322 research outputs found

    The Cowl - v.55 - n.9 - Dec 3, 1992

    Get PDF
    The Cowl - student newspaper of Providence College. Volume 55, Number 9 - December 3, 1992. 24 pages

    Codes, committees and other such conundrums!

    Get PDF

    Poverty and closing the gap: Adastra research consultancy projects

    Get PDF
    A fundamental principle which underpins all our teaching and research is the integration of theory and practice, and this principle is vividly exemplified within all the research consultancy projects. The longstanding successes in teacher training of Bishop Grosseteste University are founded upon the strength of our partnership with schools and educational settings. A key strand, that links our research ambitions with our commitment to teacher education, is the engagement in research consultancy and action research with partnership schools. The following reports all embed this approach of teachers working alongside researchers, integrating theory with practice, and focusing upon school-specific issues. They also represent excellent examples of how research can genuinely impact the prospects and life chances of young people. At the heart of our partnership is a focus on learners and learning, which the projects here also clearly share, alongside their key contribution in helping to close the educational attainment gap. Specifically, the research projects will enable the individual schools to develop further good practice, for the benefit of their own pupils, but also with potential applicability to other schools and settings. Furthermore, it is hoped they may motivate and inspire other teachers or schools to embark upon action research projects, driving further improvements in teaching and learning. Finally, for the individual teachers involved, the experience will hopefully stimulate an on-going theory-practice dialogue and provide impetus for further CPD and/or action research

    Self-sampling kits to increase HIV testing among black Africans in the UK: the HAUS mixed-methods study

    Get PDF
    Background: Timely diagnosis of human immunodeficiency virus (HIV) enables access to antiretroviral treatment, which reduces mortality, morbidity and further transmission in people living with HIV. In the UK, late diagnosis among black African people persists. Novel methods to enhance HIV testing in this population are needed. / Objectives: To develop a self-sampling kit (SSK) intervention to increase HIV testing among black Africans, using existing community and health-care settings (stage 1) and to assess the feasibility for a Phase III evaluation (stage 2). / Design: A two-stage, mixed-methods design. Stage 1 involved a systematic literature review, focus groups and interviews with key stakeholders and black Africans. Data obtained provided the theoretical base for intervention development and operationalisation. Stage 2 was a prospective, non-randomised study of a provider-initiated, HIV SSK distribution intervention targeted at black Africans. The intervention was assessed for cost-effectiveness. A process evaluation explored feasibility, acceptability and fidelity. / Setting: Twelve general practices and three community settings in London. / Main outcome measure: HIV SSK return rate. / Results: Stage 1 – the systematic review revealed support for HIV SSKs, but with scant evidence on their use and clinical effectiveness among black Africans. Although the qualitative findings supported SSK distribution in settings already used by black Africans, concerns were raised about the complexity of the SSK and the acceptability of targeting. These findings were used to develop a theoretically informed intervention. Stage 2 – of the 349 eligible people approached, 125 (35.8%) agreed to participate. Data from 119 were included in the analysis; 54.5% (65/119) of those who took a kit returned a sample; 83.1% of tests returned were HIV negative; and 16.9% were not processed, because of insufficient samples. Process evaluation showed the time pressures of the research process to be a significant barrier to feasibility. Other major barriers were difficulties with the SSK itself and ethnic targeting in general practice settings. The convenience and privacy associated with the SSK were described as beneficial aspects, and those who used the kit mostly found the intervention to be acceptable. Research governance delays prevented implementation in Glasgow. / Limitations: Owing to the study failing to recruit adequate numbers (the intended sample was 1200 participants), we were unable to evaluate the clinical effectiveness of SSKs in increasing HIV testing in black African people. No samples were reactive, so we were unable to assess pathways to confirmatory testing and linkage to care. / Conclusions: Our findings indicate that, although aspects of the intervention were acceptable, ethnic targeting and the SSK itself were problematic, and scale-up of the intervention to a Phase III trial was not feasible. The preliminary economic model suggests that, for the acceptance rate and test return seen in the trial, the SSK is potentially a cost-effective way to identify new infections of HIV. / Future work: Sexual and public health services are increasingly utilising self-sampling technologies. However, alternative, user-friendly SSKs that meet user and provider preferences and UK regulatory requirements are needed, and additional research is required to understand clinical effectiveness and cost-effectiveness for black African communities. / Study registration: This study is registered as PROSPERO CRD42014010698 and Integrated Research Application System project identification 184223. / Funding: The National Institute for Health Research Health Technology Assessment programme and the BHA for Equality in Health and Social Care

    Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation

    Full text link
    Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers. One simple approach for realizing anonymously authenticated communication is their simple combination, but this gives rise to another issue; how to build a secure channel. The current public key infrastructure cannot be used since the user's public key identifies the user. To cope with this issue, we propose a protocol that uses identity-based encryption for packet encryption without sacrificing anonymity, and group signature for anonymous user authentication. Communications in the protocol take place through proxy entities that conceal users' IP addresses from service providers. The underlying group signature is customized to meet our objective and improve its efficiency. We also introduce a proof-of-concept implementation to demonstrate the protocol's feasibility. We compare its performance to SSL communication and demonstrate its practicality, and conclude that the protocol realizes secure, anonymous, and authenticated communication between users and service providers with practical performance.Comment: This is a preprint version of our paper presented in SAC'14, March 24-28, 2014, Gyeongju, Korea. ACMSAC 201

    Microdata protection through approximate microaggregation

    Get PDF
    Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online (AOL) search engine in August 2006. Many algorithms, methods and properties have been proposed to deal with microdata disclosure. One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect private individual information and is gaining increasing popularity. k-anonymity requires that every record in the microdata table released be indistinguishably related to no fewer than k respondents. In this paper, we apply the concept of entropy to propose a distance metric to evaluate the amount of mutual information among records in microdata, and propose a method of constructing dependency tree to find the key attributes, which we then use to process approximate microaggregation. Further, we adopt this new microaggregation technique to study kk-anonymity problem, and an efficient algorithm is developed. Experimental results show that the proposed microaggregation technique is efficient and effective in the terms of running time and information loss

    Anonymity In Cyberspace: Judicial and Legislative Regulations

    Get PDF
    Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but to what extent does it protect a right to anonymous online speech? This question is difficult because the government must balance the fundamental nature of speech rights with the potential dangers associated with anonymous online speech, including defamation, invasion of privacy, and intentional infliction of emotional distress. While lower courts have held that there is a right to anonymous online speech, they have not yet adopted a common standard. Meanwhile, to simplify the confusion and protect the rights of those who are injured by anonymous online speech, state legislatures are seeking to restrict some or all anonymous online-speech rights. This Note explores the history of speech regulation, with a special focus on the history of anonymous online speech, and the justifications for protecting speech rights. It then discusses the judicial standards under which courts require disclosure of anonymous speakers and the current legislative proposals to restrict speech rights. Next, this Note suggests that legislatures should not restrict speech rights, and should instead expand the remedies available to those injured by harmful speech. This Note also suggests that courts should adopt a summary judgment standard that requires plaintiffs to provide evidence demonstrating that the anonymous speaker has committed a tort before requiring the speaker to disclose his or her identity
    • …
    corecore