When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Statistical disclosure control - Wikipedia

    en.wikipedia.org/wiki/Statistical_disclosure_control

    Statistical disclosure control (SDC), also known as statistical disclosure limitation (SDL) or disclosure avoidance, is a technique used in data-driven research to ensure no person or organization is identifiable from the results of an analysis of survey or administrative data, or in the release of microdata.

  3. Five safes - Wikipedia

    en.wikipedia.org/wiki/Five_safes

    It is mainly used to describe or design research access to statistical data held by government and health agencies, and by data archives such as the UK Data Service. [ 1 ] Two of the Five Safes refer to statistical disclosure control , and so the Five Safes is usually used to contrast statistical and non-statistical controls when comparing data ...

  4. Confidentiality - Wikipedia

    en.wikipedia.org/wiki/Confidentiality

    Confidentiality principle bolsters the therapeutic alliance, as it promotes an environment of trust. There are important exceptions to confidentiality, namely where it conflicts with the clinician's duty to warn or duty to protect. This includes instances of suicidal behavior or homicidal plans, child abuse, elder abuse and dependent adult abuse.

  5. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  6. Menlo Report - Wikipedia

    en.wikipedia.org/wiki/Menlo_Report

    Appropriate application of the four principles requires that Stakeholder analysis must first be performed. Thorough stakeholder analysis is important to identify: the correct entity(s) from whom to seek informed consent; the party(s) who bear the burdens or face risks of research; the party(s) who will benefit from research activity; and, the party(s) who are critical to mitigation in the ...

  7. Contextual integrity - Wikipedia

    en.wikipedia.org/wiki/Contextual_Integrity

    Examples of transmission principles include consent, coerced, stolen, buying, selling, confidentiality, stewardship, acting under the authority of a court with a warrant, and national security. A key thesis is that assessing the privacy impact of information flows requires the values of all five parameters to be specified. Nissenbaum has found ...

  8. Privacy for research participants - Wikipedia

    en.wikipedia.org/wiki/Privacy_for_research...

    Researchers publish data that they get from participants. To preserve participants' privacy, the data goes through a process to de-identify it. The goal of such a process would be to remove protected health information which could be used to connect a study participant to their contribution to a research project so that the participants will not suffer from data re-identification.

  9. Belmont Report - Wikipedia

    en.wikipedia.org/wiki/Belmont_Report

    The Belmont Report is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.Its full title is the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, Report of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.