• Title/Summary/Keyword: Sensitive issue

Search Result 230, Processing Time 0.021 seconds

Helping Health Care Providers Recognize and Respond to Sensitive Issues

  • Choi, Hee-Seung;Mayahara, Masako;Rasamimari, Amnuayporn;Norr, Kathleen F.
    • Perspectives in Nursing Science
    • /
    • v.8 no.2
    • /
    • pp.121-128
    • /
    • 2011
  • Sensitive issues are both common and problematic for health care providers because sensitive issues may interfere with the future provider-client relationship and effective care. Most current training for providers focuses on a particular issue, but this is inadequate because many issues may be sensitive, and which issues will be sensitive is unpredictable. We argue that issues become sensitive when they activate one or more of three common triggers, fear, stigma, and taboo. A cycle of negative internal and interpersonal responses to the sensitive issue often leads to unresolved health issues for clients and stress and feelings of inadequacy for providers. We recommend integrated pre-service and in-service skill building to help individual health care providers respond appropriately to a wide variety of sensitive issues. We also identify specific policies and procedures to strengthen organizational support for caregivers so that providers can address these sensitive issues effectively with their clients.

  • PDF

Semantics of Focus

  • Yoon, Young-Eun
    • Language and Information
    • /
    • v.1
    • /
    • pp.137-179
    • /
    • 1997
  • This paper discusses several basic issues of the 'focus' phenomenon. One of them is the issue of the nature of focus, i.e., what constituent of the sentences gets focused. Another is the issue of to what aspect of meaning the focus contributes. The other is the issue of the functions of focus-sensitive operators. As for the first issue, it is observed that the basic function of focus is to mark all and only the new information of the sentence. But for the cases in which this principle is not observed, it is proposed that the focus in these cases in general plays a secondary function of triggering an additional emphatic scalar meaning. And yet, in these cases, the state of the matter is different between free focus and bound focus. It is also shown that contrary to the general belief that free focus contributes to the meaning semantically. Concerning focus-sensitive operators, we classify them into two groups, i.e., quantificational and scalar operators, and try to formalize their meaning in the framework of Pulman's(1997) 'higher order unification theory'.

  • PDF

Assessment for Efficiency of Two-Stage Randomized Response Technique

  • Park, Kyung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.2
    • /
    • pp.427-433
    • /
    • 2000
  • In this paper, we review several two-stage randomized response techniques for gathering self-report data when persons are asked sensitive question. Also efficiencies and privacy protections based on the two-stage randomized response procedures are compared. Finally, we find optimal parameter conditions.

  • PDF

Hiding Sensitive Frequent Itemsets by a Border-Based Approach

  • Sun, Xingzhi;Yu, Philip S.
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.1
    • /
    • pp.74-94
    • /
    • 2007
  • Nowadays, sharing data among organizations is often required during the business collaboration. Data mining technology has enabled efficient extraction of knowledge from large databases. This, however, increases risks of disclosing the sensitive knowledge when the database is released to other parties. To address this privacy issue, one may sanitize the original database so that the sensitive knowledge is hidden. The challenge is to minimize the side effect on the quality of the sanitized database so that non-sensitive knowledge can still be mined. In this paper, we study such a problem in the context of hiding sensitive frequent itemsets by judiciously modifying the transactions in the database. Unlike previous work, we consider the quality of the sanitized database especially on preserving the non-sensitive frequent itemsets. To preserve the non-sensitive frequent itemsets, we propose a border-based approach to efficiently evaluate the impact of any modification to the database during the hiding process. The quality of database can be well maintained by greedily selecting the modifications with minimal side effect. Experiments results are also reported to show the effectiveness of the proposed approach.

Filtered Randomized Response Technique

  • Choi, Kyoung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.13 no.2
    • /
    • pp.319-326
    • /
    • 2006
  • Randomized response technique is a survey technique for eliminating evasive answer bias. This technique is popular in social survey for sensitive issues. In this paper we present a simple and obvious procedure for estimating the population proportion of a sensitive group. Here, we shows the weak point in the method of Kim and Warde (2005). Also, it is found that the proposed procedure is more efficient than the ones of Warner (1965) and Kim and Warde (2005). Lastly we discuss the conditions that the suggested method will be more efficienct.

Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment

  • Lim, Jong-Hyun;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.43-49
    • /
    • 2019
  • Today, with the development of the internet of things, wearable devices related to personal health care have become widespread. Various global information and communication technology companies are developing various wearable health devices, which can collect personal health information such as heart rate, steps, and calories, using sensors built into the device. However, since individual health data includes sensitive information, the collection of irrelevant health data can lead to personal privacy issue. Therefore, there is a growing need to develop technology for collecting sensitive health data from wearable health devices, while preserving privacy. In recent years, local differential privacy (LDP), which enables sensitive data collection while preserving privacy, has attracted much attention. In this paper, we develop a technology for collecting vast amount of health data from a smartwatch device, which is one of popular wearable health devices, using local difference privacy. Experiment results with real data show that the proposed method is able to effectively collect sensitive health data from smartwatch users, while preserving privacy.

A Study on the Variation of Physical Properties of the PET Filament Yarn for Sensitive Clothes (감성 의류용 PET 사의 물성 변화에 관한 연구)

  • 김승진;홍성대;서봉기;심승범
    • Science of Emotion and Sensibility
    • /
    • v.5 no.3
    • /
    • pp.61-66
    • /
    • 2002
  • Recently PET fabrics woven by high sensitive PET yams were used as a high sensitive clothing. Such high sensitive PET woven fabrics for clothing are passing through various processes, and are influenced by processing tension and heat, it makes the physical properties of PET yarns changing and makes the defects of PET fabric. Therefore many difficulties are faced to decide processing conditions for making high sensitive PET fabric. But few research related to the processing conditions of PET yarns and issue point for producing high sensitive clothing was only performed. In this study, POY and SDY of PET manufactured in seven filament manufacturing companies are selected, and their physical properties in each layers of filament cake divided by 50000m are measured and analyzed. Especially, wet and dry shrinkages according to the various wet and dry heat temperatures are analyzed for supplying basic physical data of PET yam and for enhancing PET yarn quality used for the high sensitive clothing.

  • PDF

AN ADROIT UNRELATED QUESTION RANDOMIZED RESPONSE MODEL WITH SUNDRY STRATEGIES

  • TANVEER AHMAD TARRAY;ZAHOOR AHMAD GANIE
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.6
    • /
    • pp.1377-1391
    • /
    • 2023
  • When sensitive topics such as gambling habits, drug addiction, alcoholism, tax evasion tendencies, induced abortions, drunk driving, past criminal involvement, and homosexuality are the focus of open or direct surveys, it becomes challenging to obtain accurate information due to nonresponse bias and response bias. People often hesitate to provide truthful answers. Warner introduced an ingenious method to address this issue. In this study, a new and unrelated randomized response model is proposed to eliminate misleading responses and nonresponses caused by the stigma associated with the attribute being investigated. The proposed randomized response model allows for the estimation of the population percentage with the sensitive characteristic in an unbiased manner. The characteristics and recommendations of the proposed randomized response model are examined, and numerical examples are provided to support the findings of this study.

A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing (API 콜 시퀀스와 Locality Sensitive Hashing을 이용한 악성코드 클러스터링 기법에 관한 연구)

  • Goh, Dong Woo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.91-101
    • /
    • 2017
  • API call sequence analysis is a kind of analysis using API call information extracted in target program. Compared to other techniques, this is advantageous as it can characterize the behavior of the target. However, existing API call sequence analysis has an issue of identifying same characteristics to different function during the analysis. To resolve the identification issue and improve performance of analysis, this study includes the method of API abstraction technique in addition to existing analysis. From there on, similarity between target programs is computed and clustered into similar types by applying LSH to abstracted API call sequence from analyzed target. Thus, this study can attribute in improving the accuracy of the malware analysis based on discovered information on the types of malware identified.

Classification of Human Papillomavirus (HPV) Risk Type via Text Mining

  • Park, Seong-Bae;Hwang, Sohyun;Zhang, Byoung-Tak
    • Genomics & Informatics
    • /
    • v.1 no.2
    • /
    • pp.80-86
    • /
    • 2003
  • Human Papillomavirus (HPV) infection is known as the main factor for cervical cancer which is a leading cause of cancer deaths in women worldwide. Because there are more than 100 types in HPV, it is critical to discriminate the HPVs related with cervical cancer from those not related with it. In this paper, the risk type of HPVs using their textual explanation. The important issue in this problem is to distinguish false negatives from false positives. That is, we must find high-risk HPVs as many as possible though we may miss some low-risk HPVs. For this purpose, the AdaCost, a cost-sensitive learner is adopted to consider different costs between training examples. The experimental results on the HPV sequence database show that the consideration of costs gives higher performance. The improvement in F-score is higher than that of the accuracy, which implies that the number of high-risk HPVs found is increased.