SlideShare a Scribd company logo
consenting to research

presentation to the Presidential Commission for the
             Study of Bioethical Issues

              San Francisco, CA USA
                    2/2/2012
“Privacy is about
     context, social
situations, and control.”
      - danah boyd
1. We are going to get our [genetic,
health] data, one way or another.
but we often lack agency to decide what is done
              with data about us…
(we are also going to talk about it)
in the future, anyone who wants a
copy of your genome will probably be
able to get it.
2. data
     > information
          > knowledge
              > wisdom
how do we ensure our data gets
turned into knowledge?
3. the infrastructure is just emerging.
“technology doesn’t support
    patient engagement”
my wish list

• Remove uncertainty, create incentives, training
• Safe harbor for IRB-approved experimentation
  with new models for consent (i.e. portable, fully
  identified, etc)
• Clear guidelines that harm lies in the act of
  reidentification, not act of distributing data with
  risk of reidentification (as long as done under safe
  harbor with consent)
• Matching grants for infrastructure (inarguable
  role for government)

More Related Content

Similar to Consenting to Research

Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
ARDC
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
todd271
 
10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking
Col Mukteshwar Prasad
 
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdfModule 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
saxenaavnish1
 
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
Dana Gardner
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Ted Myerson
 
RachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docxRachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docx
audeleypearl
 
Meyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 finalMeyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 final
Michelle N. Meyer
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversation
john st.
 
Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)
Andrea Boggio
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
IOSR Journals
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docx
charisellington63520
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
andygustafson
 
Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26kcheaney
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science Communication
Jennifer Briselli
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
Catherine D'Ignazio
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
Micah Altman
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 

Similar to Consenting to Research (20)

Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking10 cognitive biases that distorts your thinking
10 cognitive biases that distorts your thinking
 
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdfModule 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf
 
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
RachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docxRachelWhat supporting content does Dr. Koonjbearry provide.docx
RachelWhat supporting content does Dr. Koonjbearry provide.docx
 
Meyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 finalMeyer rsf summer workshop-6-12-17 final
Meyer rsf summer workshop-6-12-17 final
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversation
 
Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)Technological progress: blessing or curse? (2012)
Technological progress: blessing or curse? (2012)
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docx
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26Hit Conference Flyer 2012 6.26
Hit Conference Flyer 2012 6.26
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science Communication
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

More from john wilbanks

Generic Visual Consent Template
Generic Visual Consent TemplateGeneric Visual Consent Template
Generic Visual Consent Template
john wilbanks
 
Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017
john wilbanks
 
PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014
john wilbanks
 
mPower consent screenshots
mPower consent screenshotsmPower consent screenshots
mPower consent screenshots
john wilbanks
 
Informed Consent in the Mobile World
Informed Consent in the Mobile WorldInformed Consent in the Mobile World
Informed Consent in the Mobile World
john wilbanks
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overview
john wilbanks
 
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
john wilbanks
 
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
john wilbanks
 
Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0
john wilbanks
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consent
john wilbanks
 
Let's Pool Our Medical Data
Let's Pool Our Medical DataLet's Pool Our Medical Data
Let's Pool Our Medical Data
john wilbanks
 
Living well through data
Living well through data Living well through data
Living well through data
john wilbanks
 
PLC User Upload Wireframes v1
PLC User Upload Wireframes v1PLC User Upload Wireframes v1
PLC User Upload Wireframes v1
john wilbanks
 
Wireframe public oct 2011
Wireframe public oct 2011Wireframe public oct 2011
Wireframe public oct 2011
john wilbanks
 
Consent to research
Consent to research  Consent to research
Consent to research
john wilbanks
 
It's the Customer, Not the Container
It's the Customer, Not the ContainerIt's the Customer, Not the Container
It's the Customer, Not the Container
john wilbanks
 

More from john wilbanks (16)

Generic Visual Consent Template
Generic Visual Consent TemplateGeneric Visual Consent Template
Generic Visual Consent Template
 
Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017Sage Bionetworks consent overview - November 2017
Sage Bionetworks consent overview - November 2017
 
PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014PD app consent wireframe May 8 2014
PD app consent wireframe May 8 2014
 
mPower consent screenshots
mPower consent screenshotsmPower consent screenshots
mPower consent screenshots
 
Informed Consent in the Mobile World
Informed Consent in the Mobile WorldInformed Consent in the Mobile World
Informed Consent in the Mobile World
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overview
 
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
A New Model for Informed Consent - Participant Centered Consent - Broad Insti...
 
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...A New Model for Informed Consent: The Impact of Open Science on the Responsib...
A New Model for Informed Consent: The Impact of Open Science on the Responsib...
 
Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0Electronic Data Methods Forum - Portable Consent 2.0
Electronic Data Methods Forum - Portable Consent 2.0
 
Portable Informed Consent
Portable Informed ConsentPortable Informed Consent
Portable Informed Consent
 
Let's Pool Our Medical Data
Let's Pool Our Medical DataLet's Pool Our Medical Data
Let's Pool Our Medical Data
 
Living well through data
Living well through data Living well through data
Living well through data
 
PLC User Upload Wireframes v1
PLC User Upload Wireframes v1PLC User Upload Wireframes v1
PLC User Upload Wireframes v1
 
Wireframe public oct 2011
Wireframe public oct 2011Wireframe public oct 2011
Wireframe public oct 2011
 
Consent to research
Consent to research  Consent to research
Consent to research
 
It's the Customer, Not the Container
It's the Customer, Not the ContainerIt's the Customer, Not the Container
It's the Customer, Not the Container
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Consenting to Research

  • 1. consenting to research presentation to the Presidential Commission for the Study of Bioethical Issues San Francisco, CA USA 2/2/2012
  • 2. “Privacy is about context, social situations, and control.” - danah boyd
  • 3. 1. We are going to get our [genetic, health] data, one way or another.
  • 4. but we often lack agency to decide what is done with data about us…
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. (we are also going to talk about it)
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. in the future, anyone who wants a copy of your genome will probably be able to get it.
  • 17. 2. data > information > knowledge > wisdom
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. how do we ensure our data gets turned into knowledge?
  • 25.
  • 26. 3. the infrastructure is just emerging.
  • 27. “technology doesn’t support patient engagement”
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. my wish list • Remove uncertainty, create incentives, training • Safe harbor for IRB-approved experimentation with new models for consent (i.e. portable, fully identified, etc) • Clear guidelines that harm lies in the act of reidentification, not act of distributing data with risk of reidentification (as long as done under safe harbor with consent) • Matching grants for infrastructure (inarguable role for government)

Editor's Notes

  1. control over informationhuman dignityintimacyrestricted accessharm preventionexploitationdiscrimination