This presentation was provided by John Wilbanks of Sage Bionetworks, during the NISO Symposium, Privacy Implications of Research Data held on September 11, 2016 in conjunction with International Data Week in Denver, Colorado
This presentation was provided by Dr. Micah Altman of MIT during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016 in conjunction with the International Data Week events in Denver, Colorado.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Reproducibility from an infomatics perspectiveMicah Altman
Scientific reproducibility is most viewed through a methodological or statistical lens, and increasingly, through a computational lens. Over the last several years, I've taken part in collaborations to that approach reproducibility from the perspective of informatics: as a flow of information across a lifecycle that spans collection, analysis, publication, and reuse.
These slides sketch of this approach, and were presented at a recent workshop on reproducibility at the National Academy of Sciences, and at one our Program on Information Science brown bag talks. See: informatics.mit.edu
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Comments to FTC on Mobile Data PrivacyMicah Altman
FTC has been hosting a series of seminars on consumer privacy, on which it has requested comments. The most recent seminar explored privacy issues related to mobile device tracking. As the seminar summary points out ...
In most cases, this tracking is invisible to consumers and occurs with no consumer interaction. As a result, the use of these technologies raises a number of potential privacy concerns and questions.
The presentations raised an interesting and important combination of questions about how to promote business and economic innovation while protecting individual privacy. I have submitted a comment on these changes with some proposed recommendations.
To summarize (quoting from the submitted the comment):
Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. ... [Furthermore], since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
Prof George Alter, UMich, ICPSR, presenting at the Managing and publishing sensitive data in the Social Sciences webinar on 29/3/17.
FULL webinar recording: https://youtu.be/7wxfeHNfKiQ
Webinar description:
2) Prof George Alter, (Research Professor, ICPSR and Visiting Professor, ANU) George will share the benefit of over 50 years of experience in managing sensitive social science data in the ICPSR: https://www.icpsr.umich.edu/icpsrweb/
More about ICPSR: -- ICPSR (USA) maintains a data archive of more than 250,000 files of research in the social and behavioral sciences. It hosts 21 specialized collections of data in education, aging, criminal justice, substance abuse, terrorism, and other fields. -- ICPSR collaborates with a number of funders, including U.S. statistical agencies and foundations, to create thematic collections: see https://www.icpsr.umich.edu/icpsrweb/content/about/thematic-collections.html
Managing sensitive data at the Australian Data ArchiveARDC
Dr Steven McEachern, Director, Australian Data Archive, presenting at the Managing and publishing sensitive data in the Social Sciences webinar on 29/3/17
FULL webinar recording: https://youtu.be/7wxfeHNfKiQ
Webinar description:
1) Dr Steve McEachern (Director, Aust Data Archive) Stevediscussed how the Australian Data Archive manages and publishes sensitive social science data.
More about ADA: -- The Australian Data Archive (ADA) provides a national service for the collection and preservation of digital research data and to make these data available for secondary analysis by academic researchers and other users. -- The ADA is comprised of seven sub-archives - Social Science, HIstorical, Indigenous, Longitudinal, Qualitative, Crime & Justice and International. -- ADA data is free of charge to all users -- The archive is managed by the ADA central office based in the ANU Centre for Social Research and Methods at the Australian National University (ANU).https://www.ada.edu.au/
This presentation was provided by Dr. Micah Altman of MIT during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016 in conjunction with the International Data Week events in Denver, Colorado.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Reproducibility from an infomatics perspectiveMicah Altman
Scientific reproducibility is most viewed through a methodological or statistical lens, and increasingly, through a computational lens. Over the last several years, I've taken part in collaborations to that approach reproducibility from the perspective of informatics: as a flow of information across a lifecycle that spans collection, analysis, publication, and reuse.
These slides sketch of this approach, and were presented at a recent workshop on reproducibility at the National Academy of Sciences, and at one our Program on Information Science brown bag talks. See: informatics.mit.edu
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Comments to FTC on Mobile Data PrivacyMicah Altman
FTC has been hosting a series of seminars on consumer privacy, on which it has requested comments. The most recent seminar explored privacy issues related to mobile device tracking. As the seminar summary points out ...
In most cases, this tracking is invisible to consumers and occurs with no consumer interaction. As a result, the use of these technologies raises a number of potential privacy concerns and questions.
The presentations raised an interesting and important combination of questions about how to promote business and economic innovation while protecting individual privacy. I have submitted a comment on these changes with some proposed recommendations.
To summarize (quoting from the submitted the comment):
Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. ... [Furthermore], since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
Prof George Alter, UMich, ICPSR, presenting at the Managing and publishing sensitive data in the Social Sciences webinar on 29/3/17.
FULL webinar recording: https://youtu.be/7wxfeHNfKiQ
Webinar description:
2) Prof George Alter, (Research Professor, ICPSR and Visiting Professor, ANU) George will share the benefit of over 50 years of experience in managing sensitive social science data in the ICPSR: https://www.icpsr.umich.edu/icpsrweb/
More about ICPSR: -- ICPSR (USA) maintains a data archive of more than 250,000 files of research in the social and behavioral sciences. It hosts 21 specialized collections of data in education, aging, criminal justice, substance abuse, terrorism, and other fields. -- ICPSR collaborates with a number of funders, including U.S. statistical agencies and foundations, to create thematic collections: see https://www.icpsr.umich.edu/icpsrweb/content/about/thematic-collections.html
Managing sensitive data at the Australian Data ArchiveARDC
Dr Steven McEachern, Director, Australian Data Archive, presenting at the Managing and publishing sensitive data in the Social Sciences webinar on 29/3/17
FULL webinar recording: https://youtu.be/7wxfeHNfKiQ
Webinar description:
1) Dr Steve McEachern (Director, Aust Data Archive) Stevediscussed how the Australian Data Archive manages and publishes sensitive social science data.
More about ADA: -- The Australian Data Archive (ADA) provides a national service for the collection and preservation of digital research data and to make these data available for secondary analysis by academic researchers and other users. -- The ADA is comprised of seven sub-archives - Social Science, HIstorical, Indigenous, Longitudinal, Qualitative, Crime & Justice and International. -- ADA data is free of charge to all users -- The archive is managed by the ADA central office based in the ANU Centre for Social Research and Methods at the Australian National University (ANU).https://www.ada.edu.au/
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...Micah Altman
Ophir Frieder, who holds the Robert L. McDevitt, K.S.G., K.C.H.S. and Catherine H. McDevitt L.C.H.S. Chair in Computer Science and Information Processing at Georgetown University, gave this talk on Searching in Harsh Environments as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Ophir rebuts the myth that "google has solved search", and discusses the challenges of searching for complex object, through hidden collections, and in harsh environments For more see: http://informatics.mit.edu/blg
"Reproducibility from the Informatics Perspective"Micah Altman
Dr. Altman will provide expert comment on the need for informatics modeling as part of the National Academies workshop: Statistical Challenges in Assessing and Fostering the Reproducibility of Scientific Results
This workshop focuses on the topic of addressing statistical challenges in assessing and fostering the reproducibility of scientific results by examining three issues from a statistical perspective: the extent of reproducibility, the causes of reproducibility failures, and potential remedies.
Thinking about Open Science practices, data sharing and lifetime, and communication from Climate Scientists. Slides based on a presentation given at the Lunchtime talk sessions from the MetOS Section, Department of Geosciences, University of Oslo, November 12th 2015.
Space Situational Awareness Forum
Following another very successful conference in London in November 2014, Space Situational Awareness 2015 took place in Hyattsville, Maryland in May 2015, with over 60 SSA experts from all over the globe coming together to discuss the most pressing SSA challenges.
With increasing dependence on space-based services, the ability to protect space infrastructure has become essential to our society. Any shutdown of even a part of space infrastructures could have significant consequences for the well-functioning of economic activities and our citizens’ safety, and would impair the provision of emergency services.
However, space infrastructures are increasingly threatened by the risk of collision between spacecraft and more importantly, between spacecraft and space debris. As a matter of fact, space debris has become the most serious threat to the sustainability of certain space activities.
In order to mitigate the risk of collision it is necessary to identify and monitor satellites and space debris, catalogue their positions, and track their movements (trajectory) when a potential risk of collision has been identified, so that satellite operators can be alerted to move their satellites. This activity is known as space surveillance and tracking (SST), and is today mostly based on ground-based sensors such as telescopes and radars.
With a focus on solving the political issues but not ignoring the technical, Space Situational Awareness 2015 the leading gathering of dedicated SSA experts from the USA, Europe and beyond, to discuss and debate the business, political and technical challenges that lie ahead.
Take a look at our previous Space Situation Awareness event…
Who should attend Space Situational Awareness?
Space Situational Awareness 2015 is a community of experts from Government, Space Agencies, Satellite/Spacecraft Operators, Space Lawyers, Space Insurance providers and Defense who are looking to understand and predict the physical location of natural and manmade objects in orbit around the Earth, with the objective of avoiding collisions.
How can you get involved in Space Situational Awareness?
If you feel that you could add to the debate and discussion at Space Situational Awareness, we’d be delighted to hear from you. Please drop us a line on +44(0)7769157787 or email me at adam.plom@coriniumintelligence.com.
Abstract: http://j.mp/1MhWWei
Healthcare applications now have the ability to exploit big data in all its complexity. A crucial challenge is to achieve interoperability or integration so that a variety of content from diverse physical (IoT)- cyber (web-based)- and social sources, with diverse formats and modality (text, image, video), can be used in analysis, insight, and decision-making. At Kno.e.sis, an Ohio Center of Excellence in BioHealth Innovation, we have a variety of large, collaborative healthcare/clinical/biomedical projects, all involving domain experts and end-users, and access to real world data that include: clinical/EMR data (of individual patients and that related to public health), data from a variety of sensors (IoT) on and around patients measuring real-time physiological and environmental observations), social data (Twitter, Web forums, PatientsLikeMe), Web search logs, etc. Key projects include: Prescription drug abuse online-surveillance and epidemiology (PREDOSE), Social media analysis to monitor cannabis and synthetic cannabinoid use (eDrugTrends), Modeling Social Behavior for Healthcare Utilization in Depression, Medical Information Decision Assistant and Support (MIDAS) with application to musculoskeletal issues, kHealth: A Semantic Approach to Proactive, Personalized Asthma Management Using Multimodal Sensing (also for Dementia), and Cardiology Semantic Analysis System (with applications to Computer Assisted Coding and Computerized Document Improvement).
This talk will review how ontologies or knowledge graphs play a central role in supporting semantic filtering, interoperability and integration (including the issues such as disambiguation), reasoning and decision-making in all our health-centric research and applications. Additional relevant information is at the speaker’s HCLS page. http://knoesis.org/amit/hcls
A presentation to the New Year's Event for Maastricht University's Knowledge Engineering @ Work Program. https://www.maastrichtuniversity.nl/news/kework-first-10-students-academic-workstudy-track-graduate
Slides describing Force11 Work and background of several of the speakers, used for talks to University of Lethbridge, Carnegie Mellon and to Elsevier internally
Workshop finding and accessing data - fiona nadia charlotte - cambridge apr...Fiona Nielsen
Workshop presentation on finding and accessing human genomics data for research.
Including statistics of publicly available data sources and tips on how to save time in your workflow of data access.
Organised in collaboration between DNAdigest and Open Data Cambridge.
Read more about our work:
http://DNAdigest.org
http://repositive.io
https://uk.linkedin.com/in/fionanielsen
http://www.data.cam.ac.uk
David B. Resnik MedicReS World Congress 2015MedicReS
Protecting Privacy and Confidentiality in the Age of Big Data Presentation to MedicReS 5th World Congress on October 19,25,2015 in New York - David B. Resnik, JD, PhD, Bioethicist, NIH/NIEHS
Managing and sharing confidential data in Australian social scienceARDC
The “problem” of “sensitive data” - the 5 Safes model
The “problem” of open and transparent research – the FAIR principles
From problems to solutions – Access to sensitive data in Australia – ADA as a model for journal data access system
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...Micah Altman
Julia Flanders, who is the Director of the Digital Scholarship Group in the Northeastern University Library, and a Professor of Practice in Northeastern's English Department gave a talk on Jobs, Roles, Skills, Tools: Working in the Digital Academy as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Julia discusses the evolving landscape of digital humanities (and digital scholarship more broadly) and considers the relationship between technology, tool development, and professional roles.
For more see: http://informatics.mit.edu/event/brown-bag-jobs-roles-skills-tools-working-digital-academy-julia-flanders
This presentation was provided by Todd Carpenter of NISO as the introduction to the day-long symposium, Privacy Implications of Research Data, held on September 11, 2016 in conjunction with International Data Week in Denver, Colorado
This presentation was provided by Christoph Bruch of the Helmholtz Association of German Research Centres during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016 in Denver, Colorado, in conjunction with the International Data Week event.
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...Micah Altman
Ophir Frieder, who holds the Robert L. McDevitt, K.S.G., K.C.H.S. and Catherine H. McDevitt L.C.H.S. Chair in Computer Science and Information Processing at Georgetown University, gave this talk on Searching in Harsh Environments as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Ophir rebuts the myth that "google has solved search", and discusses the challenges of searching for complex object, through hidden collections, and in harsh environments For more see: http://informatics.mit.edu/blg
"Reproducibility from the Informatics Perspective"Micah Altman
Dr. Altman will provide expert comment on the need for informatics modeling as part of the National Academies workshop: Statistical Challenges in Assessing and Fostering the Reproducibility of Scientific Results
This workshop focuses on the topic of addressing statistical challenges in assessing and fostering the reproducibility of scientific results by examining three issues from a statistical perspective: the extent of reproducibility, the causes of reproducibility failures, and potential remedies.
Thinking about Open Science practices, data sharing and lifetime, and communication from Climate Scientists. Slides based on a presentation given at the Lunchtime talk sessions from the MetOS Section, Department of Geosciences, University of Oslo, November 12th 2015.
Space Situational Awareness Forum
Following another very successful conference in London in November 2014, Space Situational Awareness 2015 took place in Hyattsville, Maryland in May 2015, with over 60 SSA experts from all over the globe coming together to discuss the most pressing SSA challenges.
With increasing dependence on space-based services, the ability to protect space infrastructure has become essential to our society. Any shutdown of even a part of space infrastructures could have significant consequences for the well-functioning of economic activities and our citizens’ safety, and would impair the provision of emergency services.
However, space infrastructures are increasingly threatened by the risk of collision between spacecraft and more importantly, between spacecraft and space debris. As a matter of fact, space debris has become the most serious threat to the sustainability of certain space activities.
In order to mitigate the risk of collision it is necessary to identify and monitor satellites and space debris, catalogue their positions, and track their movements (trajectory) when a potential risk of collision has been identified, so that satellite operators can be alerted to move their satellites. This activity is known as space surveillance and tracking (SST), and is today mostly based on ground-based sensors such as telescopes and radars.
With a focus on solving the political issues but not ignoring the technical, Space Situational Awareness 2015 the leading gathering of dedicated SSA experts from the USA, Europe and beyond, to discuss and debate the business, political and technical challenges that lie ahead.
Take a look at our previous Space Situation Awareness event…
Who should attend Space Situational Awareness?
Space Situational Awareness 2015 is a community of experts from Government, Space Agencies, Satellite/Spacecraft Operators, Space Lawyers, Space Insurance providers and Defense who are looking to understand and predict the physical location of natural and manmade objects in orbit around the Earth, with the objective of avoiding collisions.
How can you get involved in Space Situational Awareness?
If you feel that you could add to the debate and discussion at Space Situational Awareness, we’d be delighted to hear from you. Please drop us a line on +44(0)7769157787 or email me at adam.plom@coriniumintelligence.com.
Abstract: http://j.mp/1MhWWei
Healthcare applications now have the ability to exploit big data in all its complexity. A crucial challenge is to achieve interoperability or integration so that a variety of content from diverse physical (IoT)- cyber (web-based)- and social sources, with diverse formats and modality (text, image, video), can be used in analysis, insight, and decision-making. At Kno.e.sis, an Ohio Center of Excellence in BioHealth Innovation, we have a variety of large, collaborative healthcare/clinical/biomedical projects, all involving domain experts and end-users, and access to real world data that include: clinical/EMR data (of individual patients and that related to public health), data from a variety of sensors (IoT) on and around patients measuring real-time physiological and environmental observations), social data (Twitter, Web forums, PatientsLikeMe), Web search logs, etc. Key projects include: Prescription drug abuse online-surveillance and epidemiology (PREDOSE), Social media analysis to monitor cannabis and synthetic cannabinoid use (eDrugTrends), Modeling Social Behavior for Healthcare Utilization in Depression, Medical Information Decision Assistant and Support (MIDAS) with application to musculoskeletal issues, kHealth: A Semantic Approach to Proactive, Personalized Asthma Management Using Multimodal Sensing (also for Dementia), and Cardiology Semantic Analysis System (with applications to Computer Assisted Coding and Computerized Document Improvement).
This talk will review how ontologies or knowledge graphs play a central role in supporting semantic filtering, interoperability and integration (including the issues such as disambiguation), reasoning and decision-making in all our health-centric research and applications. Additional relevant information is at the speaker’s HCLS page. http://knoesis.org/amit/hcls
A presentation to the New Year's Event for Maastricht University's Knowledge Engineering @ Work Program. https://www.maastrichtuniversity.nl/news/kework-first-10-students-academic-workstudy-track-graduate
Slides describing Force11 Work and background of several of the speakers, used for talks to University of Lethbridge, Carnegie Mellon and to Elsevier internally
Workshop finding and accessing data - fiona nadia charlotte - cambridge apr...Fiona Nielsen
Workshop presentation on finding and accessing human genomics data for research.
Including statistics of publicly available data sources and tips on how to save time in your workflow of data access.
Organised in collaboration between DNAdigest and Open Data Cambridge.
Read more about our work:
http://DNAdigest.org
http://repositive.io
https://uk.linkedin.com/in/fionanielsen
http://www.data.cam.ac.uk
David B. Resnik MedicReS World Congress 2015MedicReS
Protecting Privacy and Confidentiality in the Age of Big Data Presentation to MedicReS 5th World Congress on October 19,25,2015 in New York - David B. Resnik, JD, PhD, Bioethicist, NIH/NIEHS
Managing and sharing confidential data in Australian social scienceARDC
The “problem” of “sensitive data” - the 5 Safes model
The “problem” of open and transparent research – the FAIR principles
From problems to solutions – Access to sensitive data in Australia – ADA as a model for journal data access system
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...Micah Altman
Julia Flanders, who is the Director of the Digital Scholarship Group in the Northeastern University Library, and a Professor of Practice in Northeastern's English Department gave a talk on Jobs, Roles, Skills, Tools: Working in the Digital Academy as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Julia discusses the evolving landscape of digital humanities (and digital scholarship more broadly) and considers the relationship between technology, tool development, and professional roles.
For more see: http://informatics.mit.edu/event/brown-bag-jobs-roles-skills-tools-working-digital-academy-julia-flanders
This presentation was provided by Todd Carpenter of NISO as the introduction to the day-long symposium, Privacy Implications of Research Data, held on September 11, 2016 in conjunction with International Data Week in Denver, Colorado
This presentation was provided by Christoph Bruch of the Helmholtz Association of German Research Centres during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016 in Denver, Colorado, in conjunction with the International Data Week event.
This presentation was provided by Dr. Paul Burton of the University of Bristol during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016, in conjunction with the International Data Week in Denver, Colorado.
This slide shows the set of task groups established under the aegis of the RDA/NISO Privacy Implications of Research Data Sets Interest Group; it was used during the NISO Symposium held on September 11, 2016 in conjunction with International Data Week events in Denver, Colorado.
This presentation was provided by Dr. Christine Borgman of UCLA during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016, as part of the International Data Week event in Denver, Colorado.
This presentation was provided by Andrew Albanese of Publishers Weekly during the NISO-BISG Forum held on Friday, June 24, at the 2016 ALA Annual Conference, Orlando, FL
These are the welcoming slides for the NISO-BISG Forum on The User Experience, held on June 24, during the 2016 ALA Annual Conference, in Orlando, Florida.
This was a joint presentation by Daniel Ayala (Proquest); Michael C. Robinson (Univ Alaska-Anchorage) and Nettie Lagace (NISO) for the NISO-BISG Forum held on June 24, during the 2016 ALA Annual Conference in Orlando, FL.
These slides were used during a panel discussion between Todd Carpenter (NISO), Therese Hunt (Elsevier), Becky Clark (Library of Congress), and Lettie Conrad (SAGE) during the NISO-BISG Joint Forum, held June 24, 2016 during the 2016 ALA Annual Conference in Orlando, FL.
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge By Kato Mivule for the Degree of D.Sc. in Computer Science - Bowie State University
What are big data in the contacts of energy & utilities, and how/where can the utilities find value in the data. In this C-level presentation we discussed the three prime areas: grid operations, smart metering and asset & workforce management. A section on cognitive computing for utilities have been omitted from the presentation due to confidentiality - but I tell you - it is mind-blowing perspectives on how IBM Watson will help utilities plan and optimize their operations in the near future!
See more on http://www.ibmbigdatahub.com/industry/energy-utilities
Presentation for LIS 560: Instructional and Training Strategies for Information Professionals at the UW iSchool. Health information literacy workshop design for adolescent girls.
IT support and services are the backbone of an organization. Having round-the-clock IT support solutions strategically supports your organization's ability to run effectively. This enables you to focus on your core business operations. Jerait.co.uk comprehend organizational needs and can navigate the business through updated technology recommendations. They majorly offer their services in locations like Edinburgh, Aberdeen, and Glasgow. They can help you enhance your IT infrastructure and future-proof your business with highly reliable, secure, and optimized IT support solutions.
This is a modified version of Master Class that Dr Siobhan O'Dwyer delivered at the Griffith University School of Nursing's Annual Research School for postgraduate students.
C H7A P T E R Collecting Qualitative Data Qualitative da.docxRAHUL126667
C H7A P T E R Collecting
Qualitative Data
Qualitative data collection is more than simply deciding on whether you will observe or interview people. Five steps comprise the process of collecting qualitative data. You need to identify your participants and sites, gain access, determine the types of data to collect, develop data collection forms, and administer the process in an ethical manner.
By the end of this chapter, you should be able to:
· ◆ Identify the five process steps in collecting qualitative data.
· ◆ Identify different sampling approaches to selecting participants and sites.
· ◆ Describe the types of permissions required to gain access to participants and sites.
· ◆ Recognize the various types of qualitative data you can collect.
· ◆ Identify the procedures for recording qualitative data.
· ◆ Recognize the field issues and ethical considerations that need to be anticipated in administering the data collection. Maria is comfortable talking with students and teachers in her high school. She does not mind asking them open-ended research questions such as “What are your (student and teacher) experiences with students carrying weapons in our high school?” She also knows the challenges involved in obtaining their views. She needs to listen without injecting her own opinions, and she needs to take notes or tape-record what people have to say. This phase requires time, but Maria enjoys talking with people and listening to their ideas. Maria is a natural qualitative researcher.
204
CHAPTER 7 Collecting Qualitative Data 205 WHAT ARE THE FIVE PROCESS STEPS
IN QUALITATIVE DATA COLLECTION?
There are five interrelated steps in the process of qualitative data collection. These steps should not be seen as linear approaches, but often one step in the process does follow another. The five steps are first to identify participants and sites to be studied and to engage in a sampling strategy that will best help you understand your central phenome- non and the research question you are asking. Second, the next phase is to gain access to these individuals and sites by obtaining permissions. Third, once permissions are in place, you need to consider what types of information will best answer your research questions. Fourth, at the same time, you need to design protocols or instruments for collecting and recording the information. Finally and fifth, you need to administer the data collection with special attention to potential ethical issues that may arise.
Some basic differences between quantitative and qualitative data collection are helpful to know at this point. Based on the general characteristics of qualitative research, qualita- tive data collection consists of collecting data using forms with general, emerging questions to permit the participant to generate responses; gathering word (text) or image (picture) data; and collecting information from a small number of individuals or sites. Thinking more specifically now ...
RUNNINGHEADER:PROJECTANALYSIS 1
Corruption 2
“Project Analysis on Corruption”BADM440-1404A-01
Quesadra Dynell Goodrum
Individual Project Phase 4
Colorado Technical University
Instructor: Jose Perez
11/03/20014
Table of Contents
Sample Population 3
Questionnaires 4
Oral Interviews 4
Observation 4
Data Analysis and Measurement Strategy 4
This ethical consideration will be built on the following basic principles of ethical practice 5
a) Informed Consent 6
b) Beneficence 6
c) Justice 7
References 8
Sample Population
The success of this research depends on the sample population that I choose to work with. I intend to obtain information about a population and have settled for only selected members of the population to be questioned. Contacting, questioning, and obtaining information from a large population, such as all of the households residing in Colorado, is extremely expensive, difficult, and time consuming. A properly designed probability sample, however, provides a reliable means of inferring information about a population without examining every member or element. When properly conducted, a probability sample of provides very reliable information with very small margin of error for the whole population in Colorado.
Working with a sample size of 300 respondents, the smaller sampling operation lends itself to the application of more rigorous controls, thus ensuring better accuracy. This calls for rigorous controls to reduce noncomplying errors such as interviewer bias and mistakes, nonresponse problems, questionnaire design flaws, and data processing and analysis errors.
The sampling methodology used for this research is the nonprobability sampling. In this case, when discussing the results of a nonprobability sample, I will limit myself to findings of the persons sampled. The advantage of nonprobability sampling is the ease in which it can be administered. They tend to be less complicated and less time consuming.
Judgmental sampling is the type of nonprobability sampling employed for this study. In judgmental or purposive sampling, I would employ my own "expert” judgment about who to include in the sample frame. Prior knowledge and research skill I possess would be instrumental are in selecting the respondents or elements to be sampled.
Data Analysis
The data collection procedures included the following:Questionnaires
This involved the administering of organization questionnaires to staff members working in the organizations within the study area. Oral Interviews
This method involved collection of data through face to face interaction with organizations managers and employees. This was to gain insight in the effect of corruption on organizations. Observation
Observation is basic to collecting data on the current state of the study area. It was also used in verifying information collected using the questionnaires proceeds observations as a method of data collection also serves to increase the range of relevance and rel.
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaStoic Advantage, LLC.
I enjoyed working with Dustin Bearden on a breakthrough project where neuromarketing meets dating sites, such as POF, Badoo and Bumble.
We had participants in our experiment utilize eye trackers in order to gauge initial reaction on regions of their brain. This gave us "heat map” based on what the participants saw upon the initial impression of images on these sites in order to see how a person makes snap-judgment decision on whether to swipe right or left.
The 4 criteria we tested throughout this project were: social proof, text & visuals, innovative design, and consistency. We theorized dating sites that incorporated all four of these criterion tended to perform better than others.
The Social Transmission of Choice: An Exploratory Computer Simulation with Ap...Edmund Chattoe-Brown
Paper presented at the British Sociological Association Annual Conference (Social Connections: Identities, Technologies, Relationships), University of East London, 12-14 April.
In AI We Trust? Ethics & Bias in Machine Learning
Hosted by Seven Peaks Ventures and Fast Forward Labs
September 2016
Decision-making about critical life stages (college admissions, creditworthiness, employability, jail sentencing) is rapidly becoming centralized and predicted by automated systems like machine learning models. As Data Scientists, the creators of those models, how do we take responsibility for those decisions? How do we define our goals, and how do we measure the effect? As this presents a unique opportunity and risk to businesses, we all become invested in the answers to these questions. Here, I focus on the tactical elements of measuring fairness as well as the forward-looking concerns and opportunities this paradigmatic change presents.
https://www.eventbrite.com/e/in-ai-we-trust-ethics-bias-in-machine-learning-tickets-26313436196#
This is my attempt at an introduction to data ethics for mathematicians. Mathematicians increasingly need to deal with these kinds of issues, but we don't have the tradition of ethics training from other disciplines.
I welcome comments on how to improve these slides. Did I miss any salient points? Do you want to offer a different perspective on any of these? Do you want to offer any counterpoints? (Please e-mail me directly with comments and suggestions.)
Eventually, I hope to develop these slides further into an article for a venue aimed at mathematical scientists, and of course I would love to have knowledgeable coauthors who can offer a different perspective from mine.
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
In this presentation, I discuss the evolution to the analysis era in information security and the challenges associated with it. This includes several examples of cognitive biases and the negative effects they can have on the analysis process. I also discuss different analytic techniques that can enhance analysis such as differential diagnosis and relational investigation.
Similar to Wilbanks Can We Simultaneously Support Both Privacy & Research? (20)
This presentation was provided by William Mattingly of the Smithsonian Institution, during the closing segment of the NISO training series "AI & Prompt Design." Session Eight: Limitations and Potential Solutions, was held on May 23, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the seventh segment of the NISO training series "AI & Prompt Design." Session 7: Open Source Language Models, was held on May 16, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the sixth segment of the NISO training series "AI & Prompt Design." Session Six: Text Classification with LLMs, was held on May 9, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fifth segment of the NISO training series "AI & Prompt Design." Session Five: Named Entity Recognition with LLMs, was held on May 2, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fourth segment of the NISO training series "AI & Prompt Design." Session Four: Structured Data and Assistants, was held on April 25, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the third segment of the NISO training series "AI & Prompt Design." Session Three: Beginning Conversations, was held on April 18, 2024.
This presentation was provided by Kaveh Bazargan of River Valley Technologies, during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by Dana Compton of the American Society of Civil Engineers (ASCE), during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the second segment of the NISO training series "AI & Prompt Design." Session Two: Large Language Models, was held on April 11, 2024.
This presentation was provided by Teresa Hazen of the University of Arizona, Geoff Morse of Northwestern University. and Ken Varnum of the University of Michigan, during the Spring ODI Conformance Statement Workshop for Libraries. This event was held on April 9, 2024
This presentation was provided by William Mattingly of the Smithsonian Institution, during the opening segment of the NISO training series "AI & Prompt Design." Session One: Introduction to Machine Learning, was held on April 4, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the eight and final session of NISO's 2023 Training Series on Text and Data Mining. Session eight, "Building Data Driven Applications" was held on Thursday, December 7, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the seventh session of NISO's 2023 Training Series on Text and Data Mining. Session seven, "Vector Databases and Semantic Searching" was held on Thursday, November 30, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the sixth session of NISO's 2023 Training Series on Text and Data Mining. Session six, "Text Mining Techniques" was held on Thursday, November 16, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fifth session of NISO's 2023 Training Series on Text and Data Mining. Session five, "Text Processing for Library Data" was held on Thursday, November 9, 2023.
This presentation was provided by Todd Carpenter, Executive Director, during the NISO webinar on "Strategic Planning." The event was held virtually on November 8, 2023.
This presentation was provided by Rhonda Ross of CAS, a division of the American Chemical Society, and Jonathan Clark of the International DOI Foundation, during the NISO webinar on "Strategic Planning." The event was held virtually on November 8, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fourth session of NISO's 2023 Training Series on Text and Data Mining. Session four, "Data Mining Techniques" was held on Thursday, November 2, 2023.
This presentation was provided by Tiffany Straza of UNESCO, during the two-day "NISO Tech Summit: Reflections Upon The Year of Open Science." Day two was held on October 26, 2023.
More from National Information Standards Organization (NISO) (20)
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
25. “Investigators will meet annually in-person
with each participant to assess and record
progression … every six months, the team will
conduct phone and mail surveys regarding
diagnosis, medications, and other impacts of
the disease…”
39. 1. “technical debt” means traditional
(non-mobile) consent has known
problems, but hard to change.
2. signs of support for new methods of
using technology as pedagogy in
consent
This project was supported by grant number U18HS022789 from the Agency for Healthcare
Research and Quality. The content is solely the responsibility of the authors and does not
necessarily represent the official views of the Agency of Healthcare Research and Quality.
40.
41. 1. tiered information access by
participants
2. “pictorial” dominant on first
information tier
3. text dominant on second information
tier
4. require perfect score on short
assessment
50. privacy isn’t just the elimination of risk of
identification.
it’s about letting people make educated
choices about the risks and benefits with
which they are comfortable.
51. if the pictographs teach “what we know”
then we also must assess if someone
learned it!
65. I WILL CREDIT
PARTICIPANTS
To complete this form:
1. Enter your name (see *)
2. Mark your initials on the line in the upper right corner of each box (9 times, total)
3. Sign and date
I, _____________________*, reaffirm my commitment to the
Synapse Awareness and Ethics Pledge. I will adhere to the
following principles for responsible research:
__________________________ * Printed name
__________________________ Signature
__________________________ Date
I WILL NOT
RE-IDENTIFY
___
I WILL NOT
SHARE
___
I WILL NOT USE
FOR ADVERTISING
___
I WILL KEEP
SECURE
___
___
I WILL PUBLISH
OPEN ACCESS
___
___
I WILL PROTECT
PRIVACY
I WILL REPORT
ANY BREACHES
___
___
I WILL FOLLOW
THE LAW
71. EHRs and DNA are different from sensors
and surveys - have to teach and assess
higher risk, uncertainty, unknowables…
Identifiability Knowable harms Unknown unknowns
72. “Known Knowns”
• Trolling
• Doxing
• Bullying file:///var/folders/9p/
bbpc5fkd6ybdzwss43hcfz
sc0000gn/T/
noun_dna_77921.pngIf a bully connects your
data to your name, they
might publish it.
Trolling
next
learn more
73. Extraction
• Where does the
data come from?
• Requirements
and limits of
your
authorization for
extraction
• Do we do
anything to it
before transfer?
file:///var/folders/9p/
bbpc5fkd6ybdzwss43hcfz
sc0000gn/T/
noun_dna_77921.png
You’ll give us permission
to make a copy of your
EHR data, which will go
into your study data.
Permission to Copy
next
learn more
74. Transfer
• What state is
the data in
during
transfer?
– Anonymized
– De-identified
– Pseudonymized
• Where does the
data travel to?
file:///var/folders/9p/
bbpc5fkd6ybdzwss43hcfz
sc0000gn/T/
noun_dna_77921.pngYour data will be
“encrypted” to keep it safe
as it moves into the study.
Safe Transfer
next
learn more
75. Risks
• Limits to anonymization/
de-identification/
pseudonymizaiton
• Risk of sharing/discovery
– “Asymptomatic” or “pre-
clinical” conditions
– Non-paternity
– Mental health
– Sexual health
• Risks extend to family
members
file:///var/folders/9p/
bbpc5fkd6ybdzwss43hcfz
sc0000gn/T/
noun_dna_77921.png
Because your data is
unique to you, it will be
hard to “anonymize” it
completely.
Identity
next
learn more
80. the sorting hat
• Automatic sorting, no work required
• Consent process that could “bin”
participants into likely risk and consent
them in specific tracks
• Suggested for projects that involve consent
of known sequences for which risk could
be computed (i.e. at Broad etc) but
interesting conceptually - what are the bins
that could be used for sorting?
81. ballot box
• Manual selection and movement of choices
• Consent process where participant is faced with multiple
statements and has to “vote” with them, with an interpretation of
sorts provided at the end
• I.e. place seven statements on the screen about the study, let
participant sort them into “things that make me more / less likely
to want to enroll”
• I.e. ask seven binary questions about the study, display results
with commentary “i think i am unlikely to be a victim of genetic
discrimination”
• Suggested for projects where there isn’t a lot of real estate (mobile)
but also for where there isn’t a lot of risk (perhaps not sharing
broadly)
82. colossal cave adventure
• Interactive, quiz-based game where wrong answers
receive immediate correction, has an endpoint / finish
line
• Consent process where participant must “find their
way” through a moderately easy puzzle
• I.e. contextualize a risk such as long-term care
insurance - before “share genome” should correctly
choose “i thought about long term care insurance”
• Suggested for projects where there isn’t a lot of real
estate (mobile) but where there is medium risk
(perhaps sharing broadly inside Sage style
approaches)
83. kobayashi maru
• From Star Trek: “The objective of the test
is not for the cadet to outfight or outplan
the opponent but rather to force the
cadet into a no-win situation and
observe how he/she reacts.’
• Consent process where participant must
engage with ambiguity of DNA risk and
benefit through scripted situation(s)
• Put a set of unanswerable questions
about the risks and benefits of
genome research use, donation and
sharing together - but make sure
there are no “right” answers.