180,564 research outputs found

    Mamma Mia, Here You Blow Again! My My, How Can We Protect You? – The Development of a Threat Model for Whistleblower Anonymity

    Get PDF
    This research-in-progress paper focuses on the development of a threat model for maintaining whistleblower anonymity. Citizens have the obligation to uphold ethical behavior and report behavior that violates their personal and professional code of ethics. Whistleblowers are those who release information to expose the wrongdoings of a company or individual. When choosing how to report, the whistleblower must consider various reporting channels. However, due to the likelihood of retaliation, whistleblowers must also be aware of threats to their anonymity. Therefore, anonymous whistleblowers must take actions to protect themselves from threat actors and threat vectors that might expose their identity. With these issues in mind, our goal is to develop a comprehensive threat model for anonymous whistleblowing, as well as provide whistleblowers with a systematic approach to maintaining their anonymity throughout the whistleblowing process

    Unsolicited written narratives as a methodological genre in terminal illness: challenges and limitations

    Get PDF
    Stories about illness have proven invaluable in helping health professionals understand illness experiences. Such narratives have traditionally been solicited by researchers through interviews and the collection of personal writings, including diaries. These approaches are, however, researcher driven; the impetus for the creation of the story comes from the researcher and not the narrator. In recent years there has been exponential growth in illness narratives created by individuals, of their own volition, and made available for others to read in print or as Internet accounts. We sought to determine whether it was possible to identify such material for use as research data to explore the subject of living with the terminal illness amyotrophic lateral sclerosis/motor neuron disease—the contention being that these accounts are narrator driven and therefore focus on issues of greatest importance to the affected person. We encountered and sought to overcome a number of methodological and ethical challenges, which is our focus here

    The views of general practitioners and practice nurses towards the barriers and facilitators of proactive, internet-based chlamydia screening for reaching young heterosexual men

    Get PDF
    Background: Chlamydia trachomatis is a common bacterial sexually transmitted infection (STI), which disproportionately affects young people under 25 years. Commonly, more women are offered screening than men. This study obtained the views of general practitioners and practice nurses towards Internet-based screening and assessed levels of support for the development of proactive screening targeting young heterosexual men via the Internet. Methods: Semi-structured telephone interviews with 10 general practitioners and 8 practice nurses, across Central Scotland. Topics covered: experience of screening heterosexual men for chlamydia, views on the use of the Internet as a way to reach young men for chlamydia screening, beliefs about the potential barriers and facilitators to Internet-based screening. Transcripts from audio recordings were analysed with Framework Analysis, using QSR NVivo10. Results: Experiences of chlamydia screening were almost exclusively with women, driven by the nature of consultations and ease of raising sexual health issues with female patients; few practice nurses reported seeing men during consultations. All participants spoke in favour of Internet-based screening for young men. Participants reported ease of access and convenience as potential facilitators of an Internet-based approach but anonymity and confidentiality could be potential barriers and facilitators to the success of an Internet approach to screening. Concerns over practical issues as well as those pertaining to gender and socio-cultural issues were raised. Conclusions: Awareness of key barriers and facilitators, such as confidentiality, practicality and socio-cultural influences, will inform the development of an Internet-based approach to screening. However, this approach may have its limits in terms of being able to tackle wider social and cultural barriers, along with shifts in young people's and health professionals' attitudes towards screening. Nevertheless, employing innovative efforts as part of a multi-faceted approach is required to ensure effective interventions reach the policy agenda

    Exploring Challenges in Conducting E-Mental Health Research Among Asian American Women

    Get PDF
    In this discussion paper, we explore the challenges of conducting e-mental health intervention research among Asian American women and propose a model for addressing these barriers. Based on an extensive literature review, we identify two main types of barriers to conducting e-mental health intervention research among Asian American women: recruitment barriers and adherence barriers. Recruitment barriers are further subcategorized into those related to (1) stigmatized cultural beliefs about mental illness and mental health services; (2) lack of awareness about mental health services; and (3) language barrier. As to adherence barriers, the two identified subtypes concern (1) acuity and severity of mental health condition; and (2) lack of time. In order to enhance recruitment and adherence in e-mental health intervention research among the studied population, we formulate the following three main research strategies, namely: (1) considering the cultural and social contexts of Asian American women in the development of e-mental health interventions; (2) determining appropriate program length; and (3) conducting feasibility studies to test e-mental health interventions. We suggest that nurse researchers integrate our proposed model in conducting e-mental health interventions among Asian American women. Our proposed model also implies that nurses play an important role in encouraging Asian American women’s acceptance of and adherence to e-mental health interventions. In order to overcome the obstacles to conducting e-mental health research among Asian American women, we recommend that nurses familiarize themselves with credible, relevant, and evidence-based e-mental health resources and integrate online mental health services and information within their nursing practice

    On the Complexity of tt-Closeness Anonymization and Related Problems

    Full text link
    An important issue in releasing individual data is to protect the sensitive information from being leaked and maliciously utilized. Famous privacy preserving principles that aim to ensure both data privacy and data integrity, such as kk-anonymity and ll-diversity, have been extensively studied both theoretically and empirically. Nonetheless, these widely-adopted principles are still insufficient to prevent attribute disclosure if the attacker has partial knowledge about the overall sensitive data distribution. The tt-closeness principle has been proposed to fix this, which also has the benefit of supporting numerical sensitive attributes. However, in contrast to kk-anonymity and ll-diversity, the theoretical aspect of tt-closeness has not been well investigated. We initiate the first systematic theoretical study on the tt-closeness principle under the commonly-used attribute suppression model. We prove that for every constant tt such that 0≤t<10\leq t<1, it is NP-hard to find an optimal tt-closeness generalization of a given table. The proof consists of several reductions each of which works for different values of tt, which together cover the full range. To complement this negative result, we also provide exact and fixed-parameter algorithms. Finally, we answer some open questions regarding the complexity of kk-anonymity and ll-diversity left in the literature.Comment: An extended abstract to appear in DASFAA 201

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p
    • …
    corecore