Consenting to Research
Upcoming SlideShare
Loading in...5
×
 

Consenting to Research

on

  • 1,336 views

My presentation to the US Presidential Commission for the Study of Bioethical Issues, 2/2/2012.

My presentation to the US Presidential Commission for the Study of Bioethical Issues, 2/2/2012.

Statistics

Views

Total Views
1,336
Views on SlideShare
1,324
Embed Views
12

Actions

Likes
1
Downloads
3
Comments
0

3 Embeds 12

http://a0.twimg.com 10
http://us-w1.rockmelt.com 1
https://twitter.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-ShareAlike LicenseCC Attribution-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • control over informationhuman dignityintimacyrestricted accessharm preventionexploitationdiscrimination

Consenting to Research Consenting to Research Presentation Transcript

  • consenting to researchpresentation to the Presidential Commission for the Study of Bioethical Issues San Francisco, CA USA 2/2/2012
  • “Privacy is about context, socialsituations, and control.” - danah boyd
  • 1. We are going to get our [genetic,health] data, one way or another.
  • but we often lack agency to decide what is done with data about us…
  • (we are also going to talk about it)
  • in the future, anyone who wants acopy of your genome will probably beable to get it.
  • 2. data > information > knowledge > wisdom
  • how do we ensure our data getsturned into knowledge?
  • 3. the infrastructure is just emerging.
  • “technology doesn’t support patient engagement”
  • my wish list• Remove uncertainty, create incentives, training• Safe harbor for IRB-approved experimentation with new models for consent (i.e. portable, fully identified, etc)• Clear guidelines that harm lies in the act of reidentification, not act of distributing data with risk of reidentification (as long as done under safe harbor with consent)• Matching grants for infrastructure (inarguable role for government)