between patients and non-patients. The ROC curve analysis supported a cutoff at 2.3 points in the Dependency Scale, which yielded 0.86 of sensitivity and 0.79 of specificity. Findings from the present investigation suggest the IDCP Dependency Scale is useful as a screening tool of the core features of the DPD. We address potential clinical applications for the instrument, and discuss limitations from the present study. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.
Perceived trustworthiness shapes neural empathic responses toward others' pain.
Sessa, Paola; Meconi, Federica
2015-12-01
As might be expected, neural empathic responses toward someone in pain are shaped by the affective/social relationship between the observer and the suffering person. Brain activity associated with empathy is sensitive to previous knowledge on the other's social conduct, such that, for instance, an unfair person in pain elicits in the observer reduced activations of empathy-related brain regions compared to a fair person. We conjectured that even in the absence of information on the personality and social behavior of an individual, empathy might be modulated by the 'first impression' based on other's physical facial features, such that the other is perceived as trustworthy or untrustworthy. By means of event-related potentials technique, we monitored in two experiments the neural empathic responses associated with the pain of trustworthy and untrustworthy faces, either computerized and parametrically manipulated (Experiment 1) and real faces (Experiment 2) in a cue-based paradigm. We observed P3 empathic reactions towards individuals looking trustworthy whereas the reactions towards individuals looking untrustworthy were negligible, if not null. An additional experiment (Experiment 3) was conducted in order to substantiate our conclusions by demonstrating that the experimental paradigm we designed did very likely activate an empathic response. Copyright © 2015 Elsevier Ltd. All rights reserved.
75 FR 60433 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... Form, and OMB Number: Personal Information Questionnaire; OMB Control Number 0703-0012. Needs and Uses... Personal Information Questionnaire is used to provide Headquarters, U.S. Marine Corps with a standardized... without change, including any personal identifiers or contact information. FOR FURTHER INFORMATION CONTACT...
Quantitative imaging of disease signatures through radioactive decay signal conversion
Thorek, Daniel LJ; Ogirala, Anuja; Beattie, Bradley J; Grimm, Jan
2013-01-01
In the era of personalized medicine there is an urgent need for in vivo techniques able to sensitively detect and quantify molecular activities. Sensitive imaging of gamma rays is widely used, but radioactive decay is a physical constant and signal is independent of biological interactions. Here we introduce a framework of novel targeted and activatable probes excited by a nuclear decay-derived signal to identify and measure molecular signatures of disease. This was accomplished utilizing Cerenkov luminescence (CL), the light produced by β-emitting radionuclides such as clinical positron emission tomography (PET) tracers. Disease markers were detected using nanoparticles to produce secondary Cerenkov-induced fluorescence. This approach reduces background signal compared to conventional fluorescence imaging. In addition to information from a PET scan, we demonstrate novel medical utility by quantitatively determining prognostically relevant enzymatic activity. This technique can be applied to monitor other markers and facilitates a shift towards activatable nuclear medicine agents. PMID:24013701
A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy
NASA Astrophysics Data System (ADS)
Popic, Victoria; Batzoglou, Serafim
2017-05-01
Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party.
A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy
Popic, Victoria; Batzoglou, Serafim
2017-01-01
Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party. PMID:28508884
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
BERRY, DANIEL; BLAIR, CLANCY; WILLOUGHBY, MICHAEL; GRANGER, DOUGLAS A.; MILLS-KOONCE, W. ROGER
2018-01-01
Theory suggests that early experiences may calibrate the “threshold activity” of the hypothalamus–pituitary–adrenal axis in childhood. Particularly challenging or particularly supportive environments are posited to manifest in heightened physiological sensitivity to context. Using longitudinal data from the Family Life Project (N = 1,292), we tested whether links between maternal sensitivity and hypothalamus–pituitary–adrenal axis activity aligned with these predictions. Specifically, we tested whether the magnitude of the within-person relation between maternal sensitivity and children’s cortisol levels, a proxy for physiological sensitivity to context, was especially pronounced for children who typically experienced particularly low or high levels of maternal sensitivity over time. Our results were consistent with these hypotheses. Between children, lower levels of mean maternal sensitivity (7–24 months) were associated with higher mean cortisol levels across this period (measured as a basal sample collected at each visit). However, the magnitude and direction of the within-person relation was contingent on children’s average levels of maternal sensitivity over time. Increases in maternal sensitivity were associated with contemporaneous cortisol decreases for children with typically low-sensitive mothers, whereas sensitivity increases were associated with cortisol increases for children with typically high-sensitive mothers. No within-child effects were evident at moderate levels of maternal sensitivity. PMID:27065311
Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A.; Katz, Andrea C.; Zvolensky, Michael J.; Shankman, Stewart A.
2016-01-01
Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant-reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant-reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals’ personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding; PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant-reports of personality may each provide valid indices of an individual’s emotional response tendencies, but predict different aspects of those tendencies. PMID:27273802
Analyzing reflective narratives to assess the ethical reasoning of pediatric residents.
Moon, Margaret; Taylor, Holly A; McDonald, Erin L; Hughes, Mark T; Beach, Mary Catherine; Carrese, Joseph A
2013-01-01
A limiting factor in ethics education in medical training has been difficulty in assessing competence in ethics. This study was conducted to test the concept that content analysis of pediatric residents' personal reflections about ethics experiences can identify changes in ethical sensitivity and reasoning over time. Analysis of written narratives focused on two of our ethics curriculum's goals: 1) To raise sensitivity to ethical issues in everyday clinical practice and 2) to enhance critical reflection on personal and professional values as they affect patient care. Content analysis of written reflections was guided by a tool developed to identify and assess the level of ethical reasoning in eight domains determined to be important aspects of ethical competence. Based on the assessment of narratives written at two times (12 to 16 months/apart) during their training, residents showed significant progress in two specific domains: use of professional values, and use of personal values. Residents did not show decline in ethical reasoning in any domain. This study demonstrates that content analysis of personal narratives may provide a useful method for assessment of developing ethical sensitivity and reasoning.
Kortink, Elise D; Weeda, Wouter D; Crowley, Michael J; Gunther Moor, Bregtje; van der Molen, Melle J W
2018-06-01
Monitoring social threat is essential for maintaining healthy social relationships, and recent studies suggest a neural alarm system that governs our response to social rejection. Frontal-midline theta (4-8 Hz) oscillatory power might act as a neural correlate of this system by being sensitive to unexpected social rejection. Here, we examined whether frontal-midline theta is modulated by individual differences in personality constructs sensitive to social disconnection. In addition, we examined the sensitivity of feedback-related brain potentials (i.e., the feedback-related negativity and P3) to social feedback. Sixty-five undergraduate female participants (mean age = 19.69 years) participated in the Social Judgment Paradigm, a fictitious peer-evaluation task in which participants provided expectancies about being liked/disliked by peer strangers. Thereafter, they received feedback signaling social acceptance/rejection. A community structure analysis was employed to delineate personality profiles in our data. Results provided evidence of two subgroups: one group scored high on attachment-related anxiety and fear of negative evaluation, whereas the other group scored high on attachment-related avoidance and low on fear of negative evaluation. In both groups, unexpected rejection feedback yielded a significant increase in theta power. The feedback-related negativity was sensitive to unexpected feedback, regardless of valence, and was largest for unexpected rejection feedback. The feedback-related P3 was significantly enhanced in response to expected social acceptance feedback. Together, these findings confirm the sensitivity of frontal midline theta oscillations to the processing of social threat, and suggest that this alleged neural alarm system behaves similarly in individuals that differ in personality constructs relevant to social evaluation.
Joseph, Jane E.; Zhu, Xun; Lynam, Donald; Kelly, Thomas H.
2015-01-01
Adolescence is a particularly vulnerable period for the onset of substance use disorders and other psychopathology. Individual variability in motivational tendencies and temperament and significant changes in functional brain organization during adolescence are important factors to consider in the development of substance use and dependence. Recent conceptualizations suggest that sensitivity to reward is heightened in adolescence and that this motivation tendency may precipitate subsequent substance abuse. The present study examined the role of personality traits in mesolimbic neurobehavioral response on a monetary incentive delay (MID) task in young adolescents (11–14 years) and emerging adults (18–25 years) using functional magnetic resonance imaging. As a group, adolescents were not more sensitive to gains than losses compared to adults during either anticipatory and feedback phases; instead, compared to adults they showed less sensitivity to incentive magnitude in mesolimbic circuitry during anticipation and feedback stages. However, personality modulated this response such that adolescents high in impulsivity or low in avoidance tendencies showed greater gain sensitivity and adolescents high in avoidance showed greater loss sensitivity during cue anticipation. In adults, mesolimbic response was modulated by the impulsivity construct such that high-impulsive adults showed reduced magnitude sensitivity during both anticipation and feedback compared to low impulsive adults. The present findings suggest that impulsive personality significantly modulates mesolimbic reward response during both adolescence and adulthood but avoidance and approach tendencies also modulate this response in adolescents. Moreover, personality modulated incentive valence in adolescents but incentive magnitude in adults. Collectively, these findings suggest that mesolimbic reward circuitry function is modulated by somewhat different parameters in adolescence than in adulthood. PMID:26690806
Byrnes, Nadia K.; Hayes, John E.
2016-01-01
Based on work a quarter century ago, it is widely accepted personality traits like sensation seeking are related to the enjoyment and intake of spicy foods; however, data supporting this belief is actually quite limited. Recently, we reported strong to moderate correlations between remembered spicy food liking and two personality traits measured with validated questionnaires. Here, participants consumed capsaicin-containing strawberry jelly to generate acute estimates of spicy food liking. Additionally, we used a laboratory-based behavioral measure of risk taking (the momentary Balloon Analogue Risk Task; mBART) to complement a range of validated self-report measures of risk-related personality traits. Present data confirm Sensation Seeking correlates with overall spicy meal liking and liking of the burn of a spicy meal, and extends prior findings by showing novel correlations with the liking of sampled stimuli. Other personality measures, including Sensitivity to Punishment (SP), Sensitivity to Reward (SR), and the Impulsivity and Risk Taking subscales of the DSM5 Personality Inventory (PID5) did not show significant relationships with liking of spicy foods, either sampled or remembered. Our behavioral risk taking measure, the mBART, also failed to show a relationship with remembered or sampled liking. However, significant relationships were observed between reported intake of spicy foods and Sensitivity to Reward, and the Risk Taking subscale of the PID-5 (PID5-RT). Based on the observed patterns among various personality measures, and spicy food liking and intake, we propose that personality measures may exert their influence on intake of spicy food via different mechanisms. We also speculate that Sensation Seeking may reflect motivations for consuming spicy foods that are more intrinsic, while the motivations for eating spicy foods measured by SR and PID5-RT may be more extrinsic. PMID:27137410
Byrnes, Nadia K; Hayes, John E
2016-08-01
Based on work a quarter century ago, it is widely accepted personality traits like sensation seeking are related to the enjoyment and intake of spicy foods; however, data supporting this belief is actually quite limited. Recently, we reported strong to moderate correlations between remembered spicy food liking and two personality traits measured with validated questionnaires. Here, participants consumed capsaicin-containing strawberry jelly to generate acute estimates of spicy food liking. Additionally, we used a laboratory-based behavioral measure of risk taking (the mobile Balloon Analogue Risk Task; mBART) to complement a range of validated self-report measures of risk-related personality traits. Present data confirm Sensation Seeking correlates with overall spicy meal liking and liking of the burn of a spicy meal, and extends prior findings by showing novel correlations with the liking of sampled stimuli. Other personality measures, including Sensitivity to Punishment (SP), Sensitivity to Reward (SR), and the Impulsivity and Risk Taking subscales of the DSM5 Personality Inventory (PID-5) did not show significant relationships with liking of spicy foods, either sampled or remembered. Our behavioral risk taking measure, the mBART, also failed to show a relationship with remembered or sampled liking. However, significant relationships were observed between reported intake of spicy foods and Sensitivity to Reward, and the Risk Taking subscale of the PID-5 (PID5-RT). Based on the observed patterns among various personality measures, and spicy food liking and intake, we propose that personality measures may exert their influence on intake of spicy food via different mechanisms. We also speculate that Sensation Seeking may reflect motivations for consuming spicy foods that are more intrinsic, while the motivations for eating spicy foods measured by SR and PID5-RT may be more extrinsic. Copyright © 2016 Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Information returns relating to persons... PROCEDURE AND ADMINISTRATION Information and Returns Returns and Records § 301.6050M-1 Information returns... the requirements of returns of information relating to persons receiving contracts from certain...
36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive Branch... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All...
36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?
Code of Federal Regulations, 2011 CFR
2011-07-01
... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive Branch... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All...
Code of Federal Regulations, 2014 CFR
2014-01-01
... cropland that is highly erodible or environmentally sensitive. (f) Prior converted wetland—means wetland... from being planted to the commodity during the crop year. (b) Applicant—means a person who submits to... combination of counties in which the landowner's farm or ranch is located. (p) Participant—means a person(s...
Code of Federal Regulations, 2012 CFR
2012-01-01
... cropland that is highly erodible or environmentally sensitive. (f) Prior converted wetland means wetland... from being planted to the commodity during the crop year. (b) Applicant means a person who submits to... combination of counties in which the landowner's farm or ranch is located. (p) Participant means a person(s...
Code of Federal Regulations, 2013 CFR
2013-01-01
... cropland that is highly erodible or environmentally sensitive. (f) Prior converted wetland—means wetland... from being planted to the commodity during the crop year. (b) Applicant—means a person who submits to... combination of counties in which the landowner's farm or ranch is located. (p) Participant—means a person(s...
10 CFR 440.17 - Policy Advisory Council.
Code of Federal Regulations, 2010 CFR
2010-01-01
...: (1) Has special qualifications and sensitivity with respect to solving the problems of low-income persons, including the weatherization and energy conservation problems of these persons; (2) Is broadly...
Are Informant Reports of Personality More Internally Consistent Than Self Reports of Personality?
Balsis, Steve; Cooper, Luke D; Oltmanns, Thomas F
2015-08-01
The present study examined whether informant-reported personality was more or less internally consistent than self-reported personality in an epidemiological community sample (n = 1,449). Results indicated that across the 5 NEO (Neuroticism-Extraversion-Openness) personality factors and the 10 personality disorder trait dimensions, informant reports tended to be more internally consistent than self reports, as indicated by equal or higher Cronbach's alpha scores and higher average interitem correlations. In addition, the informant reports collectively outperformed the self reports for predicting responses on a global measure of health, indicating that the informant reports are not only more reliable than self reports, but they can also be useful in predicting an external criterion. Collectively these findings indicate that informant reports tend to have greater internal consistency than self reports. © The Author(s) 2014.
22 CFR 130.15 - Confidential business information.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required... person considers to be confidential business information. No person, including any applicant or supplier...
ERIC Educational Resources Information Center
Sperry, Len
2010-01-01
Cultural sensitivity and cultural competence in the selection of culturally sensitive treatments is a requisite for effective counseling practice in working with diverse clients and their families, particularly when clients present with health issues or medical problems. Described here is a strategy for selecting culturally sensitive treatments…
Christman, Stephen
2014-01-01
Prior research indicates that consistent-handedness is associated with decreased access to right hemisphere processing and consequent decreased cognitive flexibility. Handedness differences on three dimensions of personality related to cognitive flexibility were investigated. Experiment 1 found that consistent-handedness was associated with decreased sensation seeking. Experiment 2 found that consistent-handedness was associated with increased Right Wing Authoritarianism. Experiment 3 found that consistent-handedness was associated with increased sensitivity to disgust. Prior research has shown associations between decreased sensation seeking, increased authoritarianism, and increased disgust sensitivity, and consistent-handedness appears to underlie all of these associations. Personality researchers are encouraged to include handedness as a factor in analyses, as failure to do so can lead to systematic mis-estimation of sex differences due to the over-representation of females among consistent-handers.
Studies of the antibody nature of the rheumatoid factor
Aho, K.; Harboe, M.; Leikola, J.
1964-01-01
The reaction of the rheumatoid factor (RF) with 7S γ-globulin antibodies of nine persons immunized with sheep erythrocytes was studied. All of a panel of rheumatoid sera with high Waaler-Rose titres agglutinated sheep cells sensitized with the human anti-sheep cell antibodies and O Rh positive cells sensitized with the `diagnostic' anti-CD serum Ripley. The RF measurable with these systems could be absorbed to diphtheria toxoid—human antitoxin precipitate, whereas the absorption with egg albumin—rabbit anti-egg albumin precipitate did not result in any appreciable titre reduction. However, the eluate from the rabbit precipitate was highly active in these systems, whereas Rh positive cells sensitized with anti-Rh sera suitable for Gm(a) typing were not regularly agglutinated. A markedly greater concentration of native than of heat-aggregated γ-globulin was needed for inhibition of the agglutination by the RF of cells heavily sensitized with the human anti-sheep cell antibodies. No appreciable difference in this respect was seen when using lightly sensitized cells. Only the heavily sensitized cells fixed complement. The `natural' 7S γ-globulin antibodies against sheep cells were neither suited for demonstration of RF nor did they fix complement. Sheep cells coated with 7S γ-globulin antibodies of a Gm(a+) person were agglutinated by a non-rheumatoid anti-Gm(a) serum, and this system was well suited for Gm(a) typing, whereas cells coated with antibodies of a Gm(a-) person were not agglutinated. Rheumatoid anti-Gm(a) sera agglutinated cells sensitized with antibodies of both Gm(a+) and Gm(a-) persons. Using cells coated with Gm(a+) antibodies, some distinction between Gm(a+) and Gm(a-) sera could be obtained under carefully controlled conditions. The use of a Gm(a-) coat resulted in a slight difference in the inhibiting capacity, which had no relation to the serum's Gm(a) type. The results suggest that the reaction of the RF with sheep cells heavily sensitized with human anti-sheep cell antibodies is essentially an interaction of the RF with immune aggregated γ-globulin, whereas when using lightly sensitized cells the individual γ-globulin molecules play a prominent role. PMID:14193154
Affording to exchange: social capital and online information sharing.
Maksl, Adam; Young, Rachel
2013-08-01
The potential harm and benefit associated with sharing personal information online is a topic of debate and discussion. Using survey methods (n=872), we explore whether attainment of social capital online relates to greater comfort with sharing personal information. We found that perceptions of bridging and bonding social capital earned from using Facebook are significant predictors of overall comfort levels with sharing personal information. This research raises timely questions about how the perceived benefits of social networking sites influence how personal information is shared online.
openPDS: protecting the privacy of metadata through SafeAnswers.
de Montjoye, Yves-Alexandre; Shmueli, Erez; Wang, Samuel S; Pentland, Alex Sandy
2014-01-01
The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1) we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2) we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research.
openPDS: Protecting the Privacy of Metadata through SafeAnswers
de Montjoye, Yves-Alexandre; Shmueli, Erez; Wang, Samuel S.; Pentland, Alex Sandy
2014-01-01
The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1) we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2) we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research. PMID:25007320
Solid state neutron dosimeter for space applications
NASA Technical Reports Server (NTRS)
Entine, Gerald; Nagargar, Vivek; Sharif, Daud
1990-01-01
Personnel engaged in space flight are exposed to significant flux of high energy neutrons arising from both primary and secondary sources of ionizing radiation. Presently, there exist no compact neutron sensor capable of being integrated in a flight instrument to provide real time measurement of this radiation flux. A proposal was made to construct such an instrument using special PIN silicon diode which has the property of being insensitive to the other forms of ionizing radiation. Studies were performed to determine the design and construction of a better reading system to allow the PIN diode to be read with high precision. The physics of the device was studied, especially with respect to those factors which affect the sensitivity and reproducibility of the neutron response. This information was then used to develop methods to achieve high sensitivity at low neutron doses. The feasibility was shown of enhancing the PIN diode sensitivity to make possible the measurement of the low doses of neutrons encountered in space flights. The new PIN diode will make possible the development of a very compact, accurate, personal neutron dosimeter.
Contestabile, Andrea; Moroni, Monica; Hallinan, Grace I.; Palazzolo, Gemma; Chad, John; Deinhardt, Katrin; Carugo, Dario
2018-01-01
ABSTRACT Development of remote stimulation techniques for neuronal tissues represents a challenging goal. Among the potential methods, mechanical stimuli are the most promising vectors to convey information non-invasively into intact brain tissue. In this context, selective mechano-sensitization of neuronal circuits would pave the way to develop a new cell-type-specific stimulation approach. We report here, for the first time, the development and characterization of mechano-sensitized neuronal networks through the heterologous expression of an engineered bacterial large-conductance mechanosensitive ion channel (MscL). The neuronal functional expression of the MscL was validated through patch-clamp recordings upon application of calibrated suction pressures. Moreover, we verified the effective development of in-vitro neuronal networks expressing the engineered MscL in terms of cell survival, number of synaptic puncta and spontaneous network activity. The pure mechanosensitivity of the engineered MscL, with its wide genetic modification library, may represent a versatile tool to further develop a mechano-genetic approach. This article has an associated First Person interview with the first author of the paper. PMID:29361543
Recommending personally interested contents by text mining, filtering, and interfaces
Xu, Songhua
2015-10-27
A personalized content recommendation system includes a client interface device configured to monitor a user's information data stream. A collaborative filter remote from the client interface device generates automated predictions about the interests of the user. A database server stores personal behavioral profiles and user's preferences based on a plurality of monitored past behaviors and an output of the collaborative user personal interest inference engine. A programmed personal content recommendation server filters items in an incoming information stream with the personal behavioral profile and identifies only those items of the incoming information stream that substantially matches the personal behavioral profile. The identified personally relevant content is then recommended to the user following some priority that may consider the similarity between the personal interest matches, the context of the user information consumption behaviors that may be shown by the user's content consumption mode.
Who is More Affected by Ozone Pollution? A Systematic Review and Meta-Analysis
Bell, Michelle L.; Zanobetti, Antonella; Dominici, Francesca
2014-01-01
Ozone is associated with adverse health; however, less is known about vulnerable/sensitive populations, which we refer to as sensitive populations. We systematically reviewed epidemiologic evidence (1988–2013) regarding sensitivity to mortality or hospital admission from short-term ozone exposure. We performed meta-analysis for overall associations by age and sex; assessed publication bias; and qualitatively assessed sensitivity to socioeconomic indicators, race/ethnicity, and air conditioning. The search identified 2,091 unique papers, with 167 meeting inclusion criteria (73 on mortality and 96 on hospitalizations and emergency department visits, including 2 examining both mortality and hospitalizations). The strongest evidence for ozone sensitivity was for age. Per 10-parts per billion increase in daily 8-hour ozone concentration, mortality risk for younger persons, at 0.60% (95% confidence interval (CI): 0.40, 0.80), was statistically lower than that for older persons, at 1.27% (95% CI: 0.76, 1.78). Findings adjusted for publication bias were similar. Limited/suggestive evidence was found for higher associations among women; mortality risks were 0.39% (95% CI: −0.22, 1.00) higher than those for men. We identified strong evidence for higher associations with unemployment or lower occupational status and weak evidence of sensitivity for racial/ethnic minorities and persons with low education, in poverty, or without central air conditioning. Findings show that some populations, especially the elderly, are particularly sensitive to short-term ozone exposure. PMID:24872350
EPA Plan for Reducing Personally Identifiable Information, January 2013
The EPA Privacy Policy, issued in 2007, establishes the framework and accountability for reducing Agency personally identifiable information (PII). Learn about the Agency's plan to reduce the collection of Personally Identifiable Information (PII).
Madhavan, Subha; Sanders, Amy; Chou, Wen-Ying Sylvia; Shusterdg, Alex; Boone, Keith; Dente, Mark; Shad, Aziza T.; Hesse, Bradford W.
2013-01-01
Pediatric palliative care is an organized method for delivering effective, compassionate and timely care to children with cancer and their families, but it currently faces many challenges despite advances in technology and health care delivery. A key challenge involves unnecessary suffering from debilitating symptoms, such as pain, resulting from insufficient personalized treatment. Additionally, breakdowns in communication and a paucity of usable patient-centric information impede effective care. Recent advances in informatics for consumer health through eHealth initiatives have begun to be adopted in care coordination and communication, but overall remain under-utilized. Tremendous potentials exist in effective use of health information technology (HIT) to improve areas requiring personalized care such as pain management in pediatric oncology patients. This article aims first to identify communication challenges and needs in pediatric palliative cancer care from the perspectives of the entire group of individuals around the pediatric oncology patient, and then to describe how adoption and adaptation of these technologies can improve patient-provider communication, behavioral support, pain assessment, and education through integration into existing work flows. The goal of this research is to promote the value of using HIT standards-based technology solutions and stimulate development of interoperable, standardized technologies and delivery of context-sensitive information through user-friendly portals to facilitate communication in an existing pediatric clinical care setting. PMID:21521596
Strand, Julia F; Brown, Violet A; Merchant, Madeleine B; Brown, Hunter E; Smith, Julia
2018-06-19
Listening effort (LE) describes the attentional or cognitive requirements for successful listening. Despite substantial theoretical and clinical interest in LE, inconsistent operationalization makes it difficult to make generalizations across studies. The aims of this large-scale validation study were to evaluate the convergent validity and sensitivity of commonly used measures of LE and assess how scores on those tasks relate to cognitive and personality variables. Young adults with normal hearing (N = 111) completed 7 tasks designed to measure LE, 5 tests of cognitive ability, and 2 personality measures. Scores on some behavioral LE tasks were moderately intercorrelated but were generally not correlated with subjective and physiological measures of LE, suggesting that these tasks may not be tapping into the same underlying construct. LE measures differed in their sensitivity to changes in signal-to-noise ratio and the extent to which they correlated with cognitive and personality variables. Given that LE measures do not show consistent, strong intercorrelations and differ in their relationships with cognitive and personality predictors, these findings suggest caution in generalizing across studies that use different measures of LE. The results also indicate that people with greater cognitive ability appear to use their resources more efficiently, thereby diminishing the detrimental effects associated with increased background noise during language processing.
Anterior temporal face patches: a meta-analysis and empirical study
Von Der Heide, Rebecca J.; Skipper, Laura M.; Olson, Ingrid R.
2013-01-01
Evidence suggests the anterior temporal lobe (ATL) plays an important role in person identification and memory. In humans, neuroimaging studies of person memory report consistent activations in the ATL to famous and personally familiar faces and studies of patients report resection or damage of the ATL causes an associative prosopagnosia in which face perception is intact but face memory is compromised. In addition, high-resolution fMRI studies of non-human primates and electrophysiological studies of humans also suggest regions of the ventral ATL are sensitive to novel faces. The current study extends previous findings by investigating whether similar subregions in the dorsal, ventral, lateral, or polar aspects of the ATL are sensitive to personally familiar, famous, and novel faces. We present the results of two studies of person memory: a meta-analysis of existing fMRI studies and an empirical fMRI study using optimized imaging parameters. Both studies showed left-lateralized ATL activations to familiar individuals while novel faces activated the right ATL. Activations to famous faces were quite ventral, similar to what has been reported in previous high-resolution fMRI studies of non-human primates. These findings suggest that face memory-sensitive patches in the human ATL are in the ventral/polar ATL. PMID:23378834
Chen, Jie; Mullins, C Daniel; Novak, Priscilla; Thomas, Stephen B
2016-02-01
Designing culturally sensitive personalized interventions is essential to sustain patients' involvement in their treatment and encourage patients to take an active role in their own health and health care. We consider patient activation and empowerment as a cyclical process defined through patient accumulation of knowledge, confidence, and self-determination for their own health and health care. We propose a patient-centered, multilevel activation and empowerment framework (individual-, health care professional-, community-, and health care delivery system-level) to inform the development of culturally informed personalized patient activation and empowerment (P-PAE) interventions to improve population health and reduce racial and ethnic disparities. We discuss relevant Affordable Care Act payment and delivery policy reforms and how they affect patient activation and empowerment. Such policies include Accountable Care Organizations and value-based purchasing, patient-centered medical homes, and the community health benefit. Challenges and possible solutions to implementing the P-PAE are discussed. Comprehensive and longitudinal data sets with consistent P-PAE measures are needed to conduct comparative effectiveness analyses to evaluate the optimal P-PAE model. We believe the P-PAE model is timely and sustainable and will be critical to engaging patients in their treatment, developing patients' abilities to manage their health, helping patients express concerns and preferences regarding treatment, empowering patients to ask questions about treatment options, and building up strategic patient-provider partnerships through shared decision making. © 2015 Society for Public Health Education.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Information returns required of U.S. persons... ADMINISTRATION Information and Returns Returns and Records § 301.6038-1 Information returns required of U.S. persons with respect to certain foreign corporations. For provisions relating to information returns...
Kudo, Yuka; Nakagawa, Atsuo; Tamura, Noriko; Kato, Noriko; Williams, Aya; Aida, Nobuo; Mimura, Masaru
2016-07-01
Parker et al. (2006) proposed a new approach to classify specific sub-types of non-melancholic depression caused by various stress factors and premorbid personality styles: the Temperament and Personality Questionnaire (T&P). The current study aim was to develop the Japanese version of the T&P and evaluate its reliability and validity. We studied 114 patients with non-melancholic depression. Reliability was assessed using the test-retest method. Convergent validity of the T&P was compared with the clinician ratings of each patient for the eight personality traits. We also assessed the impact of depressive state on the T&P. The test-retest intraclass correlation coefficients among eight constructs of the T&P ranged from 0.77 to 0.89, indicating good-to-excellent reliability. Anxious Worrying (rho=0.29), Perfectionism (rho=0.17), Personal Reserve (rho=0.18), Irritability (rho=0.38), and Social Avoidance (rho=0.32) showed adequate levels of convergent validity; Rejection Sensitivity (rho=0.16), Self-criticism (rho=-0.02), and Self-focus (rho=0.07) showed relatively weak convergent validity. Perfectionism (rho=-0.06), Social Avoidance (rho=0.17), Anxious Worrying (rho=0.40), Personal Reserve (rho=0.30), Irritability (rho=0.28), Rejection Sensitivity (rho=0.35), Self-criticism (rho=0.49), and Self-focus (rho=0.24) showed minimal sensitivity to mood state effects. Only one site was used. While a Likert scale was used, the clinician-rated personality trait measure had not been validated. The J-T&P is a reliable and valid measure for assessing temperament and personality in Japanese patients with non-melancholic depression. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.
Simms, Leonard J; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F
2010-05-01
Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets' self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits.
Simms, Leonard J.; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F.
2011-01-01
Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets’ self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits. PMID:21541262
... My Child Outgrow a Milk Allergy? Allergy to cow’s milk is the most common food allergy in ... Label card . Allergic Reactions to Milk Sensitivity to cow’s milk varies from person to person, and reactions ...
Liu, Yih-Lan
2013-01-01
The author investigated whether interpersonal cognition mediated the relationships between defense, social sensitivity, and ego development. Participants (N = 616; M age = 15.66 years, SD = .52 year; 276 boys) from northwestern Taiwan completed a battery of questionnaires. Structural equation modeling and mediation analyses supported the hypothesis that interpersonal cognition would mediate the path between defense and ego development, and the path between social sensitivity and ego development. Defense and social sensitivity were found to have direct effects on ego development. The study provides evidence of the mediating effect of interpersonal cognition on the association between personality and ego development.
32 CFR 1800.32 - Procedures for information concerning other persons.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... Administrative Matters § 1800.32 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the Freedom of...
32 CFR 1900.32 - Procedures for information concerning other persons.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... Administrative Matters § 1900.32 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the Freedom of...
Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A; Katz, Andrea C; Zvolensky, Michael J; Shankman, Stewart A
2016-09-01
Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals' personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant-reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding, PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant reports of personality may each provide valid indices of an individual's emotional response tendencies, but predict different aspects of those tendencies. © 2016 Society for Psychophysiological Research.
Individual differences in drivers' cognitive processing of road safety messages.
Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M
2013-01-01
Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message acceptance measures. As predicted, the degree of initial processing of the content of the social gain-framed message mediated the relationship between the reward sensitive trait and message effectiveness. Initial processing of the physical loss-framed message partially mediated the relationship between the punishment sensitive trait and both message effectiveness and behavioural intention ratings. These results show that reward sensitivity and punishment sensitivity traits influence cognitive processing of gain-framed and loss-framed message content, respectively, and subsequently, message effectiveness and behavioural intention ratings. Specifically, a range of road safety messages (i.e., gain-frame and loss-frame messages) could be designed which align with the processing biases associated with personality and which would target those individuals who are sensitive to rewards and those who are sensitive to punishments. Copyright © 2012 Elsevier Ltd. All rights reserved.
Rollans, Mellanie; Schmied, Virginia; Kemp, Lynn; Meade, Tanya
2013-04-09
There is increasing recognition of the need to identify risk factors for poor mental health in pregnancy and following birth. In New South Wales, Australia, health policy mandates psychosocial assessment and depression screening for all women at the antenatal booking visit and at six to eight weeks after birth. Few studies have explored in-depth women's experience of assessment and how disclosures of sensitive information are managed by midwives and nurses. This paper describes women's experience of psychosocial assessment and depression screening examining the meaning they attribute to assessment and how this influences their response. This qualitative ethnographic study included 34 women who were observed antenatally in the clinic with 18 midwives and 20 of the same women who were observed during their interaction with 13 child and family health nurses after birth in the home or the clinic environment. An observational tool, 4D&4R, together with field notes was used to record observations and were analysed descriptively using frequencies. Women also participated in face to face interviews. Field note and interview data was analysed thematically and similarities and differences across different time points were identified. Most participants reported that it was acceptable to them to be asked the psychosocial questions however they felt unprepared for the sensitive nature of the questions asked. Women with a history of trauma or loss were distressed by retelling their experiences. Five key themes emerged. Three themes; 'Unexpected: a bit out of the blue', 'Intrusive: very personal questions' and 'Uncomfortable: digging over that old ground', describe the impact that assessment had on women. Women also emphasised that the approach taken by the midwife or nurse during assessment influenced their experience and in some cases what they reported. This is reflected in the themes titled: 'sensitivity and care' and 'being watched'. The findings emphasise the need for health services to better prepare women for this assessment prior to and after birth. It is crucial that health professionals are educationally prepared for this work and receive ongoing training and support in order to always deliver care that is empathetic and sensitive to women who are disclosing personal information.
2013-01-01
Background There is increasing recognition of the need to identify risk factors for poor mental health in pregnancy and following birth. In New South Wales, Australia, health policy mandates psychosocial assessment and depression screening for all women at the antenatal booking visit and at six to eight weeks after birth. Few studies have explored in-depth women’s experience of assessment and how disclosures of sensitive information are managed by midwives and nurses. This paper describes women’s experience of psychosocial assessment and depression screening examining the meaning they attribute to assessment and how this influences their response. Methods This qualitative ethnographic study included 34 women who were observed antenatally in the clinic with 18 midwives and 20 of the same women who were observed during their interaction with 13 child and family health nurses after birth in the home or the clinic environment. An observational tool, 4D&4R, together with field notes was used to record observations and were analysed descriptively using frequencies. Women also participated in face to face interviews. Field note and interview data was analysed thematically and similarities and differences across different time points were identified. Results Most participants reported that it was acceptable to them to be asked the psychosocial questions however they felt unprepared for the sensitive nature of the questions asked. Women with a history of trauma or loss were distressed by retelling their experiences. Five key themes emerged. Three themes; ’Unexpected: a bit out of the blue’, ‘Intrusive: very personal questions’ and ‘Uncomfortable: digging over that old ground’, describe the impact that assessment had on women. Women also emphasised that the approach taken by the midwife or nurse during assessment influenced their experience and in some cases what they reported. This is reflected in the themes titled: Approach: ’sensitivity and care’ and ’being watched’. Conclusions The findings emphasise the need for health services to better prepare women for this assessment prior to and after birth. It is crucial that health professionals are educationally prepared for this work and receive ongoing training and support in order to always deliver care that is empathetic and sensitive to women who are disclosing personal information. PMID:23570282
Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N
2014-09-01
Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. © 2012 John Wiley & Sons Ltd.
Investigating the Role of Interpersonal Sensitivity, Anger, and Perfectionism in Social Anxiety.
Mohammadian, Youkhabeh; Mahaki, Behzad; Dehghani, Mahmoud; Vahid, Mohammadkazem Atef; Lavasani, Fahimeh Fathali
2018-01-01
The investigation of personality characteristics and emotional experiences of the people suffering from anxiety disorders is one of the most important issues which are considered by researchers and clinicians. Perfectionism, sensitivity to interpersonal rejection, and anger are personality traits related to social anxiety. In social anxiety disorder, it has also been focused on anger as a personality characteristic and as an emotional condition. The main purpose of this work is to investigate the role of these variables in predicting social anxiety among a nonclinical group of Iranian students. In this cross-sectional study, 131 students completed the self-report version of Liebowitz Social Anxiety Scale Self-Report version (LSAS-SR), Frost Multidimensional Perfectionism Scale (FMPS), Interpersonal Sensitivity Measure (IPSM), and State and Trait Anger Expression Inventory. Multiple linear regressions were conducted to examine the concurrent associations between perfectionism, interpersonal sensitivity and quality of emotional experience, and expression of anger with severity of self-report social anxiety. Greater levels of FMPS total were significantly associated with a greater level of LSAS total, fear, and avoidance of social and functional situations ( P = 0.022, P = 0.024, and P = 0.006). Moreover, a significant positive correlation between IPSM total ( P = 0.015) with fear and also between anger expression index ( P = 0.009) with avoidance subscale were found. In accordance to the previous researches, we found that perfectionism, interpersonal sensitivity, anger experience, and anger expression skills are related to social anxiety. How these personality traits are related to fear and avoidance of social situations and their concurrent effects on predicting social anxiety were discussed.
Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?
ERIC Educational Resources Information Center
Worcester, Lea
2003-01-01
Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…
48 CFR 25.703-3 - Prohibition on contracting with entities that export sensitive technology to Iran.
Code of Federal Regulations, 2013 CFR
2013-10-01
... with entities that export sensitive technology to Iran. 25.703-3 Section 25.703-3 Federal Acquisition... Sources 25.703-3 Prohibition on contracting with entities that export sensitive technology to Iran. (a... or services with a person that exports certain sensitive technology to Iran, as determined by the...
48 CFR 25.703-3 - Prohibition on contracting with entities that export sensitive technology to Iran.
Code of Federal Regulations, 2014 CFR
2014-10-01
... with entities that export sensitive technology to Iran. 25.703-3 Section 25.703-3 Federal Acquisition... Sources 25.703-3 Prohibition on contracting with entities that export sensitive technology to Iran. (a... or services with a person that exports certain sensitive technology to Iran, as determined by the...
ERIC Educational Resources Information Center
Malmberg, Monique; Kleinjan, Marloes; Vermulst, Ad A.; Overbeek, Geertjan; Monshouwer, Karin; Lammers, Jeroen; Engels, Rutger C. M. E.
2012-01-01
Various studies found personality to be related to substance use, but little attention is paid to the role of personality risk dimensions with regard to an early onset of alcohol, tobacco, and marijuana use. Therefore, the current study used a variable-centered approach to examine whether anxiety sensitivity, hopelessness, sensation seeking, and…
Differential discounting and present impact of past information.
Brandimarte, Laura; Vosgerau, Joachim; Acquisti, Alessandro
2018-01-01
How does information about a person's past, accessed now, affect individuals' impressions of that person? In 2 survey experiments and 2 experiments with actual incentives, we compare whether, when evaluating a person, information about that person's past greedy or immoral behaviors is discounted similarly to information about her past generous or moral behaviors. We find that, no matter how far in the past a person behaved greedily or immorally, information about her negative behaviors is hardly discounted at all. In contrast, information about her past positive behaviors is discounted heavily: recent behaviors are much more influential than behaviors that occurred a long time ago. The lesser discounting of information about immoral and greedy behaviors is not caused by these behaviors being more influential, memorable, extreme, or attention-grabbing; rather, they are perceived as more diagnostic of a person's character than past moral or generous behaviors. The phenomenon of differential discounting of past information has particular relevance in the digital age, where information about people's past is easily retrieved. Our findings have significant implications for theories of impression formation and social information processing. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
..., email address, or other personal identifying information in your comment, you should be aware that your entire comment--including your personal identifying information--may be made publicly available at any time. While you can ask us in your comment to withhold your personal identifying information from...
45 CFR 155.260 - Privacy and security of personally identifiable information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... AFFORDABLE CARE ACT General Functions of an Exchange § 155.260 Privacy and security of personally... information to the extent such information is necessary to carry out the functions described in § 155.200 of...: (1) Gain access to personally identifiable information submitted to an Exchange; or (2) Collect, use...
Asymmetric cultural effects on perceptual expertise underlie an own-race bias for voices
Perrachione, Tyler K.; Chiao, Joan Y.; Wong, Patrick C.M.
2009-01-01
The own-race bias in memory for faces has been a rich source of empirical work on the mechanisms of person perception. This effect is thought to arise because the face-perception system differentially encodes the relevant structural dimensions of features and their configuration based on experiences with different groups of faces. However, the effects of sociocultural experiences on person perception abilities in other identity-conveying modalities like audition have not been explored. Investigating an own-race bias in the auditory domain provides a unique opportunity for studying whether person identification is a modality-independent construct and how it is sensitive to asymmetric cultural experiences. Here we show that an own-race bias in talker identification arises from asymmetric experience with different spoken dialects. When listeners categorized voices by race (White or Black), a subset of the Black voices were categorized as sounding White, while the opposite case was unattested. Acoustic analyses indicated listeners' perceptions about race were consistent with differences in specific phonetic and phonological features. In a subsequent person-identification experiment, the Black voices initially categorized as sounding White elicited an own-race bias from White listeners, but not from Black listeners. These effects are inconsistent with person-perception models that strictly analogize faces and voices based on recognition from only structural features. Our results demonstrate that asymmetric exposure to spoken dialect, independent from talkers' physical characteristics, affects auditory perceptual expertise for talker identification. Person perception thus additionally relies on socioculturally-acquired dynamic information, which may be represented by different mechanisms in different sensory modalities. PMID:19782970
Beard, Renée L; Fetterman, David J; Wu, Bei; Bryant, Lucinda
2009-06-01
Most individuals with Alzheimer's are cared for in their homes by unpaid family members. Research on caregiving focuses disproportionally on costs of care, service utilization, and negative psychosocial outcomes. Few narrative accounts of Alzheimer's exist; those that do suffer similar pejorative framings and narrow foci. No studies that we are aware of examine the health beliefs of diagnosed individuals and support persons, or their attitudes about brain health. This research reports perceptions of "aging well" held by those most intimately acquainted with Alzheimer's. Diagnosed individuals and their support persons (N = 85) were enrolled into 14 focus groups. Grounded theory methods were used to collect, code, and analyze textual interview data into overarching themes. Respondents found physical and mental health, social activity, independence, and happiness integral to aging well. An acceptance of various limitations was also deemed crucial. Support persons placed more emphasis on lifestyle factors and memory loss as potential obstacles. Diagnosed respondents defined memory loss in less medicalized terms, whereas support persons labeled it Alzheimer's and negatively characterized those affected. Both groups warned against discussing "prevention" of dementia: Diagnosed individuals noted the implication of "aging poorly" and support persons cautioned against blaming diagnosed individuals. These findings can be used to encourage positive health beliefs and behaviors tailored to the needs of diagnosed seniors and their families, to help practitioners and researchers identify and become sensitive to differences between and among older adults, and to further advance the utility of narrative accounts for informing health interventions and education efforts.
ERIC Educational Resources Information Center
Torres, Carlos A.
2011-01-01
This study investigated college students' attitudes toward and intentions to use personal health portals (PHPs) for managing their personal health information using a survey method. The study also aimed to examine the roles electronic Personal Health Information Management (PHIM) anxiety and apathy play in influencing students' attitudes toward…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-05
... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) Program Cooperative Agreements AGENCY: Forest Service, USDA... information collection, Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) program...
Code of Federal Regulations, 2014 CFR
2014-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BLUEBERRY PROMOTION, RESEARCH, AND INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.14 Person. Person...
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BLUEBERRY PROMOTION, RESEARCH, AND INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.14 Person. Person...
Code of Federal Regulations, 2012 CFR
2012-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BLUEBERRY PROMOTION, RESEARCH, AND INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.14 Person. Person...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BLUEBERRY PROMOTION, RESEARCH, AND INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.14 Person. Person...
Code of Federal Regulations, 2013 CFR
2013-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE BLUEBERRY PROMOTION, RESEARCH, AND INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.14 Person. Person...
An Inter-Personal Information Sharing Model Based on Personalized Recommendations
NASA Astrophysics Data System (ADS)
Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji
In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated inter-personal recommendation based on the user profiles and evaluated the performance of the recommendation method by comparing the recommended documents to the result of the content-based collaborative filtering.
Teachers' Beliefs about Diversity: An Analysis from a Personal and Professional Perspective
ERIC Educational Resources Information Center
Chiner, Esther; Cardona-Moltó, María C.; Gómez Puerta, José Marcos
2015-01-01
The purpose of this study was to examine the beliefs that teachers have about diversity and their level of sensitivity towards some topics related to it. Moreover, beliefs were compared according to teachers' personal and professional views and teaching experience. The "Personal and Professional Beliefs about Diversity Scales" (Pohan and…
ERIC Educational Resources Information Center
Conrod, Patricia J.; Stewart, Sherry H.; Comeau, Nancy; Maclean, A. Michael
2006-01-01
Sensation seeking, anxiety sensitivity, and hopelessness are personality risk factors for alcohol use disorders, each associated with specific risky drinking motives in adolescents. We developed a set of interventions and manuals that were designed to intervene at the level of personality risk and associated maladaptive coping strategies,…
Laber, Eric B; Zhao, Ying-Qi; Regh, Todd; Davidian, Marie; Tsiatis, Anastasios; Stanford, Joseph B; Zeng, Donglin; Song, Rui; Kosorok, Michael R
2016-04-15
A personalized treatment strategy formalizes evidence-based treatment selection by mapping patient information to a recommended treatment. Personalized treatment strategies can produce better patient outcomes while reducing cost and treatment burden. Thus, among clinical and intervention scientists, there is a growing interest in conducting randomized clinical trials when one of the primary aims is estimation of a personalized treatment strategy. However, at present, there are no appropriate sample size formulae to assist in the design of such a trial. Furthermore, because the sampling distribution of the estimated outcome under an estimated optimal treatment strategy can be highly sensitive to small perturbations in the underlying generative model, sample size calculations based on standard (uncorrected) asymptotic approximations or computer simulations may not be reliable. We offer a simple and robust method for powering a single stage, two-armed randomized clinical trial when the primary aim is estimating the optimal single stage personalized treatment strategy. The proposed method is based on inverting a plugin projection confidence interval and is thereby regular and robust to small perturbations of the underlying generative model. The proposed method requires elicitation of two clinically meaningful parameters from clinical scientists and uses data from a small pilot study to estimate nuisance parameters, which are not easily elicited. The method performs well in simulated experiments and is illustrated using data from a pilot study of time to conception and fertility awareness. Copyright © 2015 John Wiley & Sons, Ltd.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE PEANUT PROMOTION, RESEARCH, AND INFORMATION ORDER Peanut Promotion, Research, and Information Order Definitions § 1216.20 Person. Person means...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE PEANUT PROMOTION, RESEARCH, AND INFORMATION ORDER Peanut Promotion, Research, and Information Order Definitions § 1216.20 Person. Person means...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE LAMB PROMOTION, RESEARCH, AND INFORMATION ORDER Lamb Promotion, Research, and Information Order Definitions § 1280.115 Person. Person means...
Mobile Sensing and Support for People With Depression: A Pilot Trial in the Wild.
Wahle, Fabian; Kowatsch, Tobias; Fleisch, Elgar; Rufer, Michael; Weidt, Steffi
2016-09-21
Depression is a burdensome, recurring mental health disorder with high prevalence. Even in developed countries, patients have to wait for several months to receive treatment. In many parts of the world there is only one mental health professional for over 200 people. Smartphones are ubiquitous and have a large complement of sensors that can potentially be useful in monitoring behavioral patterns that might be indicative of depressive symptoms and providing context-sensitive intervention support. The objective of this study is 2-fold, first to explore the detection of daily-life behavior based on sensor information to identify subjects with a clinically meaningful depression level, second to explore the potential of context sensitive intervention delivery to provide in-situ support for people with depressive symptoms. A total of 126 adults (age 20-57) were recruited to use the smartphone app Mobile Sensing and Support (MOSS), collecting context-sensitive sensor information and providing just-in-time interventions derived from cognitive behavior therapy. Real-time learning-systems were deployed to adapt to each subject's preferences to optimize recommendations with respect to time, location, and personal preference. Biweekly, participants were asked to complete a self-reported depression survey (PHQ-9) to track symptom progression. Wilcoxon tests were conducted to compare scores before and after intervention. Correlation analysis was used to test the relationship between adherence and change in PHQ-9. One hundred twenty features were constructed based on smartphone usage and sensors including accelerometer, Wifi, and global positioning systems (GPS). Machine-learning models used these features to infer behavior and context for PHQ-9 level prediction and tailored intervention delivery. A total of 36 subjects used MOSS for ≥2 weeks. For subjects with clinical depression (PHQ-9≥11) at baseline and adherence ≥8 weeks (n=12), a significant drop in PHQ-9 was observed (P=.01). This group showed a negative trend between adherence and change in PHQ-9 scores (rho=-.498, P=.099). Binary classification performance for biweekly PHQ-9 samples (n=143), with a cutoff of PHQ-9≥11, based on Random Forest and Support Vector Machine leave-one-out cross validation resulted in 60.1% and 59.1% accuracy, respectively. Proxies for social and physical behavior derived from smartphone sensor data was successfully deployed to deliver context-sensitive and personalized interventions to people with depressive symptoms. Subjects who used the app for an extended period of time showed significant reduction in self-reported symptom severity. Nonlinear classification models trained on features extracted from smartphone sensor data including Wifi, accelerometer, GPS, and phone use, demonstrated a proof of concept for the detection of depression superior to random classification. While findings of effectiveness must be reproduced in a RCT to proof causation, they pave the way for a new generation of digital health interventions leveraging smartphone sensors to provide context sensitive information for in-situ support and unobtrusive monitoring of critical mental health states.
The means/side-effect distinction in moral cognition: A meta-analysis.
Feltz, Adam; May, Joshua
2017-09-01
Experimental research suggests that people draw a moral distinction between bad outcomes brought about as a means versus a side effect (or byproduct). Such findings have informed multiple psychological and philosophical debates about moral cognition, including its computational structure, its sensitivity to the famous Doctrine of Double Effect, its reliability, and its status as a universal and innate mental module akin to universal grammar. But some studies have failed to replicate the means/byproduct effect especially in the absence of other factors, such as personal contact. So we aimed to determine how robust the means/byproduct effect is by conducting a meta-analysis of both published and unpublished studies (k=101; 24,058 participants). We found that while there is an overall small difference between moral judgments of means and byproducts (standardized mean difference=0.87, 95% CI 0.67-1.06; standardized mean change=0.57, 95% CI 0.44-0.69; log odds ratio=1.59, 95% CI 1.15-2.02), the mean effect size is primarily moderated by whether the outcome is brought about by personal contact, which typically involves the use of personal force. Copyright © 2017 Elsevier B.V. All rights reserved.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
Fulford, Daniel; Eisner, Lori R; Johnson, Sheri L
2015-06-30
Researchers and clinicians have long noted the overlap among features and high comorbidity of bipolar disorder and borderline personality disorder. The shared features of impulsivity and labile mood in both disorders make them challenging to distinguish. We tested the hypothesis that variables related to goal dysregulation would be uniquely related to risk for mania, while emotion-relevant impulsivity would be related to risk for both disorders. We administered a broad range of measures related to goal regulation traits and impulsivity to 214 undergraduates. Findings confirmed that risk for mania, but not for borderline personality disorder, was related to higher sensitivity to reward and intense pursuit of goals. In contrast, borderline personality disorder symptoms related more strongly than did mania risk with threat sensitivity and with impulsivity in the context of negative affect. Results highlight potential differences and commonalities in mania risk versus borderline personality disorder risk. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Gerwer, Johanna; Gest, Thomas R
2017-05-01
Body donor programs need to balance ethical concerns and educational needs. Among donor programs in the US, there is variability in the amount of donor personal information that is provided to medical students. This study assesses this variability and investigates the reasons for the variability among donor programs. Telephone interviews and email surveys were used to collect information concerning the provision and use of donor personal information with medical students. One hundred fifty-one donor programs in the US were contacted via email or telephone interview or both. Fifty-three donor programs responded to the survey or participated in the telephone interview. The survey results show variation, not only in the amount of donor personal information provided to medical students, but also in the attitudes and beliefs of the donor program personnel concerning donor personal information. This research documents the variability of the educational use of donor personal information. It is hoped that this description of the various approaches to using donor information will encourage the ethical use of donor information within the context of medical education. Clin. Anat. 30:445-449, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) Program Cooperative Agreements and Inventory AGENCY: Forest... on the revision of the currently approved information collection, Federal Excess Personal Property...
32 CFR 505.1 - General information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... and procedures that govern personal information maintained by the Department of the Army (DA) in Privacy Act systems of records. This part also provides guidance on collecting and disseminating personal... personal information about them. Additionally, this part promotes uniformity within the Army's Privacy Act...
32 CFR 505.1 - General information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... policies and procedures that govern personal information maintained by the Department of the Army (DA) in Privacy Act systems of records. This part also provides guidance on collecting and disseminating personal... personal information about them. Additionally, this part promotes uniformity within the Army's Privacy Act...
Stienen, Jozette Jc; Ottevanger, Petronella B; Wennekes, Lianne; Dekker, Helena M; van der Maazen, Richard Wm; Mandigers, Caroline Mpw; van Krieken, Johan Hjm; Blijlevens, Nicole Ma; Hermens, Rosella Pmg
2015-01-09
An overload of health-related information is available for patients on numerous websites, guidelines, and information leaflets. However, the increasing need for personalized health-related information is currently unmet. This study evaluates an educational e-tool for patients with non-Hodgkin's lymphoma (NHL) designed to meet patient needs with respect to personalized and complete health-related information provision. The e-tool aims to help NHL patients manage and understand their personal care pathway, by providing them with insight into their own care pathway, the possibility to keep a diary, and structured health-related information. Together with a multidisciplinary NHL expert panel, we developed an e-tool consisting of two sections: (1) a personal section for patients' own care pathway and their experiences, and (2) an informative section including information on NHL. We developed an ideal NHL care pathway based on the available (inter)national guidelines. The ideal care pathway, including date of first consultation, diagnosis, and therapy start, was used to set up the personal care pathway. The informative section was developed in collaboration with the patient association, Hematon. Regarding participants, 14 patients and 6 laymen were asked to evaluate the e-tool. The 24-item questionnaire used discussed issues concerning layout (6 questions), user convenience (3 questions), menu clarity (3 questions), information clarity (5 questions), and general impression (7 questions). In addition, the panel members were asked to give their feedback by email. A comprehensive overview of diagnostics, treatments, and aftercare can be established by patients completing the questions from the personal section. The informative section consisted of NHL information regarding NHL in general, diagnostics, therapy, aftercare, and waiting times. Regarding participants, 6 patients and 6 laymen completed the questionnaire. Overall, the feedback was positive, with at least 75% satisfaction on each feedback item. Important strengths mentioned were the use of a low health-literacy level, the opportunity to document the personal care pathway and experiences, and the clear overview of the information provided. The added value of the e-tool in general was pointed out as very useful for preparing the consultation with one's doctor and for providing all information on one website, including the opportunity for a personalized care pathway and diary. The majority of the revisions concerned wording and clarity. In addition, more explicit information on immunotherapy, experimental therapy, and psychosocial support was added. We have developed a personal care management e-tool for NHL patients. This tool contains a unique way to help patients manage their personal care pathway and give them insight into their NHL by providing health-related information and a personal diary. This evaluation showed that our e-tool meets patients' needs concerning personalized health-related information, which might serve as a good example for other oncologic diseases. Future research should focus on the possible impact of the e-tool on doctor-patient communication during consultations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Availability of classified information to persons not employed by the Department of Labor. 14.22 Section 14.22 Labor Office of the Secretary of Labor SECURITY REGULATIONS Transmission of Classified Information § 14.22 Availability of classified information to persons...
Benke, Christoph; Blumenthal, Terry D; Modeß, Christiane; Hamm, Alfons O; Pané-Farré, Christiane A
2015-09-01
The way in which the tendency to fear somatic arousal sensations (anxiety sensitivity), in interaction with the created expectations regarding arousal induction, might affect defensive responding to a symptom provocation challenge is not yet understood. The present study investigated the effect of anxiety sensitivity on autonomic arousal, startle eyeblink responses, and reported arousal and alertness to expected vs. unexpected caffeine consumption. To create a match/mismatch of expected and experienced arousal, high and low anxiety sensitive participants received caffeine vs. no drug either mixed in coffee (expectation of arousal induction) or in bitter lemon soda (no expectation of arousal induction) on four separate occasions. Autonomic arousal (heart rate, skin conductance level), respiration (end-tidal CO2, minute ventilation), defensive reflex responses (startle eyeblink), and reported arousal and alertness were recorded prior to, immediately and 30 min after beverage ingestion. Caffeine increased ventilation, autonomic arousal, and startle response magnitudes. Both groups showed comparable levels of autonomic and respiratory responses. The startle eyeblink responses were decreased when caffeine-induced arousal occurred unexpectedly, e.g., after administering caffeine in bitter lemon. This effect was more accentuated in high anxiety sensitive persons. Moreover, in high anxiety sensitive persons, the expectation of arousal (coffee consumption) led to higher subjective alertness when administering caffeine and increased arousal even if no drug was consumed. Unexpected symptom provocation leads to increased attention allocation toward feared arousal sensations in high anxiety sensitive persons. This finding broadens our understanding of modulatory mechanisms in defensive responding to bodily symptoms.
Burrows, Tracy; Hides, Leanne; Brown, Robyn; Dayas, Christopher V; Kay-Lambkin, Frances
2017-03-15
Increased obesity rates, an evolving food supply and the overconsumption of energy dense foods has led to an increase in research exploring addictive eating behaviours. This study aimed to investigate food addiction in a sample of Australian adults using the revised Yale Food Addiction Survey (YFAS) 2.0 tool and how it is associated with dietary intake, personality traits and mental health issues. Australian adults were invited to complete an online survey that collected information including: demographics, dietary intake, depression, anxiety, stress and personality dimensions including impulsivity, sensation seeking, hopelessness and anxiety sensitivity. A total of 1344 individuals were recruited with the samples comprising 75.7% female, mean age 39.8 ± 13.1 years (range 18-91 years) and body mass index BMI 27.7 ± 9.5. Food addiction was identified in 22.2% of participants using the YFAS 2.0 tool, which classified the severity of food addiction as "mild" in 0.7% of cases, "moderate" in 2.6% and "severe" in 18.9% of cases. Predictors of severe food addiction were female gender (odds ratio (OR) 3.65 95% CI 1.86-7.11) and higher levels of soft drink OR 1.36 (1.07-1.72), confectionary consumption and anxiety sensitivity 1.16 (1.07-1.26). Overall people with "severe" (OR 13.2, 5.8-29.8) or extremely severe depressive symptoms (OR 15.6, range 7.1-34.3) had the highest odds of having severe food addiction. The only variable that reduced the odds of having severe food addiction was vegetable intake. The current study highlights that addictive food behaviours are associated with a complex pattern of poor dietary choices and a clustering with mental health issues, particularly depression.
Keegan, Conor; Teljeur, Conor; Turner, Brian; Thomas, Steve
2016-09-01
The determinants of consumer mobility in voluntary health insurance markets providing duplicate cover are not well understood. Consumer mobility can have important implications for competition. Consumers should be price-responsive and be willing to switch insurer in search of the best-value products. Moreover, although theory suggests low-risk consumers are more likely to switch insurer, this process should not be driven by insurers looking to attract low risks. This study utilizes data on 320,830 VHI healthcare policies due for renewal between August 2013 and June 2014. At the time of renewal, policyholders were categorized as either 'switchers' or 'stayers', and policy information was collected for the prior 12 months. Differences between these groups were assessed by means of logistic regression. The ability of Ireland's risk equalization scheme to account for the relative attractiveness of switchers was also examined. Policyholders were price sensitive (OR 1.052, p < 0.01), however, price-sensitivity declined with age. Age (OR 0.971; p < 0.01) and hospital utilization (OR 0.977; p < 0.01) were both negatively associated with switching. In line with these findings, switchers were less costly than stayers for the 12 months prior to the switch/renew decision for single person (difference in average cost = €540.64) and multiple-person policies (difference in average cost = €450.74). Some cost differences remain for single-person policies following risk equalization (difference in average cost = €88.12). Consumers appear price-responsive, which is important for competition provided it is based on correct incentives. Risk equalization payments largely eliminated the profitable status of switchers, although further refinements may be required.
Fang, Mei Lan; Sixsmith, Judith; Sinclair, Shane; Horst, Glen
2016-05-18
Multiple factors influence the end-of-life (EoL) care and experience of poor quality services by culturally- and spiritually-diverse groups. Access to EoL services e.g. health and social supports at home or in hospices is difficult for ethnic minorities compared to white European groups. A tool is required to empower patients and families to access culturally-safe care. This review was undertaken by the Canadian Virtual Hospice as a foundation for this tool. To explore attitudes, behaviours and patterns to utilization of EoL care by culturally and spiritually diverse groups and identify gaps in EoL care practice and delivery methods, a scoping review and thematic analysis of article content was conducted. Fourteen electronic databases and websites were searched between June-August 2014 to identify English-language peer-reviewed publications and grey literature (including reports and other online resources) published between 2004-2014. The search identified barriers and enablers at the systems, community and personal/family levels. Primary barriers include: cultural differences between healthcare providers; persons approaching EoL and family members; under-utilization of culturally-sensitive models designed to improve EoL care; language barriers; lack of awareness of cultural and religious diversity issues; exclusion of families in the decision-making process; personal racial and religious discrimination; and lack of culturally-tailored EoL information to facilitate decision-making. This review highlights that most research has focused on decision-making. There were fewer studies exploring different cultural and spiritual experiences at the EoL and interventions to improve EoL care. Interventions evaluated were largely educational in nature rather than service oriented.
Improved sensing using simultaneous deep-UV Raman and fluorescence detection-II
NASA Astrophysics Data System (ADS)
Hug, W. F.; Bhartia, R.; Sijapati, K.; Beegle, L. W.; Reid, R. D.
2014-05-01
Photon Systems in collaboration with JPL is continuing development of a new technology robot-mounted or hand-held sensor for reagentless, short-range, standoff detection and identification of trace levels chemical, biological, and explosive (CBE) materials on surfaces. This deep ultraviolet CBE sensor is the result of Army STTR and DTRA programs. The evolving 10 to 15 lb, 20 W, sensor can discriminate CBE from background clutter materials using a fusion of deep UV excited resonance Raman (RR) and laser induced native fluorescence (LINF) emissions collected is less than 1 ms. RR is a method that provides information about molecular bonds, while LINF spectroscopy is a much more sensitive method that provides information regarding the electronic configuration of target molecules. Standoff excitation of suspicious packages, vehicles, persons, and other objects that may contain hazardous materials is accomplished using excitation in the deep UV where there are four main advantages compared to near-UV, visible or near-IR counterparts. 1) Excited between 220 and 250 nm, Raman emission occur within a fluorescence-free region of the spectrum, eliminating obscuration of weak Raman signals by fluorescence from target or surrounding materials. 2) Because Raman and fluorescence occupy separate spectral regions, detection can be done simultaneously, providing an orthogonal set of information to improve both sensitivity and lower false alarm rates. 3) Rayleigh law and resonance effects increase Raman signal strength and sensitivity of detection. 4) Penetration depth into target in the deep UV is short, providing spatial/spectral separation of a target material from its background or substrate. 5) Detection in the deep UV eliminates ambient light background and enable daylight detection.
Haug, Ulrike; Knudsen, Amy B; Lansdorp-Vogelaar, Iris; Kuntz, Karen M
2015-06-15
Researchers are actively pursuing the development of a new non-invasive test (NIT) for colorectal cancer (CRC) screening as an alternative to fecal occult blood tests (FOBTs). The majority of pilot studies focus on the detection of invasive CRC rather than precursor lesions (i.e., adenomas). We aimed to explore the relevance of adenoma detection for the viability of an NIT for CRC screening by considering a hypothetical test that does not detect adenomas beyond chance. We used the Simulation Model of Colorectal Cancer (SimCRC) to estimate the effectiveness of CRC screening and the lifetime costs (payers' perspective) for a cohort of US 50-years-old persons to whom CRC screening is offered from age 50-75. We compared annual screening with guaiac and immunochemical FOBTs (with sensitivities up to 70 and 24% for CRC and adenomas, respectively) to annual screening with a hypothetical NIT (sensitivity of 90% for CRC, no detection of adenomas beyond chance, specificity and cost similar to FOBTs). Screening with the NIT was not more effective, but was 29-44% more costly than screening with FOBTs. The findings were robust to varying the screening interval, the NIT's sensitivity for CRC, adherence rates favoring the NIT, and the NIT's unit cost. A comparative modelling approach using a model that assumes a shorter adenoma dwell time (MISCAN-COLON) confirmed the superiority of the immunochemical FOBT over an NIT with no ability to detect adenomas. Information on adenoma detection is crucial to determine whether a new NIT is a viable alternative to FOBTs for CRC screening. Current evidence thus lacks an important piece of information to identify marker candidates that hold real promise and deserve further (large-scale) evaluation. © 2014 UICC.
41 CFR 109-1.5108-2 - Sensitive items.
Code of Federal Regulations, 2011 CFR
2011-01-01
....51-Personal Property Management Standards and Practices § 109-1.5108-2 Sensitive items. Individual... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Sensitive items. 109-1.5108-2 Section 109-1.5108-2 Public Contracts and Property Management Federal Property Management...
41 CFR 109-1.5108-2 - Sensitive items.
Code of Federal Regulations, 2012 CFR
2012-01-01
....51-Personal Property Management Standards and Practices § 109-1.5108-2 Sensitive items. Individual... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Sensitive items. 109-1.5108-2 Section 109-1.5108-2 Public Contracts and Property Management Federal Property Management...
41 CFR 109-1.5108-2 - Sensitive items.
Code of Federal Regulations, 2010 CFR
2010-07-01
....51-Personal Property Management Standards and Practices § 109-1.5108-2 Sensitive items. Individual... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Sensitive items. 109-1.5108-2 Section 109-1.5108-2 Public Contracts and Property Management Federal Property Management...
41 CFR 109-1.5108-2 - Sensitive items.
Code of Federal Regulations, 2013 CFR
2013-07-01
....51-Personal Property Management Standards and Practices § 109-1.5108-2 Sensitive items. Individual... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Sensitive items. 109-1.5108-2 Section 109-1.5108-2 Public Contracts and Property Management Federal Property Management...
41 CFR 109-1.5108-2 - Sensitive items.
Code of Federal Regulations, 2014 CFR
2014-01-01
....51-Personal Property Management Standards and Practices § 109-1.5108-2 Sensitive items. Individual... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Sensitive items. 109-1.5108-2 Section 109-1.5108-2 Public Contracts and Property Management Federal Property Management...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Person. 1206.15 Section 1206.15 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... INFORMATION Mango Promotion, Research, and Information Order Definitions § 1206.15 Person. Person means any...
Childhood abuse, alexithymia and personality disorder.
Berenbaum, H
1996-12-01
I examined the relationships among childhood abuse, alexithymia, and personality disorder. Participants were 60 adults who were receiving outpatient psychotherapy. Both the participants and their therapists used the Toronto Alexithymia Scale to provide independently information concerning the client's level of alexithymia. The therapists provided information concerning DSM-III-R personality disorder diagnoses, and participants completed portions of the Personality Diagnostic Questionnaire-Revised. Information concerning childhood abuse history was obtained from the therapists. As expected, childhood abuse, alexithymia, and personality disorder were all associated with each other. The abilities to identify and communicate emotions were differentially associated with childhood abuse and personality disorder.
76 FR 174 - NIJ Draft Metal Detector Standards for Public Safety
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-03
... online. Personal identifying information and confidential business information identified and located as... record and may be made available for public inspection online. Such information includes personal... do not wish for it to be posted online, you must include the phrase ``PERSONAL IDENTIFYING...
The Role of Personality in Musicians' Information Seeking for Creativity
ERIC Educational Resources Information Center
Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph
2017-01-01
Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…
Decety, Jean; Yoder, Keith J.
2015-01-01
Why do people tend to care for upholding principles of justice? This study examined the association between individual differences in the affective, motivational and cognitive components of empathy, sensitivity to justice, and psychopathy in participants (N 265) who were also asked to rate the permissibility of everyday moral situations that pit personal benefit against moral standards of justice. Counter to commonsense, emotional empathy was not associated with sensitivity to injustice for others. Rather, individual differences in cognitive empathy and empathic concern predicted sensitivity to justice for others, as well as the endorsement of moral rules. Psychopathy coldheartedness scores were inversely associated with motivation for justice. Moreover, hierarchical multiple linear regression analysis revealed that self-focused and other-focused orientations toward justice had opposing influences on the permissibility of moral judgments. High scores on psychopathy were associated with less moral condemnation of immoral behavior. Together, these results contribute to a better understanding of the information processing mechanisms underlying justice motivation, and may guide interventions designed to foster justice and moral behavior. In order to promote justice motivation, it may be more effective to encourage perspective taking and reasoning to induce concern for others than emphasizing emotional sharing with the misfortune of others. PMID:25768232
Malaria rapid diagnostic tests in elimination settings—can they find the last parasite?
McMorrow, M. L.; Aidoo, M.; Kachur, S. P.
2016-01-01
Rapid diagnostic tests (RDTs) for malaria have improved the availability of parasite-based diagnosis throughout the malaria-endemic world. Accurate malaria diagnosis is essential for malaria case management, surveillance, and elimination. RDTs are inexpensive, simple to perform, and provide results in 15–20 min. Despite high sensitivity and specificity for Plasmodium falciparum infections, RDTs have several limitations that may reduce their utility in low-transmission settings: they do not reliably detect low-density parasitaemia (≤200 parasites/μL), many are less sensitive for Plasmodium vivax infections, and their ability to detect Plasmodium ovale and Plasmodium malariae is unknown. Therefore, in elimination settings, alternative tools with higher sensitivity for low-density infections (e.g. nucleic acid-based tests) are required to complement field diagnostics, and new highly sensitive and specific field-appropriate tests must be developed to ensure accurate diagnosis of symptomatic and asymptomatic carriers. As malaria transmission declines, the proportion of low-density infections among symptomatic and asymptomatic persons is likely to increase, which may limit the utility of RDTs. Monitoring malaria in elimination settings will probably depend on the use of more than one diagnostic tool in clinical-care and surveillance activities, and the combination of tools utilized will need to be informed by regular monitoring of test performance through effective quality assurance. PMID:21910780
Decety, Jean; Yoder, Keith J
2016-01-01
Why do people tend to care for upholding principles of justice? This study examined the association between individual differences in the affective, motivational and cognitive components of empathy, sensitivity to justice, and psychopathy in participants (N 265) who were also asked to rate the permissibility of everyday moral situations that pit personal benefit against moral standards of justice. Counter to common sense, emotional empathy was not associated with sensitivity to injustice for others. Rather, individual differences in cognitive empathy and empathic concern predicted sensitivity to justice for others, as well as the endorsement of moral rules. Psychopathy coldheartedness scores were inversely associated with motivation for justice. Moreover, hierarchical multiple linear regression analysis revealed that self-focused and other-focused orientations toward justice had opposing influences on the permissibility of moral judgments. High scores on psychopathy were associated with less moral condemnation of immoral behavior. Together, these results contribute to a better understanding of the information processing mechanisms underlying justice motivation, and may guide interventions designed to foster justice and moral behavior. In order to promote justice motivation, it may be more effective to encourage perspective taking and reasoning than emphasizing emotional sharing with the misfortune of others.
Benedict, Ralph HB; DeLuca, John; Phillips, Glenn; LaRocca, Nicholas; Hudson, Lynn D; Rudick, Richard
2017-01-01
Cognitive and motor performance measures are commonly employed in multiple sclerosis (MS) research, particularly when the purpose is to determine the efficacy of treatment. The increasing focus of new therapies on slowing progression or reversing neurological disability makes the utilization of sensitive, reproducible, and valid measures essential. Processing speed is a basic elemental cognitive function that likely influences downstream processes such as memory. The Multiple Sclerosis Outcome Assessments Consortium (MSOAC) includes representatives from advocacy organizations, Food and Drug Administration (FDA), European Medicines Agency (EMA), National Institute of Neurological Disorders and Stroke (NINDS), academic institutions, and industry partners along with persons living with MS. Among the MSOAC goals is acceptance and qualification by regulators of performance outcomes that are highly reliable and valid, practical, cost-effective, and meaningful to persons with MS. A critical step for these neuroperformance metrics is elucidation of clinically relevant benchmarks, well-defined degrees of disability, and gradients of change that are deemed clinically meaningful. This topical review provides an overview of research on one particular cognitive measure, the Symbol Digit Modalities Test (SDMT), recognized as being particularly sensitive to slowed processing of information that is commonly seen in MS. The research in MS clearly supports the reliability and validity of this test and recently has supported a responder definition of SDMT change approximating 4 points or 10% in magnitude. PMID:28206827
Netter, Petra
2018-04-19
This paper presents a discussion of principles and problems of neurotransmitter challenge tests using examples of experiments, most of which were performed in the author's laboratory. Drugs targeting synthesis, release, receptors or reuptake of dopamine, serotonin and noradrenergic transmitter (TM) systems were used for characterizing or discriminating certain temperament or personality traits and their sub-factors. Any personality or temperament trait is characterized by multiple TM responses, thus constellations of hormone responses to drugs acting on different TM systems or on different sources of TM activity were investigated within individuals in crossover designs. The major conclusions are: (i) intra-individual patterns of hormone responses to different TM-related drugs, or to agonists and antagonists, can help to discriminate subtypes of temperament dimensions, and (ii) the latency and shape of response curves may help specify processes of biological responses related to psychological dimensions and reveal common TM sensitivities in clusters of traits. TM sensitivity, defined by hormone responses, does not always correspond to accompanying behavioural indicators, but may provide more specific information on underlying mechanisms. Additional consideration of drug doses and experimental induction of stressors may serve to identify temperament-related susceptibilities to certain drugs. Limitations of the challenge approach and recommendations for future research are discussed.This article is part of the theme issue 'Diverse perspectives on diversity: multi-disciplinary approaches to taxonomies of individual differences'. © 2018 The Author(s).
Benedict, Ralph Hb; DeLuca, John; Phillips, Glenn; LaRocca, Nicholas; Hudson, Lynn D; Rudick, Richard
2017-04-01
Cognitive and motor performance measures are commonly employed in multiple sclerosis (MS) research, particularly when the purpose is to determine the efficacy of treatment. The increasing focus of new therapies on slowing progression or reversing neurological disability makes the utilization of sensitive, reproducible, and valid measures essential. Processing speed is a basic elemental cognitive function that likely influences downstream processes such as memory. The Multiple Sclerosis Outcome Assessments Consortium (MSOAC) includes representatives from advocacy organizations, Food and Drug Administration (FDA), European Medicines Agency (EMA), National Institute of Neurological Disorders and Stroke (NINDS), academic institutions, and industry partners along with persons living with MS. Among the MSOAC goals is acceptance and qualification by regulators of performance outcomes that are highly reliable and valid, practical, cost-effective, and meaningful to persons with MS. A critical step for these neuroperformance metrics is elucidation of clinically relevant benchmarks, well-defined degrees of disability, and gradients of change that are deemed clinically meaningful. This topical review provides an overview of research on one particular cognitive measure, the Symbol Digit Modalities Test (SDMT), recognized as being particularly sensitive to slowed processing of information that is commonly seen in MS. The research in MS clearly supports the reliability and validity of this test and recently has supported a responder definition of SDMT change approximating 4 points or 10% in magnitude.
Iltis, Ana
2006-08-01
Persons generally must give their informed consent to participate in research. To provide informed consent persons must be given information regarding the study in simple, lay language. Consent must be voluntary, and persons giving consent must be legally competent to consent and possess the capacity to understand and appreciate the information. This paper examines the relationship between the obligation to disclose information regarding risks and the requirement that persons have the capacity to understand and appreciate the information. There has been insufficient attention to the extent to which persons must be able to understand and appreciate study information in order to have their consent deemed valid when the information is provided in simple, lay language. This paper argues that (1) the capacity to understand and appreciate information that should be deemed necessary to give valid consent should be defined by the capacity of the typical, cognitively normal adult and (2) the capacity of the typical, cognitively normal adult to understand and appreciate the concept of risk is limited. Therefore, (3) all things being equal, potential subjects must possess a limited capacity to understand and appreciate risk to be deemed competent to consent to research participation. (4) In some cases investigators ought to require that persons possess a greater than typical capacity to understand and appreciate risk.
Preference for tap, bottled, and recycled water: Relations to PTC taste sensitivity and personality.
Harmon, Daniel; Gauvain, Mary; Z Reisz; Arthur, Isaac; Story, S Drew
2018-02-01
This study investigated people's preferences for different water sources and factors that predict such preferences using a blind taste test. Water preferences of 143 participants for one name-brand bottled water, one groundwater-sourced tap water, and one indirect potable reuse (IDR) water were assessed. For predictors of water preference, we measured each participant's PTC taste sensitivity and assessed two personality traits (Neuroticism, Openness to Experience). We also explored participants' descriptions of each water source. Results indicate a preference for water treated with Reverse Osmosis (RO) (bottled and IDR water) over groundwater-sourced water, which had higher pH levels and lower concentrations of Ca and HCO 3 - . PTC taste sensitivity did not predict preferences, while Openness to Experience and Neuroticism predicted preference for IDR water. Positive relations between Openness to Experience and preferences for bottled and IDR water were moderated by gender and were stronger among females. Participants described water primarily by its taste and texture. Findings suggest that (1) tap water treated by RO is equally preferable to some bottled water, (2) personality traits may affect water preferences, and (3) prior findings of gender differences in preferences for bottled water may reflect personality characteristics. Efforts to increase acceptance for sustainable water alternatives, such as IDR, may be more successful by assuring consumers about taste and addressing personality traits that encourage or inhibit use. Copyright © 2017 Elsevier Ltd. All rights reserved.
The 6-min push test is reliable and predicts low fitness in spinal cord injury.
Cowan, Rachel E; Callahan, Morgan K; Nash, Mark S
2012-10-01
The objective of this study is to assess 6-min push test (6MPT) reliability, determine whether the 6MPT is sensitive to fitness differences, and assess if 6MPT distance predicts fitness level in persons with spinal cord injury (SCI) or disease. Forty individuals with SCI who could self-propel a manual wheelchair completed an incremental arm crank peak oxygen consumption assessment and two 6MPTs across 3 d (37% tetraplegia (TP), 63% paraplegia (PP), 85% men, 70% white, 63% Hispanic, mean age = 34 ± 10 yr, mean duration of injury = 13 ± 10 yr, and mean body mass index = 24 ± 5 kg.m). Intraclass correlation and Bland-Altman plots assessed 6MPT distance (m) reliability. Mann-Whitney U test compared 6MPT distance (m) of high and low fitness groups for TP and PP. The fitness status prediction was developed using N = 30 and validated in N = 10 (validation group (VG)). A nonstatistical prediction approach, below or above a threshold distance (TP = 445 m and PP = 604 m), was validated statistically by binomial logistic regression. Accuracy, sensitivity, and specificity were computed to evaluate the threshold approach. Intraclass correlation coefficients exceeded 0.90 for the whole sample and the TP/PP subsets. High fitness persons propelled farther than low fitness persons for both TP/PP (both P < 0.05). Binomial logistic regression (P < 0.008) predicted the same fitness levels in the VG as the threshold approach. In the VG, overall accuracy was 70%. Eighty-six percent of low fitness persons were correctly identified (sensitivity), and 33% of high fitness persons were correctly identified (specificity). The 6MPT may be a useful tool for SCI clinicians and researchers. 6MPT distance demonstrates excellent reliability and is sensitive to differences in fitness level. 6MPT distances less than a threshold distance may be an effective approach to identify low fitness in person with SCI.
Refining Time-Activity Classification of Human Subjects Using the Global Positioning System.
Hu, Maogui; Li, Wei; Li, Lianfa; Houston, Douglas; Wu, Jun
2016-01-01
Detailed spatial location information is important in accurately estimating personal exposure to air pollution. Global Position System (GPS) has been widely used in tracking personal paths and activities. Previous researchers have developed time-activity classification models based on GPS data, most of them were developed for specific regions. An adaptive model for time-location classification can be widely applied to air pollution studies that use GPS to track individual level time-activity patterns. Time-activity data were collected for seven days using GPS loggers and accelerometers from thirteen adult participants from Southern California under free living conditions. We developed an automated model based on random forests to classify major time-activity patterns (i.e. indoor, outdoor-static, outdoor-walking, and in-vehicle travel). Sensitivity analysis was conducted to examine the contribution of the accelerometer data and the supplemental spatial data (i.e. roadway and tax parcel data) to the accuracy of time-activity classification. Our model was evaluated using both leave-one-fold-out and leave-one-subject-out methods. Maximum speeds in averaging time intervals of 7 and 5 minutes, and distance to primary highways with limited access were found to be the three most important variables in the classification model. Leave-one-fold-out cross-validation showed an overall accuracy of 99.71%. Sensitivities varied from 84.62% (outdoor walking) to 99.90% (indoor). Specificities varied from 96.33% (indoor) to 99.98% (outdoor static). The exclusion of accelerometer and ambient light sensor variables caused a slight loss in sensitivity for outdoor walking, but little loss in overall accuracy. However, leave-one-subject-out cross-validation showed considerable loss in sensitivity for outdoor static and outdoor walking conditions. The random forests classification model can achieve high accuracy for the four major time-activity categories. The model also performed well with just GPS, road and tax parcel data. However, caution is warranted when generalizing the model developed from a small number of subjects to other populations.
2014-01-01
Background Schizotypal personality traits are associated with schizophrenia spectrum disorders, stating that schizotypal traits may represent a “prodrome” or other developmental precursor of schizophrenia. Genetic and environmental factors both play importanxt roles in the development of schizotypal traits. Different levels of schizotypal traits across regions may be indicative of similar differences in the incidence of schizophrenia. Aim The present study identifying where in a given region, schizotypal personality traits are more or less level of schizotypal personality scores in Chinese male youth of Sichuan province. Not only for research purposes but also for the evaluation of new draft and allocation policy initiatives intended to aid recruitment of mental health employees. Methods Data from the Psychological Selection Systems for Chinese Recruits, a mental health screening system used in China, collected in 2011 (67,558 copies) were used to map spatial distribution of schizotypal personality traits using geostatistics and geographic information system (GIS) techniques. Correlation analyses were conducted to explore the effects of years of education and illiterate rate on schizotypal personality traits. Results Maps for three schizotypal personality clinical scales (dissociative, Dit; neurotic, Net and sensitive, Set) showed similar geographical trends. The highest T scores were distributed mainly in the eastern and northern counties of Sichuan, with scores decreasing successively from east to west, with the eastern counties generally showing higher scores. Correlation analysis showed that t-scores of Set were negatively correlated with years of education, whereas t-scores of Net were negatively correlated with illiteracy rate. Conclusions Schizotypal personality traits in male youth showed specific geographical trends in Sichuan province, providing some evidence that kriging based on GIS can be used to geographically localize genetic and environmental factors associated with schizotypal personality traits. This approach could be used to help allocate public health resources to specific areas and could also have personnel selection applications. PMID:24423022
Predicting suicide attempts with the SAD PERSONS scale: a longitudinal analysis.
Bolton, James M; Spiwak, Rae; Sareen, Jitender
2012-06-01
The SAD PERSONS scale is a widely used risk assessment tool for suicidal behavior despite a paucity of supporting data. The objective of this study was to examine the ability of the scale in predicting suicide attempts. Participants consisted of consecutive referrals (N=4,019) over 2 years (January 1, 2009 to December 31, 2010) to psychiatric services in the emergency departments of the 2 largest tertiary care hospitals in the province of Manitoba, Canada. SAD PERSONS and Modified SAD PERSONS (MSPS) scale scores were recorded for individuals at their index and all subsequent presentations. The 2 main outcome measures in the study included current suicide attempts (at index presentation) and future suicide attempts (within the next 6 months). The ability of the scales to predict suicide attempts was evaluated with logistic regression, sensitivity and specificity analyses, and receiver operating characteristic curves. 566 people presented with suicide attempts (14.1% of the sample). Both SAD PERSONS and MSPS showed poor predictive ability for future suicide attempts. Compared to low risk scores, high risk baseline scores had low sensitivity (19.6% and 40.0%, respectively) and low positive predictive value (5.3% and 7.4%, respectively). SAD PERSONS did not predict suicide attempts better than chance (area under the curve =0.572; 95% confidence interval [CI], 0.51-0.64; P value nonsignificant). Stepwise regression identified 5 original scale items that accounted for the greatest proportion of future suicide attempt variance. High risk scores using this model had high sensitivity (93.5%) and were associated with a 5-fold higher likelihood of future suicide attempt presentation (odds ratio =5.58; 95% CI, 2.24-13.86; P<.001). In their current form, SAD PERSONS and MSPS do not accurately predict future suicide attempts. © Copyright 2012 Physicians Postgraduate Press, Inc.
Capon, Hannah; Hall, Wayne; Fry, Craig; Carter, Adrian
2016-10-01
Smartphone technologies and mHealth applications (or apps) promise unprecedented scope for data collection, treatment intervention, and relapse prevention when used in the field of substance abuse and addiction. This potential also raises new ethical challenges that researchers, clinicians, and software developers must address. This paper aims to identify ethical issues in the current uses of smartphones in addiction research and treatment. A search of three databases (PubMed, Web of Science and PsycInfo) identified 33 studies involving smartphones or mHealth applications for use in the research and treatment of substance abuse and addiction. A content analysis was conducted to identify how smartphones are being used in these fields and to highlight the ethical issues raised by these studies. Smartphones are being used to collect large amounts of sensitive information, including personal information, geo-location, physiological activity, self-reports of mood and cravings, and the consumption of illicit drugs, alcohol and nicotine. Given that detailed information is being collected about potentially illegal behaviour, we identified the following ethical considerations: protecting user privacy, maximising equity in access, ensuring informed consent, providing participants with adequate clinical resources, communicating clinically relevant results to individuals, and the urgent need to demonstrate evidence of safety and efficacy of the technologies. mHealth technology offers the possibility to collect large amounts of valuable personal information that may enhance research and treatment of substance abuse and addiction. To realise this potential researchers, clinicians and app-developers must address these ethical concerns to maximise the benefits and minimise risks of harm to users. Copyright © 2016 Elsevier B.V. All rights reserved.
Fenske, Sabrina; Lis, Stefanie; Liebke, Lisa; Niedtfeld, Inga; Kirsch, Peter; Mier, Daniela
2015-01-01
Borderline Personality Disorder (BPD) is characterized by severe deficits in social interactions, which might be linked to deficits in emotion recognition. Research on emotion recognition abilities in BPD revealed heterogeneous results, ranging from deficits to heightened sensitivity. The most stable findings point to an impairment in the evaluation of neutral facial expressions as neutral, as well as to a negative bias in emotion recognition; that is the tendency to attribute negative emotions to neutral expressions, or in a broader sense to report a more negative emotion category than depicted. However, it remains unclear which contextual factors influence the occurrence of this negative bias. Previous studies suggest that priming by preceding emotional information and also constrained processing time might augment the emotion recognition deficit in BPD. To test these assumptions, 32 female BPD patients and 31 healthy females, matched for age and education, participated in an emotion recognition study, in which every facial expression was preceded by either a positive, neutral or negative scene. Furthermore, time constraints for processing were varied by presenting the facial expressions with short (100 ms) or long duration (up to 3000 ms) in two separate blocks. BPD patients showed a significant deficit in emotion recognition for neutral and positive facial expression, associated with a significant negative bias. In BPD patients, this emotion recognition deficit was differentially affected by preceding emotional information and time constraints, with a greater influence of emotional information during long face presentations and a greater influence of neutral information during short face presentations. Our results are in line with previous findings supporting the existence of a negative bias in emotion recognition in BPD patients, and provide further insights into biased social perceptions in BPD patients.
Njenga, S M; Wamae, C N
2001-10-01
An immunochromatographic card test (ICT) that uses fingerprick whole blood instead of serum for diagnosis of bancroftian filariasis has recently been developed. The card test was validated in the field in Kenya by comparing its sensitivity to the combined sensitivity of Knott's concentration and counting chamber methods. A total of 102 (14.6%) and 117 (16.7%) persons was found to be microfilaremic by Knott's concentration and counting chamber methods, respectively. The geometric mean intensities (GMI) were 74.6 microfilariae (mf)/ml and 256.5 mf/ml by Knott's concentration and counting chamber methods, respectively. All infected individuals detected by both Knott's concentration and counting chamber methods were also antigen positive by the ICT filariasis card test (100% sensitivity). Further, of 97 parasitologically amicrofilaremic persons, 24 (24.7%) were antigen positive by the ICT. The overall prevalence of antigenemia was 37.3%. Of 100 nonendemic area control persons, none was found to be filarial antigen positive (100% specificity). The results show that the new version of the ICT filariasis card test is a simple, sensitive, specific, and rapid test that is convenient in field settings.
Doudenkova, Victoria; Bélisle Pipon, Jean-Christophe
2016-03-01
Although there is consensus on the fact that ionizing radiation used in radiological examinations can affect health, the stochastic (random) nature of risk makes it difficult to anticipate and assess specific health implications for patients. The issue of radiation protection is peculiar as any dosage received in life is cumulative, the sensitivity to radiation is highly variable from one person to another, and between 20 % and 50 % of radiological examinations appear not to be necessary. In this context, one might reasonably assume that information and patient consent would play an important role in regulating radiological practice. However, there is to date no clear consensus regarding the nature and content of-or even need for-consent by patients exposed to ionizing radiation. While law and ethics support the same principles for respecting the dignity of the person (inviolability and integrity), in the context of radiology practice, they do not provide a consistent message to guide clinical decision-making. This article analyzes the issue of healthcare professionals' duty to inform and obtain patient consent for radiological examinations. Considering that both law and ethics have as one of their aims to protect vulnerable populations, it is important that they begin to give greater attention to issues raised by the use of ionizing radiation in medicine. While the situation in Canada serves as a backdrop for a reflective analysis of the problem, the conclusions are pertinent for professional practice in other jurisdictions because the principles underlying health law and jurisprudence are fairly general.
Williams, J P
1991-01-01
Four groups of 14-year-olds, differing in reading level, learning disability status, and socioeconomic status, read and retold short problem narratives and answered questions. The pattern of reporting components of the problem schema (goal/obstacles/choices) differed for problems presented with or without a statement of the character's priority for action, suggesting that including priorities adds another level of information to the problem text and changes its macrostructure. Even the poorest readers showed this sensitivity to text structure. Three of the four measures of problem representation (idea units recalled, problem-schema components reported, and error rate) reflected overall reading ability. However, the degree to which extraneous information was incorporated into problem representations did not. Learning-disabled students made more importations, and more implausible importations, than did non-disabled students. Moreover, this pattern was associated with poor problem solving. Only proficient readers showed awareness of the source of the information (text or extratext) on which their predictions were based.
Frize, Monique; Yang, Lan; Walker, Robin C; O'Connor, Annette M
2005-06-01
This research is built on the belief that artificial intelligence estimations need to be integrated into clinical social context to create value for health-care decisions. In sophisticated neonatal intensive care units (NICUs), decisions to continue or discontinue aggressive treatment are an integral part of clinical practice. High-quality evidence supports clinical decision-making, and a decision-aid tool based on specific outcome information for individual NICU patients will provide significant support for parents and caregivers in making difficult "ethical" treatment decisions. In our approach, information on a newborn patient's likely outcomes is integrated with the physician's interpretation and parents' perspectives into codified knowledge. Context-sensitive content adaptation delivers personalized and customized information to a variety of users, from physicians to parents. The system provides structuralized knowledge translation and exchange between all participants in the decision, facilitating collaborative decision-making that involves parents at every stage on whether to initiate, continue, limit, or terminate intensive care for their infant.
Invisible realities: Caring for older Moroccan migrants with dementia in Belgium.
Berdai Chaouni, Saloua; De Donder, Liesbeth
2018-01-01
The number of older Moroccan migrants reaching the age of high risk for dementia is increasing in Belgium. Yet no study has been performed to explore how Moroccan families facing dementia experience and manage the condition. The study employed a qualitative design using semi-structured interviews with 12 informal and 13 formal caregivers to answer this research question. Findings indicate that the experience of dementia includes several invisible realities that challenge the informal and formal caregivers: (1) the invisibility of dementia as a condition; (2) the invisible subtleties of the informal care execution; (3) the invisibility and inaccessibility of care services as explanation for these family's non-use of available services; and (4) the overlooking of culture, migration and religion as invisible influencers of the overall dementia experience. A better understanding of these hidden realities of migrant older people with dementia and their caregivers could lead to interventions to provide effective and tailored person-centred care that is sensitive to the individual's life experiences, culture and religious background.
High-resolution Behavioral Economic Analysis of Cigarette Demand to Inform Tax Policy
MacKillop, James; Few, Lauren R.; Murphy, James G.; Wier, Lauren M.; Acker, John; Murphy, Cara; Stojek, Monika; Carrigan, Maureen; Chaloupka, Frank
2012-01-01
Aims Novel methods in behavioral economics permit the systematic assessment of the relationship between cigarette consumption and price. Toward informing tax policy, the goals of this study were to conduct a high-resolution analysis of cigarette demand in a large sample of adult smokers and to use the data to estimate the effects of tax increases in ten U.S. States. Design In-person descriptive survey assessment. Setting Academic departments at three universities. Participants Adult daily smokers (i.e., 5+ cigarettes/day; 18+ years old; ≥8th grade education); N = 1056. Measurements Estimated cigarette demand, demographics, expired carbon monoxide. Findings The cigarette demand curve exhibited highly variable levels of price sensitivity, especially in the form of ‘left-digit effects’ (i.e., very high price sensitivity as pack prices transitioned from one whole number to the next; e.g., $5.80-$6/pack). A $1 tax increase in the ten states was projected to reduce the economic burden of smoking by an average of $531M (range: $93.6M-$976.5M) and increase gross tax revenue by an average of 162% (range: 114%- 247%). Conclusions Tobacco price sensitivity is nonlinear across the demand curve and in particular for pack-level left-digit price transitions. Tax increases in U.S. states with similar price and tax rates to the sample are projected to result in substantial decreases in smoking-related costs and substantial increases in tax revenues. PMID:22845784
High-resolution behavioral economic analysis of cigarette demand to inform tax policy.
MacKillop, James; Few, Lauren R; Murphy, James G; Wier, Lauren M; Acker, John; Murphy, Cara; Stojek, Monika; Carrigan, Maureen; Chaloupka, Frank
2012-12-01
Novel methods in behavioral economics permit the systematic assessment of the relationship between cigarette consumption and price. Towards informing tax policy, the goals of this study were to conduct a high-resolution analysis of cigarette demand in a large sample of adult smokers and to use the data to estimate the effects of tax increases in 10 US States. In-person descriptive survey assessment. Academic departments at three universities. Adult daily smokers (i.e. more than five cigarettes/day; 18+ years old; ≥8th grade education); n = 1056. Estimated cigarette demand, demographics, expired carbon monoxide. The cigarette demand curve exhibited highly variable levels of price sensitivity, especially in the form of 'left-digit effects' (i.e. very high price sensitivity as pack prices transitioned from one whole number to the next; e.g. $5.80-6/pack). A $1 tax increase in the 10 states was projected to reduce the economic burden of smoking by an average of $530.6 million (range: $93.6-976.5 million) and increase gross tax revenue by an average of 162% (range: 114-247%). Tobacco price sensitivity is non-linear across the demand curve and in particular for pack-level left-digit price transitions. Tax increases in US states with similar price and tax rates to the sample are projected to result in substantial decreases in smoking-related costs and substantial increases in tax revenues. © 2012 The Authors, Addiction © 2012 Society for the Study of Addiction.
77 FR 43086 - Agency Information Collection Request; 60-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
...; Sterilization of Persons in Federally Assisted Family Planning Projects--OMB No. 0937- 0166--Extension--OPHS..., subpart B (``Sterilization of Persons in Federally Assisted Family Planning Projects''). The consent form solicits information to assure voluntary and informed consent to persons undergoing sterilization in...
Continuum Thinking and the Contexts of Personal Information Management
ERIC Educational Resources Information Center
Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria
2014-01-01
Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…
National Crime Information Center (NCIC) Training Videos.
ERIC Educational Resources Information Center
Federal Bureau of Investigation, Washington, DC. National Crime Information Center.
The Federal Bureau of Investigation's National Crime Information Center (NCIC) maintains a set of computerized files of documented criminal justice information reported by a network of over 60,000 participating national, regional, state, and local agencies. The files, dealing with wanted persons, missing persons, unidentified persons, and stolen…
MyLibrary: A Web Personalized Digital Library.
ERIC Educational Resources Information Center
Rocha, Catarina; Xexeo, Geraldo; da Rocha, Ana Regina C.
With the increasing availability of information on Internet information providers, like search engines, digital libraries and online databases, it becomes more important to have personalized systems that help users to find relevant information. One type of personalization that is growing in use is recommender systems. This paper presents…
32 CFR 505.4 - Collecting personal information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Collecting personal information. 505.4 Section 505.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General...
2 CFR 200.82 - Protected Personally Identifiable Information (Protected PII).
Code of Federal Regulations, 2014 CFR
2014-01-01
... 2 Grants and Agreements 1 2014-01-01 2014-01-01 false Protected Personally Identifiable Information (Protected PII). 200.82 Section 200.82 Grants and Agreements Office of Management and Budget... § 200.82 Protected Personally Identifiable Information (Protected PII). Protected PII means an...
Effective Team Performance in Military Environments
1986-12-01
Salas, E. (in press). Personality and group effectiveness. Personality and Social Psychology Review. Gottfredson , G. D., Holland, J. L., & Ogawa, D. K...THEORETICAL, and require imagination, intelligence , and sensitivity to physical and intellectual problems. Typical groups involved in Investigative
Park, Lora E
2007-04-01
Appearance-Based Rejection Sensitivity (Appearance-RS) is a personality-processing system characterized by anxious concerns and expectations about being rejected based on one's physical attractiveness. People differ in their sensitivity to rejection based on appearance, with consequences for mental and physical health, self-esteem, affect, and feelings of belonging. Study 1 describes the development and validation of the Appearance-RS scale, its relation to personality variables and to health-related outcomes. Study 2 provides experimental evidence that high Appearance-RS people feel more alone and rejected when asked to think about negative aspects of their appearance. Finally, Study 3 tests ways to reduce the negative effects of receiving an appearance threat among high Appearance-RS participants. Specifically, high Appearance-RS participants who engaged in self-affirmation (thought of their personal strengths) or received a secure attachment prime (thought of a close, caring relationship) were buffered from the negative effects of an appearance threat on subsequent state self-esteem and mood.
Code of Federal Regulations, 2010 CFR
2010-04-01
... nonpublic information if the person demonstrates that: (i) The individual making the investment decision on... the basis of” material nonpublic information about that security or issuer if the person making the... or sale is not “on the basis of” material nonpublic information if the person making the purchase or...
41 CFR 105-64.104 - What must the system manager tell me when soliciting personal information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... manager tell me when soliciting personal information? 105-64.104 Section 105-64.104 Public Contracts and... Responsibilities § 105-64.104 What must the system manager tell me when soliciting personal information? When soliciting information from you or a third party for a system of records, system managers must: Cite the...
Reactions to Approach-Distance in Overweight and Normal Weight College Females.
ERIC Educational Resources Information Center
Rogers, Ruth Ann; Thomas, Georgelle
Research has found that the need for personal space is greater for normal persons who are interacting with stigmatized persons, such as overweight people, and that one who is identified as deviant may be more sensitive to environmental cues and react more strongly to affective stimuli. To investigate the reactions to approach/distance among…
ERIC Educational Resources Information Center
Stewart, Sherry Heather; McGonnell, Melissa; Wekerle, Christine; Adlaf, Ed
2011-01-01
Four specific personality factors have been theorized to put adolescents at risk for alcohol abuse: hopelessness (HOP), anxiety sensitivity (AS), sensation seeking (SS), and impulsivity (IMP). We examined relations of these personality factors to various alcohol-related indices in a sample at high risk for alcohol problems--specifically, a child…
Human detection in sensitive security areas through recognition of omega shapes using MACH filters
NASA Astrophysics Data System (ADS)
Rehman, Saad; Riaz, Farhan; Hassan, Ali; Liaquat, Muwahida; Young, Rupert
2015-03-01
Human detection has gained considerable importance in aggravated security scenarios over recent times. An effective security application relies strongly on detailed information regarding the scene under consideration. A larger accumulation of humans than the number of personal authorized to visit a security controlled area must be effectively detected, amicably alarmed and immediately monitored. A framework involving a novel combination of some existing techniques allows an immediate detection of an undesirable crowd in a region under observation. Frame differencing provides a clear visibility of moving objects while highlighting those objects in each frame acquired by a real time camera. Training of a correlation pattern recognition based filter on desired shapes such as elliptical representations of human faces (variants of an Omega Shape) yields correct detections. The inherent ability of correlation pattern recognition filters caters for angular rotations in the target object and renders decision regarding the existence of the number of persons exceeding an allowed figure in the monitored area.
Preverbal Infants Infer Third-Party Social Relationships Based on Language.
Liberman, Zoe; Woodward, Amanda L; Kinzler, Katherine D
2017-04-01
Language provides rich social information about its speakers. For instance, adults and children make inferences about a speaker's social identity, geographic origins, and group membership based on her language and accent. Although infants prefer speakers of familiar languages (Kinzler, Dupoux, & Spelke, 2007), little is known about the developmental origins of humans' sensitivity to language as marker of social identity. We investigated whether 9-month-olds use the language a person speaks as an indicator of that person's likely social relationships. Infants were familiarized with videos of two people who spoke the same or different languages, and then viewed test videos of those two individuals affiliating or disengaging. Results suggest that infants expected two people who spoke the same language to be more likely to affiliate than two people who spoke different languages. Thus, infants view language as a meaningful social marker and use language to make inferences about third-party social relationships. Copyright © 2016 Cognitive Science Society, Inc.
Drozdowska, Aleksandra; Hermanowski, Tomasz
2016-01-01
Escalating pharmaceutical costs have become a global challenge for both governments and patients. Generic substitution is one way of decreasing these costs. The aim of this study was to investigate factors associated with patients' choice between generic drugs and innovator drugs. The survey was conducted in June 2013, 1000 people from across Poland were chosen as a representative population sample. The outcome (a preference for generics/a preference for innovator pharmaceuticals/no preference) was modeled by multinomial logistic regression, adjusted for several variables describing patients' sensitivity to selected generic features (price, brand, and country of origin), to third-party opinions about generics (information on generics in the mass media, opinions of health professionals (i.e. physicians, pharmacists), relatives/friends), as well as patients' personal experiences and income per household. The results supported the predictive capacity of most independent variables (except for patient sensitivity to the country of origin and to the information on generics in the mass media), denoting patients' preferences toward generic substitution. Patient sensitivity to recommendations by physicians, generic brand, and household income were the strongest predictors of the choice between generic and innovator pharmaceuticals (P < 0.001). The probability of choosing generics over innovator drugs was significantly higher among respondents with the lowest income levels, in those who were indifferent to generic brand or their physician's opinion, as well as in respondents who were sensitive to recommendations by pharmacists or attached a greater value to a past experience with generics (their own experience or that of relatives/friends). In consideration of the foregoing, awareness-raising campaigns may be recommended, supported by a variety of systemic solutions and tools to encourage generic substitution. Copyright © 2016 Elsevier Inc. All rights reserved.