logo
    Removing anonymity protection and utilization review decisions: a real-world case under a single-payer health system
    0
    Citation
    21
    Reference
    10
    Related Paper
    Abstract:
    Abstract The effects of anonymity on utilization review has never been examined in the real world. This study aimed to evaluate the impact of removing anonymity protection for claims reviewers on their review decisions. Using a single-blinded repeated measures design, we randomly selected 1457 claims cases (with 12,237 orders) that had been anonymously reviewed and reimbursed in 2016 and had them re-reviewed in a signed review program in 2017 under the Taiwanese National Health Insurance scheme. The signed review policy significantly decreased the likelihood of a deduction decision at the case and the order level ( P < 0.001). Furthermore, signed reviewers tended to make more “too lenient” decisions, and were less likely to make “too harsh” decisions. Removing anonymity protection dramatically reduced the deduction rate and overturned the tendency of decisions from “too harsh” to “too lenient”. However, whether to maintain the anonymity of utilization reviews is a challenge for health authorities around the globe.
    Keywords:
    Globe
    Anonymity is less discussed in the IETF than for instance security [RFC3552] or privacy [RFC6973]. This can be attributed to the fact anonymity is a hard technical problem or that anonymizing user data is not of specific market interest. It remains a fact that 'most internet users would like to be anonymous online at least occasionally' [Pew]. This document aims to break down the different meanings and implications of anonymity on a mediated computer network.
    Citations (0)
    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these "tie-based" anonymity services may be notably different than other social media services. We use semi-structured interviews to qualitatively examine motivations, practices and perceptions in two tie-based anonymity apps: Secret (now defunct, in the US) and Mimi (in China). Among the findings, we show that: (1) while users are more comfortable in self-disclosure, they still have specific practices and strategies to avoid or allow identification; (2) attempts for deidentification of others are prevalent and often elaborate; and (3) participants come to expect both negativity and support in response to posts. Our findings highlight unique opportunities and potential benefits for tie-based anonymity apps, including serving disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.
    Negativity effect
    Identification
    Citations (19)
    Anonymous channels guaranteeing anonymity of senders such as Tor are effective for whistle-blowing and other privacy sensitive scenarios. However, there is a risk of being abused for illegal activities. As a countermeasure to illegal activities using an anonymous channel, it is natural to construct an accountable anonymous channel which can revoke anonymity of senders when an unlawful message was sent out from them. In this paper, we point out that an accountable anonymous channel THEMIS does not provide anonymity in a perfect way and there is a possibility that attackers can identify senders even if messages are not malicious. Feasibility of tracing senders is analyzed by using simulation. Moreover, we give a simple remedy of the flaw in THEMIS.
    Traceability
    Countermeasure
    Citations (1)
    This paper examines some of the issues relating to the protection of privacy on-line, specifically whether anonymity is a necessary and proportionate response to the issues raised. The subject is considered in the light of the relationship between anonymity and privacy, the application of existing data protection law, current proposals and the possibility that increased anonymous use of the Internet and World Wide Web may, itself, create further regulatory challenges.
    Privacy software
    Privacy Protection
    Citations (5)
    This study was aimed at determining whether participating in an environmental education programme (GLOBE) was positively reflected in participants' environmental awareness, concern and level of environmentally responsible behaviour. An ecologically homogeneous sample consisting of 22 Grade 8 GLOBE participants and 24 non-GLOBE participants was selected. Pearson correlation coefficients and t-tests were employed to compare the research groups. GLOBE programme participants had stronger concerns and took more positive actions toward the environment than those who did not participate in the GLOBE programme. However, those participating in the GLOBE programme were not more exposed to environmental information than respondents not taking part in the GLOBE programme. Analyses of the GLOBE participants' responses in terms of gender and place of residence yielded no significant differences. It is recommended that specific attention to initial motivations for participation / non-participation in the GLOBE programme be considered in follow-up investigations.
    Globe
    Sample (material)
    Citations (0)
    With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.
    Bridge (graph theory)
    Hacker
    Citations (45)
    I cannot help but notice few women subscribe to absolutist views of electronic privacy and anonymity. Can it be that only people who play life on the easiest setting find unrestricted privacy and anonymity a great idea?
    Citations (0)
    Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated definitions of privacy to social networking spaces, we should instead be discussing our right to anonymity. I argue that privacy is immaterial due to the fact that from the moment we log in and interact with a social media interface, we have shared some type of personal information with someone. Anonymity, on the other hand, is defined as the unlinkability of our many identifications. Thus, instead of attempting to define ideas such as “personal” and “private,” we should instead fight for the separation of selves, both at the social and institutional level.
    Affordance
    Citations (13)
    List of plates Preface 1. The topographical glass 2. The printed panoramas 3. Looking at the Globe 4. Measuring the Globe 5. The plans of the Fortune and the Globe 6. Seating and capacity 7. The Globe and the sun Appendices Notes Index.
    Globe
    Citations (40)