Removing anonymity protection and utilization review decisions: a real-world case under a single-payer health system
0
Citation
21
Reference
10
Related Paper
Abstract:
Abstract The effects of anonymity on utilization review has never been examined in the real world. This study aimed to evaluate the impact of removing anonymity protection for claims reviewers on their review decisions. Using a single-blinded repeated measures design, we randomly selected 1457 claims cases (with 12,237 orders) that had been anonymously reviewed and reimbursed in 2016 and had them re-reviewed in a signed review program in 2017 under the Taiwanese National Health Insurance scheme. The signed review policy significantly decreased the likelihood of a deduction decision at the case and the order level ( P < 0.001). Furthermore, signed reviewers tended to make more “too lenient” decisions, and were less likely to make “too harsh” decisions. Removing anonymity protection dramatically reduced the deduction rate and overturned the tendency of decisions from “too harsh” to “too lenient”. However, whether to maintain the anonymity of utilization reviews is a challenge for health authorities around the globe.Keywords:
Globe
Anonymity is less discussed in the IETF than for instance security
[RFC3552] or privacy [RFC6973]. This can be attributed to the fact
anonymity is a hard technical problem or that anonymizing user data is
not of specific market interest. It remains a fact that 'most
internet users would like to be anonymous online at least
occasionally' [Pew]. This document aims to break down the different
meanings and implications of anonymity on a mediated computer network.
Cite
Citations (0)
Popularity
Cite
Citations (3)
In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these "tie-based" anonymity services may be notably different than other social media services. We use semi-structured interviews to qualitatively examine motivations, practices and perceptions in two tie-based anonymity apps: Secret (now defunct, in the US) and Mimi (in China). Among the findings, we show that: (1) while users are more comfortable in self-disclosure, they still have specific practices and strategies to avoid or allow identification; (2) attempts for deidentification of others are prevalent and often elaborate; and (3) participants come to expect both negativity and support in response to posts. Our findings highlight unique opportunities and potential benefits for tie-based anonymity apps, including serving disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.
Negativity effect
Identification
Cite
Citations (19)
Anonymous channels guaranteeing anonymity of senders such as Tor are effective for whistle-blowing and other privacy sensitive scenarios. However, there is a risk of being abused for illegal activities. As a countermeasure to illegal activities using an anonymous channel, it is natural to construct an accountable anonymous channel which can revoke anonymity of senders when an unlawful message was sent out from them. In this paper, we point out that an accountable anonymous channel THEMIS does not provide anonymity in a perfect way and there is a possibility that attackers can identify senders even if messages are not malicious. Feasibility of tracing senders is analyzed by using simulation. Moreover, we give a simple remedy of the flaw in THEMIS.
Traceability
Countermeasure
Cite
Citations (1)
This paper examines some of the issues relating to the protection of privacy on-line, specifically whether anonymity is a necessary and proportionate response to the issues raised. The subject is considered in the light of the relationship between anonymity and privacy, the application of existing data protection law, current proposals and the possibility that increased anonymous use of the Internet and World Wide Web may, itself, create further regulatory challenges.
Privacy software
Privacy Protection
Cite
Citations (5)
This study was aimed at determining whether participating in an environmental
education programme (GLOBE) was positively reflected in participants'
environmental awareness, concern and level of environmentally responsible
behaviour. An ecologically homogeneous sample consisting of 22 Grade 8 GLOBE
participants and 24 non-GLOBE participants was selected. Pearson correlation
coefficients and t-tests were employed to compare the research groups. GLOBE
programme participants had stronger concerns and took more positive actions
toward the environment than those who did not participate in the GLOBE
programme. However, those participating in the GLOBE programme were not
more exposed to environmental information than respondents not taking part in
the GLOBE programme. Analyses of the GLOBE participants' responses in terms of
gender and place of residence yielded no significant differences. It is recommended
that specific attention to initial motivations for participation / non-participation in
the GLOBE programme be considered in follow-up investigations.
Globe
Sample (material)
Cite
Citations (0)
With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.
Bridge (graph theory)
Hacker
Cite
Citations (45)
I cannot help but notice few women subscribe to absolutist views of electronic privacy and anonymity. Can it be that only people who play life on the easiest setting find unrestricted privacy and anonymity a great idea?
Cite
Citations (0)
Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated definitions of privacy to social networking spaces, we should instead be discussing our right to anonymity. I argue that privacy is immaterial due to the fact that from the moment we log in and interact with a social media interface, we have shared some type of personal information with someone. Anonymity, on the other hand, is defined as the unlinkability of our many identifications. Thus, instead of attempting to define ideas such as “personal” and “private,” we should instead fight for the separation of selves, both at the social and institutional level.
Affordance
Cite
Citations (13)
List of plates Preface 1. The topographical glass 2. The printed panoramas 3. Looking at the Globe 4. Measuring the Globe 5. The plans of the Fortune and the Globe 6. Seating and capacity 7. The Globe and the sun Appendices Notes Index.
Globe
Cite
Citations (40)