People seeking health information about human papillomavirus via the internet have a very high level of anxiety

Sexual Health ◽  
2009 ◽  
Vol 6 (3) ◽  
pp. 258 ◽  
Author(s):  
Veronique Verhoeven ◽  
Marc Baay ◽  
Pieter Baay

A website with evidence-based information on human papillomavirus (HPV) has been developed at the University of Antwerp, Belgium. Visitors were asked to fill in a web-based form, including the State-Trait Anxiety Inventory (STAI), to obtain information on their profile. During the study period, 232 of 3638 (6.4%) visitors filled in the form. In our study, people looking for HPV information on the internet showed high anxiety levels. Three determinants contributed to the STAI score: a previous HPV-test, young age, and not feeling reassured by the website’s content. It is warranted that physicians counsel their patients on HPV-related issues in the context of cervical cancer screening.

2007 ◽  
Vol 15 (6) ◽  
pp. 1131-1137 ◽  
Author(s):  
Daniella Antunes Pousa Faria ◽  
Eulália Maria Chaves Maia

This study aimed to investigate, through a cross-sectional study, factors that influence anxiety levels and feelings of a nursing team who care for terminal patients with cancer. The sample consisted of 50 Nursing Assistants and Technicians from the Hospital reference on cancer care in Rio Grande do Norte, Brazil. Data were collected through the State-Trait Anxiety Inventory. Results showed that 69.8% of the professionals have medium anxiety levels and 30.2% have high levels of anxiety. The Number of Patients attended and "Working in another Institution" interfered in the anxiety levels. The most remarkable professionals' feelings were suffering and sadness, and Child was the most difficult age group to care for. Studies which develop support strategies to those health professionals are necessary to reduce and/or to prevent high anxiety and stress levels.


1970 ◽  
Vol 27 (2) ◽  
pp. 375-379 ◽  
Author(s):  
Wilma J. Knox ◽  
Ricardo Grippaldi

Upon entering a VA domiciliary Ss were given the State-Trait Anxiety Inventory (STAI) and WAIS subtests, Arithmetic ( A), Similarities ( S) and Digit Span ( DS). Two analyses of variance were carried out among WAIS weighted scores on the three subtests for three groups of different state or trait anxiety levels (high, medium, and low). Analyses showed significant interactions between WAIS scaled scores and anxiety: p < .05 for state anxiety and p < .001 for trait anxiety. The high-anxiety group in each instance showed the classical expectation of a lower A and DS in comparison to S; performance on DS was highest for each medium anxiety group. The study of curvilinear relationships and interaction effects in anxiety was discussed.


Author(s):  
Sabina Asensio-Cuesta ◽  
Adrián Bresó ◽  
Carlos Saez ◽  
Juan García-Gómez

Depression is associated with absenteeism and presentism, problems in workplace relationships and loss of productivity and quality. The present work describes the validation of a web-based system for the assessment of depression in the university work context. The basis of the system is the Spanish version of the Beck Depression Inventory (BDI-II). A total of 185 participants completed the BDI-II web-based assessment, including 88 males and 97 females, 70 faculty members and 115 staff members. A high level of internal consistency reliability was confirmed. Based on the results of our web-based BDI-II, no significant differences were found in depression severity between gender, age or workers’ groups. The main depression risk factors reported were: “Changes in sleep”, “Loss of energy”, “Tiredness or fatigue” and “Loss of interest”. However significant differences were found by gender in “Changes in appetite”, “Difficulty of concentration” and “Loss of interest in sex”; males expressed less loss of interest in sex than females with a statistically significant difference. Our results indicate that the data collected is coherent with previous BDI-II studies. We conclude that the web-based system based on the BDI-II is psychometrically robust and can be used to assess depression in the university working community.


2003 ◽  
Vol 28 (3) ◽  
pp. 221-230 ◽  
Author(s):  
Michael Macaulay

As increasing amounts of study materials migrate onto the Web, a future is now conceivable in which using the Web for studying will be the most common method of studying. However, there is the suggestion that using the Internet can evoke specific types of anxiety in novice adult students. This study investigated the effects of using the Web to study on the anxiety levels of students who have used the Web regularly for at least six months and considered themselves familiar with it. The subjective anxiety levels of two groups of 30 postgraduate students were recorded immediately before and after using either the Web or a non-Web-based medium for studying. The group that used the Web recorded significantly higher anxiety levels than those who did not. The implication of this finding and possible solutions are discussed.


10.29007/5945 ◽  
2019 ◽  
Author(s):  
Tarek Sobh ◽  
Awad Khalil

Nowadays, with the wide applications of distributed systems, web-based applications, and communications systems over the Internet for carrying data between users such as terminal client and computer/server or communications between different devices using a computer network, network security has become crucial requirement to ensure authentic received data during transmission. Authentication and encryption are basic procedures to ensure secure communications over a public network due to tamper-resistance and convenience in dealing with a password file. Most of the used protocols; HTTP, FTP, and SMTP of the Internet applications use text stream that is more and more vulnerable to attacks. Encryption represents the main security for the most computer applications.This work proposes enhanced secure actions for transferring data using FTP protocol by using a smart token. A smart token has the capabilities of the smart card, but more secured beside some interesting operations. A practical and secure user scheme, based on a smart token device, is proposed. A Secure Platform has been developed using implemented APIs and PKCS#11 as RSA standard interface. The proposed API is called SAFEST (Secure Actions for FTP Environment with Smart Token). SAFEST API wraps a standard protocol for implementing the communication between a token and the application using it. This API is a platform independent, scalable to support more functionality, optimizing token usage and adding more security for accessing token objects. The smart token can process the cryptographic key operations on its own rather than on the host computer, which supports high-level platform independence. In addition, through the proposed SAFEST API, standard interfacing to such token devices from any vendor can be implemented through using PKCS#11 interfaces, developed by RSA labs.


Mousaion ◽  
2020 ◽  
Vol 37 (4) ◽  
Author(s):  
Nafisa Rabiu ◽  
Adetola Kehinde ◽  
Halimah Odunayo Amuda ◽  
Kehinde Kadijat Kadiri

This study investigated the perceptions of undergraduate students at the University of Ilorin, Nigeria, of the usefulness and challenges associated with computer-based testing. The population for the study consisted of undergraduate students at the University of Ilorin. According to the data collected from the Directorate of Academic Planning at the University of Ilorin, Nigeria, the population of undergraduate students for the 2017/2018 academic session was 43 983. A simple random sampling technique was used to select the sample. A questionnaire was used as data collection instrument. The findings from the study showed that using a web-based assessment system contributed positively to the undergraduate students’ academic achievements while the majority of them preferred taking all their exams with the web-based assessment system. The findings further revealed that to the undergraduate students, CBT is an interesting technique in examinations and makes the taking of examinations easier. Also, there is high level of competence among undergraduate students with regard to possession of the required skills for CBT examinations. Delays in the commencement of the exams, power failures at the CBT centre and overcrowding are major challenges encountered by the students taking CBT examinations. One of the study recommendations was that the university management should endeavour to eliminate the delays in the commencement of tests by providing assessment timetables which should be strictly adhered to.


2013 ◽  
Vol 51 (3) ◽  
pp. 908-911

Explores Australia's early attainment, and then retention over a century and a half, of a very high level of economic prosperity, and examines more recent periods of prosperity. Discusses weaving analysis and narrative; what is to be explained, and how; origins—an economy built from scratch?; squatting, colonial autocracy, and imperial policies; becoming very rich; depression, drought, and federation; a succession of negative shocks; the Pacific War and the second golden age; shocks, policy shifts, and another long boom; and the shifting bases of prosperity. McLean is Visiting Research Fellow in Economics at the University of Adelaide.


2013 ◽  
Vol 8 (1) ◽  
pp. 23-31
Author(s):  
Loo Choo Hong ◽  
Tung Lai Cheng

The Internet opens a library of wealth to the student and educator but it also makes it easy for students to copy when writing assignments. In this paper, we will look at how Wawasan Open University implemented plagiarism-detection software in its course delivery. In 2010, the university introduced the compulsory usage of an online plagiarism-detection software known as Turnitin (Turnitin TM). Students are required to scan their assignments using the service before submitting them for grading. In this study, we observed two different course clusters; one cluster is numerically-based and the other is narrative-based. We observed the Similarity Index Report on student assignments from four courses in two programmes from the 2011 cohort. The courses are Business Accounting II, Auditing and Assurance in Malaysia, Human Resource Management, and Organisational Behaviour. Our findings suggested that plagiarism detection software can be useful for courses that require a studentto demonstrate a strong sense of originality in their assignments. Essentially, the software would provide additional advantages in any narrative management course where it is the intention of the instructor to ensure that students demonstrate a high level of creativity. However, courses that require students to conform to any regimen should not be subjected to the anti-plagiarism process as this is futile, as in the case of many numerical and mathematical courses. Courses that require a high level of verbatim citation such as law, assurance, literature and divinity would not work very well with the software. The inability of current software to differentiate between patterns and strings of plagiarism and cited work makes this exercise futile.


Author(s):  
Kalle Kangas ◽  
Jussi Puhakainen

Telecommunications are vital devices for researchers to exchange information between researchers located in different places around the globe. This kind of exchange can be regarded as external concerning individual institutions. But also internally there are people with matching interests. Why should they hold their seminars or meetings gathering in one place face-to-face at the pre-agreed point of time? This question has lately puzzled the academic community, and will still puzzle during the years to come. Further questions also arise: Will the Internet and WWW technology provide novel solutions? Does the new technology drastically change the dynamics of such group gatherings? The Internet must be seen more than a new medium. It is an infrastructure for commerce, a universal conduit of ideas, a parallel universe where people are exchanging information on an unprecedented scale (Schwartz 1997). Changes in the modes of communication are also emerging. We have at our disposal a powerful medium suited for one-to-one and many-to-many communications (Hoffman and Novak, 1996). On a practical level these developments can be seen in the speed of diffusion of this new technology. Finland, for instance, has turned out to be one of the densest Internet countries in the world. There are 500,000 daily and one million weekly Internet-users (Finland has a total population of 5.1 million). Thirty-six per cent of all the users classify as students, which is not surprising, since all universities in Finland have Internet connections and e-mail addresses available for student use (TOY Research 11/1998). The Internet is also by nature an open system. Thus, in practice for the first time, we now have at our disposal a tool that allows us easily to connect and work within the university as well as with other universities.


Author(s):  
Xunhua Wang ◽  
David Rine

Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, the Internet Engineering Task Force (IETF) has defined a DNS Security Extension (DNSSEC) to provide data-origin authentication. In this paper, we point out two drawbacks of the DNSSEC standard in its handling of DNS dynamic updates: 1) the on-line storage of a zone security key, creating a single point of attack for both inside and outside attackers, and 2) the violation of the role separation principle, which in the context of DNSSEC requires the separation of the roles of zone security managers from DNS name server administrators. To address these issues, we propose an alternative secure DNS architecture based on threshold cryptography. Unlike DNSSEC, this architecture adheres to the role separation principle without presenting any single point of attack. To show the feasibility of the proposed architecture, we developed a threshold cryptography toolkit based on the Java Cryptography Architecture (JCA) and built a proof-of-concept prototype with the toolkit. Our running results of the prototype on a representative platform show that the performance of our proposed architecture ranges from one to four times of DNSSEC’s performance. Thus, through small performance overhead, our proposed architecture could achieve very high level of security.


Sign in / Sign up

Export Citation Format

Share Document