Recent highly publicized privacy breaches in healthcare and genomics research have led many to question whether current standards of data protection are adequate. Improvements in de-identification techniques, combined with pervasive data sharing, have increased the likelihood that external parties can track individuals across multiple databases. This article focuses on the communication of identifiability risks in the process of obtaining consent for donation and research. Most ethical discussions of identifiability risks have focused on the severity of the risk and how it might be mitigated, and what precisely is at stake in pervasive data sharing. However, there has been little discussion of whether and how to communicate the risk to potential donors. We review the ethical arguments behind favoring different types of risk communication in the consent process, and outline how identifiability concerns can be incorporated into either a detailed or a simplified method of communicating risks during the consent process.

Download full-text PDF

Source
http://dx.doi.org/10.1017/S0963180117000457DOI Listing

Publication Analysis

Top Keywords

identifiability risks
12
pervasive data
8
data sharing
8
consent process
8
communicating identifiability
4
risks
4
risks biobank
4
biobank donors
4
donors highly
4
highly publicized
4

Similar Publications

Introduction: We evaluated short versions of a 16-item odor identification (OID) test, with regard to their ability to identify individuals at high dementia risk.

Methods: Participants from the population-based SNAC-K study ( = 2418) were followed across 12 years. We formed 13 abbreviated clusters based on the identifiability and perceptual characteristics of the Sniffin' Sticks Test (SST) items, and pre-existing test versions.

View Article and Find Full Text PDF

Multivariate Mendelian randomization (MVMR) is a statistical technique that uses sets of genetic instruments to estimate the direct causal effects of multiple exposures on an outcome of interest. At genomic loci with pleiotropic gene regulatory effects, that is, loci where the same genetic variants are associated to multiple nearby genes, MVMR can potentially be used to predict candidate causal genes. However, consensus in the field dictates that the genetic instruments in MVMR must be independent (not in linkage disequilibrium), which is usually not possible when considering a group of candidate genes from the same locus.

View Article and Find Full Text PDF

An Efficient Certificateless Anonymous Signcryption Scheme for WBAN.

Sensors (Basel)

July 2024

Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, School of Mathematical Sciences, Guizhou Normal University, Gui'an New District, Guiyang 550025, China.

A Wireless Body Area Network (WBAN), introduced into the healthcare sector to improve patient care and enhance the efficiency of medical services, also brings the risk of the leakage of patients' privacy. Therefore, maintaining the communication security of patients' data has never been more important. However, WBAN faces issues such as open medium channels, resource constraints, and lack of infrastructure, which makes the task of designing a secure and economical communication scheme suitable for WBAN particularly challenging.

View Article and Find Full Text PDF
Article Synopsis
  • The study focuses on developing new nomograms to predict the overall survival (OS) and cancer-specific survival (CSS) of colorectal cancer patients with unresectable liver metastasis after primary surgery, utilizing data from the SEER database.
  • Using Cox regression, the research identified key prognostic factors, such as age, chemotherapy, and tumor characteristics, which significantly influence patient outcomes.
  • The nomograms were found to offer better accuracy and predictive power compared to the traditional TNM classification, as demonstrated by various analytical methods including the C-index, ROC curves, and calibration curves, with validation confirming their effectiveness.
View Article and Find Full Text PDF

In competing risks data, in practice, there may be lack of information or uncertainty about the true failure type, termed as 'missing failure type', for some subjects. We consider a general pattern of missing failure type in which we observe, if not the true failure type, a set of possible failure types containing the true one. In this work, we focus on both parametric and non-parametric estimation based on current status data with two competing risks and the above-mentioned missing failure type.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!