IMAGES

  1. (PDF) Research Data Management System Proposal Having Confidentiality

    research paper on data confidentiality

  2. Data Confidentiality Agreement

    research paper on data confidentiality

  3. (PDF) Security, Confidentiality and Privacy in Health of Healthcare Data

    research paper on data confidentiality

  4. Research Participant Data Privacy and Confidentiality

    research paper on data confidentiality

  5. (PDF) RESEARCH ETHICS Certificates of Confidentiality and Compelled

    research paper on data confidentiality

  6. FREE 10+ Research Confidentiality Agreement Samples & Templates in MS

    research paper on data confidentiality

COMMENTS

  1. The use of confidentiality and anonymity protections as a cover for

    This paper has examined a particular kind of research and publication misconduct, namely, the misuse of anonymity and confidentiality protections in the production of unreliable qualitative data. Analysis of this phenomenon included an exercise in PPPR that argued for the unreliability of the qualitative data in an article published in an ...

  2. Big data security and privacy in healthcare: A systematic review and

    The systematic review explores the issues and challenges associated with big data security and privacy in healthcare. Through reference to resource-based view theory, this paper seeks to examine the present state of research in this area, identify gaps in the existing literature, and propose strategies for future research.

  3. Privacy of Clinical Research Subjects: An Integrative Literature Review

    With changes in clinical research practice, the importance of a study-subject's privacy and the confidentiality of their personal data is growing. However, the body of research is fragmented, and a synthesis of work in this area is lacking. Accordingly, an integrative review was performed, guided by Whittemore and Knafl's work.

  4. Journal of Privacy and Confidentiality

    The JPC seeks to publish a wide range of research and review papers, not only from academia, but also from government (especially official statistical agencies) and industry, and to serve as a forum for exchange of views, discussion, and news.

  5. Privacy Protection and Secondary Use of Health Data: Strategies and

    In this research, we focus on the first two categories of data, which are directly related to users' health and privacy. Category 1. Health data generated by healthcare system. This type of data is clinical data and is recorded by clinical professionals or medical equipment when a patient gets healthcare service in a hospital or clinic.

  6. Personhood credentials: Artificial intelligence and the value of

    Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In ...

  7. Privacy and Confidentiality

    Some measures for protecting privacy and confidentiality in human subjects research include: (1) limiting access to data or biological samples to members of the research team; (2) storing data securely; (3) using passwords, encryption, firewalls, and other computer security practices to protect electronic records; (4) training research staff on ...

  8. A reflection on the challenge of protecting confidentiality of

    Ensuring confidentiality is also essential to build trust relationships with participants . Without the assurance of confidentiality, they might refuse to share data or hide data that are important to answer research questions, especially when the study focuses on sensitive issues (e.g. hidden behaviours, controversial views, perverse effects).

  9. (PDF) The Importance of Anonymity and Confidentiality ...

    Conclusions: Confidentiality and anonymity are research ethical principles that help in providing informed consent to participants assuring subjects of the privacy of their personal data. As ...

  10. (PDF) Confidentiality

    Confidentiality refers to a situation in which a researcher is aware of the identity of a research subject but takes precautions to prevent that identification from being discovered by others (Bos ...

  11. Balancing confidentiality and care coordination: challenges in patient

    Background In the digital age, maintaining patient confidentiality while ensuring effective care coordination poses significant challenges for healthcare providers, particularly nurses. Aim To investigate the challenges and strategies associated with balancing patient confidentiality and effective care coordination in the digital age. Methods A cross-sectional study was conducted in a general ...

  12. Protecting Respondent Confidentiality in Qualitative Research

    The Case of Rachel. My concern with respondent confidentiality began during my dissertation research (Kaiser, 2006).My dissertation examines how women who have undergone treatment for breast cancer perceive the identity of cancer survivor and how cultural notions of survivorship affect their adjustment to breast cancer (Kaiser, 2006; 2008).Data for my dissertation came from in-depth interviews ...

  13. Data security and privacy concerns of AI-driven marketing in the

    3.1.2. Data security: data confidentiality and data sharing. Data security is a crucial issue in economic and corporate operations, particularly in AI-powered marketing (Maiorescu et al., Citation 2021; Wu et al., Citation 2024). Data security is the practice of safeguarding digital information from unauthorized access, alteration, or theft at ...

  14. PDF GDPR: Lawful basis, research consent and confidentiality

    (who collect and use personal data to support their research), and those who supply data to others for research (e.g. GP, hospital and central NHS data). It has been developed with the participation of the Information Commissioner's Office (ICO) and others. This guidance will cover the following: • the most likely lawful basis to hold and ...

  15. Confidentiality and Data Protection in Research

    The data protections and confidentiality protocols should be in place before the project starts, and includes aspects like theft, loss or tampering of the data. The easy way to do this is to limit access to the research data. The Principal Investigator should limit access to this information to the fewest individuals possible, including which ...

  16. Has your paper been used to train an AI model? Almost certainly

    Artificial-intelligence developers are buying access to valuable data sets that contain research papers — raising uncomfortable questions about copyright.

  17. Simplifying the Complexity of Confidentiality in Research

    In the context of research, confidentiality is the agreement to limit access to a subject's information. A requirement for confidentiality may exist because of a promise made by a researcher, an expectation of a subject (e.g., that medical records are confidential), or a legal requirement (e.g., Health Insurance Portability and Accountability Act [HIPAA]).

  18. PDF Guidelines on Anonymity and Confidentiality in Research

    The purpose of this guideline is to provide researchers with information on anonymity and confidentiality with respect to research involving human participants. It also lays out three special circumstances where there may be limits to respecting the privacy and confidentiality of research participants. 2.

  19. Current Issues in Research Ethics : Privacy and Confidentiality

    Before approving Internet research, Eysenbach and Till propose seven issues for researchers and IRBs to consider and address, including (1) the extent of intrusiveness, (2) perceived privacy, (3) vulnerability, (4) potential harm, (5) informed consent, (6) confidentiality, and (7) property rights. 54.

  20. Best Practices for Data Analysis of Confidential Data

    USE SECURE METHODS OF FILE TRANSFER: Transfer of confidential data files between users or between institutions has the potential to result in unintended disclosure. File transfers are often the weakest part of any plan for keeping research data secure. The method used to transfer files should reflect the sensitivity level of the data.

  21. Confidentiality, Privacy and Data Protection in International ...

    It highlights the growing challenges that have arisen in protecting such information in online communications today. Finally, it stresses the importance today of protecting private and confidential data in the collection, storage and communication of information consistent with the principles of confidentiality that underlie ICA.

  22. PDF Chapter 4 Privacy, Confidentiality, and Protection Of

    damage to the worker that can result from the release of confidential data. • Proper management of study data must consider the: (1) use of data by others, (2) sharing of data, (3) use of personal identifiers, (4) use of pre-existing data, (5) appropriate dissemination of data and results, and (6) worker's rights regarding personal data and ...

  23. 410. Maintaining Data Confidentiality

    410. Maintaining Data Confidentiality. Updated June 7, 2024. The IRB is responsible for evaluating proposed research to ensure adequate provisions to protect the privacy of participants and to maintain the confidentiality of data. Research involving human participants must include adequate provisions to maintain the confidentiality of research ...

  24. [2408.06292] The AI Scientist: Towards Fully Automated Open-Ended

    One of the grand challenges of artificial general intelligence is developing agents capable of conducting scientific research and discovering new knowledge. While frontier models have already been used as aides to human scientists, e.g. for brainstorming ideas, writing code, or prediction tasks, they still conduct only a small part of the scientific process. This paper presents the first ...

  25. Confidentiality and data protection

    It is crucial that researchers respect the confidentiality of, and data provided by, their participants in an ethically and legally appropriate manner. This means thinking about how to safely and appropriately store and manage participants' data before any data is collected. This page details the key information for researchers to consider in ...

  26. Rethinking Confidentiality in Qualitative Research in the Era of Big Data

    Managing anonymity and confidentiality in social research: The case of visual data in community research (NCRM Working Paper Series, ... Wiles R., Heath S., Charles V. (2006). Research ethics and data quality: The implications of informed consent. International Journal of Social Research Methodology, 9, 83-95.

  27. [2408.07009] Imagen 3

    We introduce Imagen 3, a latent diffusion model that generates high quality images from text prompts. We describe our quality and responsibility evaluations. Imagen 3 is preferred over other state-of-the-art (SOTA) models at the time of evaluation. In addition, we discuss issues around safety and representation, as well as methods we used to minimize the potential harm of our models.

  28. (PDF) Research on Data Confidentiality and Security of Computer Network

    3.1. The principle of network password encryption and protection. Data encryption technology refers to the use of the computer system for network transmission. information reorganization to ensure ...

  29. Liquid water in the Martian mid-crust

    We assess whether V s (10-13), V p (), and bulk density ρ b data are consistent with liquid water-saturated pores in the mid-crust (11.5 ± 3.1 to 20 ± 5km) within 50 km of the InSight lander.The mid-crust is one of four robust seismically detectable kilometer-scale layers beneath InSight (10-13) and may be global ().V p and layer thickness have been challenging to obtain for other ...

  30. Privacy Prevention of Big Data Applications: A Systematic Literature

    This paper focuses on privacy and security concerns in Big Data. This paper also covers the encryption techniques by taking existing methods such as differential privacy, k-anonymity, T-closeness, and L-diversity.Several privacy-preserving techniques have been created to safeguard privacy at various phases of a large data life cycle.