41 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The professional component of this thesis focuses on how deinstitutionalisation and the current public mental health system have affected individuals with schizophrenia. Chapter one discusses the process of deinstitutionalisation and the research that has examined the impact of this initiative. Chapter two concentrates on schizophrenia, specifically the symptoms, course, etiological theories and treatments of this illness. Four case studies are then provided in order to explore how deinstitutionalisation and the current mental health system have affected individuals with schizophrenia. The names and identifying characteristics of these clients and their families have been modified to ensure anonymity. Chapter three describes a 47 year old woman, AA, who was referred for a neuro-psychological assessment. Chapter four outlines the second case study, a 23 year old male, BB, who was referred for a psychological assessment regarding diagnosis and treatment recommendations. Chapter five describes the third case study, a 54 year old woman, CC, who was referred for therapy and consultation regarding future treatment recommendations. Chapter six discusses the fourth case study, a 21 year old male, DD, who was seen for crisis intervention and treated in the community. Each of these case studies outlines the background history, formulation and treatment approaches. These case reports are used to illustrate how deinstitutionalisation and the present public mental health system affect individuals with schizophrenia. Chapter seven provides an overall discussion and conclusion to these case studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic networking ('computer-mediated communication1), considered to be ‘unique domain for educational activity’ (Harasim, 1989:50) and ‘new educational paradigm’ (Mason & Kaye, 1989:23), has been widely used and researched in K-12 schooling, place-based undergraduate subjects and distance education courses. However, only a limited number of reports of usage with experienced teachers (professional development), beginning teachers (induction support) and trainee teachers (initial training) have been published. Hence, little is known about the ways in which this new medium might contribute to the acquisition and maintenance of professional knowledge in the field of teacher education. The purpose of this study was to document an application of electronic networking in an initial 'school-based1 teacher education course. Three factors which were considered to be important in the adoption of electronic networking were specifically addressed: (a) the potential of the medium to attract and maintain a representative and comprehensive audience', (b) the willingness of participants to use the medium for the notation of ideas about teaching; and, (c) the extent to which reflection on practice was evident in network messages. This study also identified and investigated other effects which emerged as participants attempted to negotiate personal relationships with new technology. A case study was selected to investigate audience, notation, reflection, and other effects, in a particular application. Data were collected using participant observation, software-generated statistics, printed documentation, university records, questionnaires, interviews and content analysis of messages. These data were used to describe and analyse network participation by trainee teachers, classroom teachers and university staff. The data revealed that an audience did exist on the electronic network but that this was not comprehensive. Teachers had difficulty accessing the network because of other school commitments, access to equipment and personal competence with microcomputers. These difficulties indicated that developing and maintaining the teacher audience may be a major problem with electronic networking in initial teacher education. This case study revealed that deeply held concerns about notation of ideas by trainee teachers and classroom teachers can be powerful reasons for limited network participation. For trainee teachers, recording ideas publicly presented special difficulties associated with written communication. They were concerned about writing for an audience; about what to write about and how to write it. The loss of visual and verbal cues which form part of face-to-face communication was also a problem leading to concerns about how messages would be received by others. However, the overwhelming concern of almost all trainee teachers about presenting their own ideas was Tear of criticism' from peers (in particular), and other participants on the network. Trainee teachers expressed concerns about the 'dangers' of putting their thoughts in writing, the scrutiny their messages might have received from others, and the public 'criticism' about what they wrote which might have appeared on the network. Knowing that messages were stored on the network, and could be retrieved at some later date, heightened anxiety about the vulnerability of written communication; what was written on one occasion may have to be defended at some later date when the views expressed initially were no longer held. Classroom teachers were also unsure about recording their own ideas in an electronic form. Like trainee teachers, they were concerned about the scrutiny their contributions might receive from other users, and the lack of visual and verbal cues which they had learnt to use in face-to-face communication. Notating ideas in text-based messages which were archived (by the software), and retrievable by others later, was also daunting to many teachers. Another major 'danger' for teachers was the possible repercussions of 'public comment' about curriculum policy and initiatives which they thought might get them into 'trouble' with their employer. Since very few messages were contributed to conferences, there was little evidence of reflection in network communication. In the main, the network was not used to share information and ideas about curriculum and teaching. Public examples of collaboration between participants were not evident, and the 'special knowledge' held by members in each distinct group of users was not elaborated and discussed. Messages were not used to request information or clarification about issues, to outline the processes by which decisions about teaching were reached, or to synthesis ideas from different sources. The potential of the medium to operationalise reflective practice was not realised. Among the effects observed, the use of an anonymous account to access the network, and the impact this had on participation (in one conference) was considered to be a particularly significant finding. While the opportunity to systematically investigate the effects of anonymity on network participation and message contributions was not realised (by the author) while the research was in progress, the effects observed and discussed are considered to be important and worthy of further investigation. In this case study, the anonymous account helped trainee teachers mask concerns about personal writing skills and fear of criticism from others, indicating that anonymity may alter communication patterns, particularly in the early stages of network use. Given the data collected in this case study, and the interpretations placed on it by the author, a pessimistic assessment of the place of electronic networking in initial teacher education courses was presented. For this situation to change - that is, for electronic discussions to become more fully integrated into course activities - four issues which need to be addressed were identified and discussed. These included clarification of the role of collaboration amongst participants in initial teacher education, the ways in which collaboration can be facilitated using electronic networking, the problems of notation - such as the difficulty of expressing ideas about teaching in written form, and the concerns about permanently archived messages - for teachers and trainee teachers, and the lack of skills which many trainee teachers bring to electronic discussions. In the context of initial teacher education, it was suggested that these four aspects require clarification and development before the potential advantages of electronic networking can be realised. Some specific suggestions about how these issues might be resolved were presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early Childhood Educators have an important role to fulfil in aiding children's development and understandings in the science curriculum. There are many different views and opinions on how science can be taught in an Early Childhood environment, it is therefore our aim to investigate how teachers feel about teaching science concepts and promoting science in the early childhood centre. We aim to discover how everyday activities relate to the nature of science within our everyday lives. The science curriculum is important in Early Childhood settings as it provides children with various opportunities to explore the natural world. We are hoping to gain a deeper understanding of how teachers are guiding and encouraging children to make sense of their experiences. It is also important that we explore how Early Childhood Educators understand their own practice in teaching science concepts in their curriculum.

Description of project: We will be completing a small inquiry based task which will require us to compile data collected from interviews, recordings from teachers in long day and kindergarten settings around the Geelong region.

Methodology: ln order to undertake this research we will be using a socio cultural framework, focusing on language in the social environment and play (basing our ideas on the theories of Vygotsky). We will be undertaking narrative accounts to obtain data which will be collated from three different sources.

Ethical implications of projects: We do not foresee any significant risks to any participant in this study. The topic of the research is uncontroversial, and we will be taking measures to ensure anonymity or confidentiality where appropriate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymous web browsing is an emerging hot topic with many potential applications for privacy and security. However, research on low latency anonymous communication, such as web browsing, is quite limited; one reason is the intolerable delay caused by the current dominant dummy packet padding strategy, as a result, it is hard to satisfy perfect anonymity and limited delay at the same time for web browsing. In this paper, we extend our previous proposal on using prefetched web pages as cover traffic to obtain perfect anonymity for anonymous web browsing, we further explore different aspects in this direction. Based on Shannon’s perfect secrecy theory, we formally established a mathematical model for the problem, and defined a metric to measure the cost of achieving perfect anonymity. The experiments on a real world data set demonstrated that the proposed strategy can reduce delay more than ten times compared to the dummy packet padding methods, which confirmed the vast potentials of the proposed strategy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN where the victim locates. This new attack method is fundamentally different from existing attack methodologies. In general, web surfers browse the web following certain patterns, such as requesting a web page, viewing it and requesting another page. The browsing pattern of a victim can be clearly observed by a local adversary when the victim is viewing the web without protection. Unfortunately, browsing dynamics releases rich information for attacking even though the web page content is encrypted. In order to show how a local eavesdropper can decipher which pages have been viewed with the knowledge of user browsing dynamics and the public information of a given website, we established a specific hidden Markov model to represent browsing dynamics for the website. By using this model, we can then identify the optimal of the accessed pages using the Viterbi algorithm. In order to confirm the effectiveness of the revealed attack method, we have conducted extensive experiments on a real data set. The results demonstrated that the attack accuracy can be more than 80%. A few possible counter-attack strategies are discussed at the end of the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymous communication has become a hot research topic in order to meet the increasing demand for web privacy protection. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay and bandwidth waste, which inhibits its use for web browsing. In this paper, we propose a predicted packet padding strategy to replace the dummy packet padding method for anonymous web browsing systems. The proposed strategy mitigates delay and bandwidth waste significantly on average. We formulated the traffic analysis attack and defense problem, and defined a metric, cost coefficient of anonymization (CCA), to measure the performance of anonymization. We thoroughly analyzed the problem with the characteristics of web browsing and concluded that the proposed strategy is better than the current dummy packet padding strategy in theory. We have conducted extensive experiments on two real world data sets, and the results confirmed the advantage of the proposed method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the February 2011 report on its inquiry into the past and present practices of donor conception in Australia, the Australian Senate Legal and Constitutional Affairs References Committee called for the introduction of legislation to regulate donor conception in all jurisdictions that do not have it in place "as a matter of priority". It further called for the establishment, "as a matter of priority", of a national register of donors to enable donor-conceived individuals to access identifying information about their donor. The Senate Committee left open the question as to whether the legislation and central register should have retrospective effect. This article focuses upon that question. It shows that arguments concerning the privacy, confidentiality and anonymity of some donors who may wish to remain anonymous are outweighed by the manifest injustice faced by donor-conceived individuals who are denied access to such information, as well as their families and donors who wish to exchange this information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two Australian government inquiries have recently called for the release of information to donor-conceived people about their gamete donors. A national inquiry, recommended ‘as a matter of priority’ that uniform legislation to be passed nationwide. A state-based inquiry argued that all donor-conceived people should have access to information and called for the enactment of retrospective legislation that would override donor anonymity. This paper responds to an opinion piece published in Human Reproduction in October 2012 by Professor Pennings in which he criticized such recommendations and questioned the motives of people that advocate for information release. I answer the arguments of Pennings, and argue that all parties affected by donor conception should be considered, and a compromise reached. The contact veto system is one such compromise. I discuss the education and support services recommended by the Victorian government and question Pennings' assertions that legislation enabling information release will lead to a decrease in gamete donation. Finally, I rebut Pennings' assertion that there is a ‘hidden agenda’ behind the call for information release. There is no such agenda in my work. If there is from others, then it is their discriminatory views that need to be addressed, not the move toward openness and honesty or the call for information by donor-conceived people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use operations that such passive RFID tags are capable of. We provide a detailed security analysis to show that our schemes achieve strong privacy and satisfy the required security properties of tag anonymity, tag location privacy, forward secrecy, and forward untraceability. We also show that the schemes are resistant to replay (both passive and algebraic), desynchronization, and server impersonation attacks. Performance comparisons demonstrate that our schemes are practical and can be implemented on low-cost passive RFID tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the range of free services available in Australia, few family and friends of people with problem gambling access them. Over recent years, the Australian gambling help service system has expanded to include web-based counselling. Family and friends make up approximately 15% of people accessing this new modality, however little is known of the reasons for choosing this form of assistance over other interventions. This research aimed to understand the reasons family and friends choose to use single-session web-based counselling over other modes (i.e., face-to-face and telephone), as well as why they would recommend it to other affected people.

The study involved 63 participants (70% intimate partners, 13% children, 6% friends, 5% parents, 6% other family members) who completed openended questions on reasons for using and recommending web-based counselling, with over three-quarters of the sample seeking help for the first time.

A descriptive content analysis revealed multiple overlapping themes, including ease of access (41.3% of reasons for choosing), privacy and anonymity (17.5%), and a preference for the characteristics inherent in the therapeutic medium (23.8%). We also found webbased counselling provided a pathway into services (11.1%) and that the intervention provided was viewed as helpful and a reason for recommendation (34.9% of reasons for recommending).

This research provides important new information on the help seeking preferences of family and friends. Future research is required to understand the relationship between reasons for use, help-seeking preferences and the effectiveness of single-session web-based counselling for people affected by problem gambling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background:

For highly stigmatized disorders, such as problem gambling, Web-based counseling has the potential to address common barriers to treatment, including issues of shame and stigma. Despite the exponential growth in the uptake of immediate synchronous Web-based counseling (ie, provided without appointment), little is known about why people choose this service over other modes of treatment.
Objective:
The aim of the current study was to determine motivations for choosing and recommending Web-based counseling over telephone or face-to-face services.
Methods:
The study involved 233 Australian participants who had completed an online counseling session for problem gambling on the Gambling Help Online website between November 2010 and February 2012. Participants were all classified as problem gamblers, with a greater proportion of males (57.4%) and 60.4% younger than 40 years of age. Participants completed open-ended questions about their reasons for choosing online counseling over other modes (ie, face-to-face and telephone), as well as reasons for recommending the service to others.
Results:
A content analysis revealed 4 themes related to confidentiality/anonymity (reported by 27.0%), convenience/accessibility (50.9%), service system access (34.2%), and a preference for the therapeutic medium (26.6%). Few participants reported helpful professional support as a reason for accessing counseling online, but 43.2% of participants stated that this was a reason for recommending the service.Those older than 40 years were more likely than younger people in the sample to use Web-based counseling as an entry point into the service system (<italic>P</italic>=.045), whereas those engaged in nonstrategic gambling (eg, machine gambling) were more likely to access online counseling as an entry into the service system than those engaged in strategic gambling (ie, cards, sports; <italic>P</italic>=.01). Participants older than 40 years were more likely to recommend the service because of its potential for confidentiality and anonymity (<italic>P</italic>=.04), whereas those younger than 40 years were more likely to recommend the service due to it being helpful (<italic>P</italic>=.02).
Conclusions:
This study provides important information about why online counseling for gambling is attractive to people with problem gambling, thereby informing the development of targeted online programs, campaigns, and promotional material.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article reflects on a university human research ethics committee’s unease regarding a feminist visual pilot study within the field of education. The small exploratory study proposed to explore a migrant mother’s production of her son’s identity through her family photograph collection. The committee requested substantial changes to the research design which centred primarily on their concerns regarding risk of harm to pre-existing relationships, and also issues of anonymity and consent. I consider the combined liberal individualist, utilitarian and positivist biomedical basis for the ethics committee’s discomfort with the proposed research which was to involve members of my family. I draw on my experience of the review process to critique the human research ethics committee paradigm which constructs the ideal researcher as an objective and disinterested observer, hinges on a weighing of risks and benefits, and considers humans to be independent and equal. I demonstrate how the blanket application of these values acts to problematise some kinds of research, and how these values can be inappropriate, incompatible and even destructive when applied to research proposals that are exploratory, visual, and/or involve the researcher’s family members as participants.