Summary: The privacy of information and its protection against unauthorized disclosure.
Publications285 found, 100 shown here
- Increasing the acceptability of HIV counseling and testing with three C's: convenience, confidentiality and credibilityNicole Angotti
University of Texas at Austin, TX, USA
Soc Sci Med 68:2263-70. 2009..Our study suggests that attention to these factors in VCT strategies may mitigate the fear of HIV testing, and ultimately increase uptake in rural African settings...
- Associations between mode of HIV testing and consent, confidentiality, and referral: a comparative analysis in four African countriesCarla Makhlouf Obermeyer
Center for Research on Population and Health, American University of Beirut, Beirut, Lebanon
PLoS Med 9:e1001329. 2012..This paper examines whether practices regarding consent, confidentiality, and referral vary depending on whether testing is provided through voluntary counseling and testing (VCT) or ..
- Strategies for maintaining patient privacy in i2b2Shawn N Murphy
Laboratory of Computer Science, Massachusetts General Hospital, Boston, Massachusetts, USA
J Am Med Inform Assoc 18:i103-8. 2011..Some of these challenges arise from a misperception that the problem should be solved technically when actually the problem needs a holistic solution...
- A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registersTim Churches
Centre for Epidemiology and Research, New South Wales Department of Health, Locked Mail Bag 961, North Sydney NSW 2059, Australia
BMC Med Res Methodol 3:1. 2003..However, growing concern over the privacy and confidentiality aspects of disease registers may hinder their future operation...
- Patients' perception and actual practice of informed consent, privacy and confidentiality in general medical outpatient departments of two tertiary care hospitals of LahoreAyesha Humayun
Department of Community Health Sciences, FMH College of Medicine and Dentistry, Lahore, Pakistan
BMC Med Ethics 9:14. 2008The principles of informed consent, confidentiality and privacy are often neglected during patient care in developing countries. We assessed the degree to which doctors in Lahore adhere to these principles during outpatient consultations.
- Facilitating HIV disclosure across diverse settings: a reviewCarla Makhlouf Obermeyer
Department of HIV AIDS, World Health Organization, 20 Ave Appia, 1211 Geneva, Switzerland
Am J Public Health 101:1011-23. 2011..is central to debates about HIV because of its potential for HIV prevention and its links to privacy and confidentiality as human-rights issues...
- Toward a national framework for the secondary use of health data: an American Medical Informatics Association White PaperCharles Safran
American Medical Informatics Association, 4915 St Elmo Avenue, Suite 401, Bethesda, MD 20814, USA
J Am Med Inform Assoc 14:1-9. 2007..Such a framework can guide and facilitate widespread collection, storage, aggregation, linkage, and transmission of health data. The framework will provide appropriate protections for legitimate secondary use...
- Research use of linked health data--a best practice protocolC W Kelman
Department of Health and Ageing, Canberra, ACT
Aust N Z J Public Health 26:251-5. 2002..This approach is designed to promote confidence in the community and among data custodians that there are benefits of linked health information being used and that individual privacy is being rigorously protected...
- Women's views of prenatal violence screening: acceptability and confidentiality issuesPaula Rinard Renker
The Ohio State University College of Nursing, Columbus, 43210, USA
Obstet Gynecol 107:348-54. 2006..The purpose of this research was to address the need for evidenced-based practices for violence screening by identifying women's perceptions of, and experiences with, prenatal violence screening...
- Women's views on consent, counseling and confidentiality in PMTCT: a mixed-methods study in four African countriesAnita Hardon
Amsterdam Institute for Social Science Research, University of Amsterdam, Amsterdam, The Netherlands
BMC Public Health 12:26. 2012..This paper focuses on the quality of information provision and counseling and disclosure patterns in Burkina Faso, Kenya, Malawi and Uganda to identify how services can be improved to enable better PMTCT outcomes...
- Current medicolegal and confidentiality issues in large, multicenter research programsP A Carney
Norris Cotton Cancer Center, Department of Community and Family Medicine, Dartmouth Medical School, Hanover Lebanon, NH, USA
Am J Epidemiol 152:371-8. 2000..sites to a single data repository; however, standards for managing data security are needed to protect the confidentiality of participants...
- Online posting of unprofessional content by medical studentsKatherine C Chretien
Medical Service, Washington DC VA Medical Center and Department of Medicine, George Washington University School of Medicine and Health Sciences, Washington, DC 20422, USA
JAMA 302:1309-15. 2009..Web 2.0 applications, such as social networking sites, are creating new challenges for medical professionalism. The scope of this problem in undergraduate medical education is not well-defined...
- Evaluating the state-of-the-art in automatic de-identificationOzlem Uzuner
University at Albany, SUNY, Draper 114A, 135 Western Ave, Albany, NY 12222, USA
J Am Med Inform Assoc 14:550-63. 2007..However, identifying ambiguous PHI proved challenging. The performance of systems on the test data set is encouraging. Future evaluations of these systems will involve larger data sets from more heterogeneous sources...
- Building public trust in uses of Health Insurance Portability and Accountability Act de-identified dataDeven McGraw
Center for Democracy and Technology, 1634 I Street, NW suite 1100, Washington, DC 20006
J Am Med Inform Assoc 20:29-34. 2013....
- Secure Dynamic access control scheme of PHR in cloud computingTzer Shyong Chen
Department of Information Management, Tunghai University, Taichung, Taiwan
J Med Syst 36:4005-20. 2012....
- "Not all my friends need to know": a qualitative study of teenage patients, privacy, and social mediaMaja Van Der Velden
Department of Informatics, University of Oslo, Oslo, Norway
J Am Med Inform Assoc 20:16-24. 2013..There have been no studies of how they manage personal health information on social media...
- Case study: An ethics case study of HIV prevention research on Facebook: the Just/Us studySheana S Bull
MPH, Colorado School of Public Health, University of Colorado Denver, 13001 East 17th Place, Building 500, Campus Box B 119, Aurora, CO 80045, USA
J Pediatr Psychol 36:1082-92. 2011..To consider issues related to research with youth on social networking sites online...
- The adequacy of informed consent forms in genetic research in Oman: a pilot studyAsya Al-Riyami
Ministry of Health, Oman and Research and Ethics Committee, Sultanate of Oman
Dev World Bioeth 11:57-62. 2011..relevant to health would be disclosed, whether participants may share in commercial products, the extent of confidentiality protections, and the inclusion of additional consent forms for future storage and use of tissue samples...
- Protected health information on social networking sites: ethical and legal considerationsLindsay A Thompson
University of Florida, Department of Pediatrics, Gainesville, FL, United States
J Med Internet Res 13:e8. 2011..However, it is unknown whether students and residents portray protected health information and under what circumstances or contexts...
- Evaluating re-identification risks with respect to the HIPAA privacy ruleKathleen Benitez
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, Tennessee 37203, USA
J Am Med Inform Assoc 17:169-77. 2010....
- Automatic de-identification of textual documents in the electronic health record: a review of recent researchStephane M Meystre
Department of Biomedical Informatics, University of Utah, Salt Lake City, Utah, USA
BMC Med Res Methodol 10:70. 2010In the United States, the Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality of patient data and requires the informed consent of the patient and approval of the Internal Review Board to use data for ..
- A systematic review of re-identification attacks on health dataKhaled El Emam
Electronic Health Information Laboratory, CHEO Research Institute, Ottawa, Canada
PLoS ONE 6:e28071. 2011....
- Sharing medical data for health research: the early personal health record experienceElissa R Weitzman
Department of Pediatrics, Harvard Medical School, Boston, United States
J Med Internet Res 12:e14. 2010..Understanding consumer willingness to share data is critical to advancing this model...
- A globally optimal k-anonymity method for the de-identification of health dataKhaled El Emam
CHEO Research Institute, 401 Smyth Road, Ott, ON K1H8L1, Canada
J Am Med Inform Assoc 16:670-82. 2009..Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified...
- Sharing electronic health records: the patient viewJohn Powell
Epidemiology and Public Health, Health Sciences Research Institute, Warwick Medical School, University of Warwick, Coventry, UK
Inform Prim Care 14:55-7. 2006..system to the National Health Service (NHS) has raised concerns about issues of data accuracy, security and confidentiality. The primary aim of this project was to identify the extent to which primary care patients will allow their ..
- Inadequate pre-antiretroviral care, stock-out of antiretroviral drugs and stigma: policy challenges/bottlenecks to the new WHO recommendations for earlier initiation of antiretroviral therapy (CD<350 cells/microL) in eastern UgandaLubega Muhamadi
District Health Office, Iganga District Adminstration, Iganga, Uganda
Health Policy 97:187-94. 2010....
- Development and evaluation of an open source software tool for deidentification of pathology reportsBruce A Beckwith
Department of Pathology, Beth Israel Deaconess Medical Center, 330 Brookline Ave, Boston, MA, USA
BMC Med Inform Decis Mak 6:12. 2006..1800 new pathology reports were then processed. Each report was reviewed manually before and after deidentification to catalog all identifiers and note those that were not removed...
- Measuring patients' trust in their primary care providersMark A Hall
Wake Forest University, USA
Med Care Res Rev 59:293-318. 2002..Correlations are equivalent with lack of disputes, length of relationship, and number of visits [corrected]...
- Impact of social stigma on the process of obtaining informed consent for genetic research on podoconiosis: a qualitative studyFasil Tekola
School of Public Health, Addis Ababa University, Addis Ababa, Ethiopia
BMC Med Ethics 10:13. 2009..The aim of this study was to explore the impact of social stigma on the process of obtaining consent for a study on the genetics of podoconiosis in Southern Ethiopia...
- Privacy technology to support data sharing for comparative effectiveness research: a systematic reviewXiaoqian Jiang
Division of Biomedical Informatics, University of California, San Diego, La Jolla, CA 92093, USA
Med Care 51:S58-65. 2013..These concerns have spurred the development of new technologies for privacy-preserving data sharing and data mining. Our goal is to review existing and emerging techniques that may be appropriate for data sharing related to CER...
- Factors predicting patients' perception of privacy and satisfaction for emergency careYen Ko Lin
Department of Emergency Medicine, Kaohsiung Medical University Hospital, Kaohsiung Medical University, Kaohsiung, Taiwan
Emerg Med J 28:604-8. 2011..To identify emergency department (ED) predictors of patients' perception of privacy and whether patients' perception of privacy was significantly associated with patient satisfaction, in an urban, university-based hospital ED...
- Confidentiality and privacy breaches in a university hospital emergency departmentE J Mlinek
University of Nebraska Medical Center, Department of Surgery, Omaha, NE, USA
Acad Emerg Med 4:1142-6. 1997To determine the frequency of visual and auditory confidentiality and privacy breaches in a university ED.
- Emergency Department patient perceptions of privacy and confidentialityJon C Olsen
Department of Emergency Medicine, Lutheran General Hospital, 1775 West Dempster Street, Park Ridge, IL 60088, USA
J Emerg Med 25:329-33. 2003The study objective was to determine if Emergency Department (ED) patients experience breaches of privacy and confidentiality during their ED stay and to determine if the type of room in which the patient is placed affects privacy...
- Driving toward guiding principles: a goal for privacy, confidentiality, and security of health informationS A Buckovich
Mitretek Systems, Health Information Technology Institute, McLean, VA 22102, USA
J Am Med Inform Assoc 6:122-33. 1999..providing easier access and dissemination of health information, the development of guiding privacy, confidentiality, and security principles is necessary to help balance the protection of patients' privacy interests against ..
- SHARE: system design and case studies for statistical health information releaseJames Gardner
Digital Reasoning Systems Inc, Franklin, Tennessee, USA
J Am Med Inform Assoc 20:109-16. 2013..We present two case studies that evaluate the software on real medical datasets and demonstrate the feasibility and utility of applying the differential privacy framework on biomedical data...
- Protecting patient confidentiality in telephone consultations in general practiceDaniel Sokol
Br J Gen Pract 56:384-5. 2006
- Patient confidentiality and telephone consultations: time for a passwordD K Sokol
Centre for Professional Ethics, Chancellor s Building, Keele University, Keele, Staffordshire, ST5 5BG, UK
J Med Ethics 32:688-9. 2006..consultations are widely used in the delivery of healthcare, they are vulnerable to breaches of patient confidentiality. Current guidelines on telephone consultations do not address adequately the issue of confidentiality...
- Concerns over confidentiality may deter adolescents from consulting their doctors. A qualitative explorationJ Carlisle
Public Health, School of Health and Related Research, University of Sheffield, Regent Court, 30 Regent Street, Sheffield, S1 4DA, UK
J Med Ethics 32:133-7. 2006..This study sought to identify issues and concerns of adolescents, and their parents, in relation to confidentiality and teenagers' personal health information.
- From Hippocrates to HIPAA: privacy and confidentiality in emergency medicine--Part I: conceptual, moral, and legal foundationsJohn C Moskop
Department of Medical Humanities, The Brody School of Medicine at East Carolina University, Bioethics Center, University Health Systems of Eastern Carolina, Greenville, NC 27834, USA
Ann Emerg Med 45:53-9. 2005Respect for patient privacy and confidentiality is an ancient and a contemporary professional responsibility of physicians...
- Encryption characteristics of two USB-based personal health record devicesAdam Wright
Department of Medical Informatics and Clinical Epidemiology, Oregon Health and Science University, 3181 Sam Jackson Park Rd, Portland, OR 97239, USA
J Am Med Inform Assoc 14:397-9. 2007..This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices...
- The MITRE Identification Scrubber Toolkit: design, training, and assessmentJohn Aberdeen
The MITRE Corporation, 202 Burlington Rd, Bedford, MA 01730, United States
Int J Med Inform 79:849-59. 2010....
- Privacy-preserving heterogeneous health data sharingNoman Mohammed
Department of Computer Science and Software Engineering, Concordia University, Montreal, Quebec, Canada
J Am Med Inform Assoc 20:462-9. 2013..In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data...
- Electronic health records should support clinical researchJohn Powell
J Med Internet Res 7:e4. 2005..Clinicians and patients must have confidence in the consent, confidentiality and security arrangements for the uses of secondary data...
- Potential harms, anonymization, and the right to withdraw consent to biobank researchStefan Eriksson
Centre for Bioethics at Karolinska Institutet and Uppsala University, Uppsala Science Park, SE 751 85 Uppsala, Sweden
Eur J Hum Genet 13:1071-6. 2005..Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly...
- Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreakKhaled El Emam
CHEO Research Institute, Smyth Road, Ottawa, K1H 8L1, Canada
BMC Public Health 11:454. 2011..Our objective was to understand the privacy barriers which could potentially influence family physicians' reporting of patient-level surveillance data to public health agencies during the Fall 2009 pandemic H1N1 influenza outbreak...
- Storing newborn blood spots: modern controversiesLinda Kharaboyan
Centre de recherche en droit public, University of Montreal
J Law Med Ethics 32:741-8. 2004
- Evaluating common de-identification heuristics for personal health informationKhaled El Emam
CHEO Research Institute, 401 Smyth Road, Ottawa, ON K1H 8L1, Canada
J Med Internet Res 8:e28. 2006..De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice...
- Nepal: Supreme Court makes landmark decisions on LGBTI rights and the right to confidentialitySandra Ka Hon Chu
HIV AIDS Policy Law Rev 13:62-4. 2008
- A computational model to protect patient data from location-based re-identificationBradley Malin
Department of Biomedical Informatics, Eskind Biomedical Library, Fourth Floor, 2209 Garland Avenue, Vanderbilt University, Nashville, TN 37232 8340, USA
Artif Intell Med 40:223-39. 2007..In this paper, we develop and evaluate computational methods that health care organizations can apply to disclose patient-specific DNA records that are impregnable to trail re-identification...
- Ethical approaches to adolescent participation in sexual health researchSarah Flicker
Faculty of Environmental Studies, York University, Toronto, Ontario, Canada
J Adolesc Health 42:3-10. 2008....
- The inadvertent disclosure of personal health information through peer-to-peer file sharing programsKhaled El Emam
Department of Pediatrics, Faculty of Medicine, University of Ottawa, Ottawa, Ontario, Canada
J Am Med Inform Assoc 17:148-58. 2010..We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI)...
- Large medical databases, population-based research, and patient confidentialityG E Simon
Center ofr Health Studies, Group Health Cooperative, Seattle, WA 98101 1448, USA
Am J Psychiatry 157:1731-7. 2000..This article is a discussion of the use of large clinical databases in population-based research on psychiatric disorders...
- An open source toolkit for medical imaging de-identificationDavid Rodríguez González
National e Science Centre, School of Informatics, University of Edinburgh, Edinburgh, UK
Eur Radiol 20:1896-904. 2010..Our objective is to provide a flexible mechanism for anonymising Digital Imaging and Communications in Medicine (DICOM) data that meets the requirements for deployment in multicentre trials...
- Informed consent for whole genome sequencing: a qualitative analysis of participant expectations and perceptions of risks, benefits, and harmsHolly K Tabor
Department of Pediatrics, University of Washington, Seattle, Washington, USA
Am J Med Genet A 158:1310-9. 2012Scientific evidence on the extent to which ethical concerns about privacy, confidentiality, and return of results for whole genome sequencing (WGS) are effectively conveyed by informed consent (IC) is lacking...
- Protecting count queries in study designStaal A Vinterbo
Division of Biomedical Informatics, Department of Medicine, University of California San Diego, La Jolla, California 92093 0728, USA
J Am Med Inform Assoc 19:750-7. 2012..The goal of this study is to extend current query answer systems to guarantee a quantifiable level of privacy and allow users to tailor perturbations to maximize the usefulness according to their needs...
- Effects of personal identifier resynthesis on clinical text de-identificationReyyan Yeniterzi
Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey
J Am Med Inform Assoc 17:159-68. 2010..The goal of this research is to evaluate the effectiveness and examine possible bias introduced by resynthesis on de-identification software...
- HIV patients' willingness to share personal health information electronicallyPaul A Teixeira
Department of Biomedical Informatics, Columbia University, New York, NY 10032, USA
Patient Educ Couns 84:e9-12. 2011..To assess the attitudes of persons living with HIV/AIDS (PLWH) towards having their personal health information (PHI) stored and shared electronically...
- Advocating prevention over punishment: the risks of HIV criminalization in Burkina FasoPatrice Sanon
Réseau Accès aux Médicaments Essentiels RAME, Ouagadougou, Burkina Faso
Reprod Health Matters 17:146-53. 2009..The Burkina Faso law offers a number of protections for people with HIV, such as confidentiality of HIV test results, and holds the government accountable for providing health services for people with HIV ..
- A secure protocol for protecting the identity of providers when disclosing data for disease surveillanceKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario, Canada
J Am Med Inform Assoc 18:212-7. 2011Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance.
- Secondary uses and the governance of de-identified data: lessons from the human genome diversity panelStephanie M Fullerton
Department of Bioethics and Humanities, University of Washington School of Medicine, Seattle, 98195, USA
BMC Med Ethics 12:16. 2011....
- Confidentiality and parental involvement in adolescent sexual and reproductive health care: a cross-sectional study of Lithuanian general practitionersLina Jaruseviciene
Department of Family Medicine, Kaunas University of Medicine, Lithuania
Scand J Public Health 39:484-91. 2011We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group.
- A data-hiding technique with authentication, integration, and confidentiality for electronic patient recordsHui Mei Chao
Department of Electrical Engineering, De Lin Institute of Technology, Taipei County, Taiwan, ROC
IEEE Trans Inf Technol Biomed 6:46-53. 2002..the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet...
- Experiences of physicians who frequently use e-mail with patientsThomas K Houston
Department of Medicine, The Johns Hopkins University School of Medicine, Johns Hopkins University School of Hygiene and Public Health, Baltimore, MD 21205, USA
Health Commun 15:515-25. 2003..Increasing integration into practice to enhance time-saving aspects and improve patient education might lead to more sustained use of this promising communication tool...
- A model for expanded public health reporting in the context of HIPAASoumitra Sengupta
Department of Biomedical Informatics, Columbia University, New York, NY, USA
J Am Med Inform Assoc 15:569-74. 2008..The appropriateness of these approaches varies with the definition of what data may be included, the requirements of the minimum necessary standard, the accounting of disclosures, and the feasibility of the approach...
- Statutory basis for public health reporting beyond specific diseasesClaire V Broome
Centers for Disease Control and Prevention, Department of Health and Human Services, Atlanta, GA 30333, USA
J Urban Health 80:i14-22. 2003..The intent of these reporting laws and the Health Insurance Portability and Accountability Act Privacy Rule is to support this critical disease surveillance function for the benefit of the entire population...
- How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systemsBradley Malin
Data Privacy Laboratory, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213 3890, USA
J Biomed Inform 37:179-92. 2004..We propose that such techniques can be applied as system tests of privacy protection capabilities...
- The disclosure of diagnosis codes can breach research participants' privacyGrigorios Loukides
Department of Biomedical Informatics, School of Medicine, Vanderbilt University, Nashville, Tennessee 37203, USA
J Am Med Inform Assoc 17:322-7. 2010....
- Overcoming barriers to recruitment in health researchJenny Hewison
University of Leeds, Institute of Health Sciences and Public Health Research, Leeds LS2 9LT
BMJ 333:300-2. 2006
- Social but safe? Quality and safety of diabetes-related online social networksElissa R Weitzman
Children s Hospital Informatics Program at the Harvard MIT Division of Health Sciences and Technology, Children s Hospital Boston, Boston, Massachusetts, USA
J Am Med Inform Assoc 18:292-7. 2011..To foster informed decision-making about health social networking (SN) by patients and clinicians, the authors evaluated the quality/safety of SN sites' policies and practices...
- Truth and consequences: ethics, confidentiality, and disclosure in adolescent longitudinal prevention researchChristine Lothen-Kline
Department of Public and Community Health, College of Health and Human Performance, University of Maryland, College Park, Maryland 20742, USA
J Adolesc Health 33:385-94. 2003To examine data from a natural experiment resulting from a change made in the confidentiality agreement midway through a randomized, longitudinal, controlled trial to prevent or delay adolescent alcohol use...
- Protecting privacy using k-anonymityKhaled El Emam
Children s Hospital of Eastern Ontario Research Institute, Ottawa, Ontario K1J 8L1, Canada
J Am Med Inform Assoc 15:627-37. 2008..To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets...
- Content of weblogs written by health professionalsTara Lagu
Robert Wood Johnson Clinical Scholars Program, University of Pennsylvania, Philadelphia, PA 19104, USA
J Gen Intern Med 23:1642-6. 2008..Medical weblogs ("blogs") have emerged as a new connection between health professionals and the public...
- Effect of mandatory parental notification on adolescent girls' use of sexual health care servicesDiane M Reddy
Department of Psychology, University of Wisconsin Milwaukee, PO Box 413, Milwaukee, WI 53201, USA
JAMA 288:710-4. 2002..Recently, legislation that would prohibit prescribed contraceptives for adolescents without parental involvement was introduced in 10 states and the US Congress...
- A software tool for removing patient identifying information from clinical documentsF Jeff Friedlin
Regenstrief Institute, Indianapolis, IN 46202, USA
J Am Med Inform Assoc 15:601-10. 2008..We conclude that MeDS successfully de-identified a wide range of medical documents from numerous sources and creates scrubbed reports that retain their interpretability, thereby maintaining their usefulness for research...
- Patients' attitudes toward electronic health information exchange: qualitative studySteven R Simon
Department of Population Medicine, Harvard Medical School and Harvard Pilgrim Health Care, Boston, MA 02215, USA
J Med Internet Res 11:e30. 2009..In many countries, there has been substantial progress in establishing the electronic transmission of patients' health information between health care providers, but little is known about how best to engage patients in the process...
- Patients' attitudes towards sharing their health informationRichard Whiddett
Department of Information Systems, Massey University, Palmerston North, New Zealand
Int J Med Inform 75:530-41. 2006..This research investigated (1) the attitudes of patients toward sharing their medical information and (2) whether patients considered themselves to be well-informed about the uses that are made of their information...
- Data storage and DNA banking for biomedical research: informed consent, confidentiality, quality issues, ownership, return of benefits. A professional perspectiveBéatrice Godard
INSERM SC11, Hopital Broussais, Paris, France
Eur J Hum Genet 11:S88-122. 2003..Such standardization would facilitate a greater protection of individuals as well as future international cooperation in biomedical research...
- Consent for use of personal information for health research: do people with potentially stigmatizing health conditions and the general public differ in their opinions?Donald J Willison
Department of Clinical Epidemiology and Biostatistics, McMaster University, Hamilton, Ontario, Canada
BMC Med Ethics 10:10. 2009..Little is known about the opinion of those who have more or less stigmatizing health conditions regarding the need for consent for use of their personal information for health research...
- Ethics. Identifiability in genomic researchWilliam W Lowrance
Science 317:600-2. 2007
- Alternatives to project-specific consent for access to personal information for health research: what is the opinion of the Canadian public?Donald J Willison
Centre for Evaluation of Medicines, St Joseph s Healthcare, 105 Main Street East, P1, Hamilton, Ontario, Canada
J Am Med Inform Assoc 14:706-12. 2007..This study sought to determine public opinion on alternatives to project-specific consent for use of their personal information for health research...
- Beyond "misunderstanding": written information and decisions about taking part in a genetic epidemiology studyMary Dixon-Woods
University of Leicester, Leicester, UK
Soc Sci Med 65:2212-22. 2007..These questions need to be addressed through engagement and dialogue between the research, research participants, social science, and ethics communities...
- Attitudes to voluntary counselling and testing for HIV among pregnant women in rural south-west UgandaR Pool
Medical Research Council Programme on AIDS in Uganda, Entebbe, Uganda
AIDS Care 13:605-15. 2001..They were anxious, however, about confidentiality, and there was a widespread fear that maternity staff might refuse to assist them when the time came to ..
- Patient perspectives of medical confidentiality: a review of the literaturePamela Sankar
Center for Bioethics, University of Pennsylvania, Philadelphia, PA 19104 3308, USA
J Gen Intern Med 18:659-69. 2003To lay the groundwork for a better understanding of patient views on medical confidentiality.
- A research agenda for personal health records (PHRs)David C Kaelber
Partners HealthCare Information Systems, Boston MA, USA
J Am Med Inform Assoc 15:729-36. 2008..We believe that additional PHR research can increase the likelihood that future PHR system deployments will beneficially impact healthcare costs, quality, and efficiency...
- Ethics and biobanksM G Hansson
1Department of Public Health and Caring Sciences, Centre for Research Ethics and Bioethics, Uppsala University, Uppsala Science Park, Uppsala SE 751 85, Sweden
Br J Cancer 100:8-12. 2009..The difficult question regarding the return of information to research subjects is the focus of the current research, but a helpful analysis of some of the issues at stake and concrete recommendations have recently been suggested...
- Should donors be allowed to give broad consent to future biobank research?Mats G Hansson
Centre for Bioethics at Karolinska Institute and Uppsala University, Uppsala, Sweden
Lancet Oncol 7:266-9. 2006....
- Genetic research on stored tissue samples from minors: a systematic review of the ethical literatureKristien Hens
Katholieke Universiteit Leuven, Centre for Biomedical Ethics and Law, Leuven, Belgium
Am J Med Genet A 149:2346-58. 2009..We have described the different components of these themes, as they occurred in the literature and have provided a discourse on the topic...
- USB-based Personal Health Records: an analysis of features and functionalityFrancine L Maloney
Partners HealthCare, Clinical Informatics Research and Development, Wellesley, MA 02481, USA
Int J Med Inform 79:97-111. 2010..To determine the features of commercially available USB-based Personal Health Records (PHR) devices, and compare the commercial state of the art to recommendations made by certification committees...
- Privacy versus public health: the impact of current confidentiality rulesDaniel Wartenberg
Department of Environmental and Occupational Medicine, Robert Wood Johnson Medical School, University of Medicine and Dentistry of New Jersey, Piscatawa, NJ 08854, USA
Am J Public Health 100:407-12. 2010..However, recent concerns about identify theft, confidentiality, and patient privacy have led to increasingly restrictive policies on data access, often preventing ..
- Public health surveillance: historical origins, methods and evaluationS Declich
Department of Epidemiology, University of Ottawa, Canada
Bull World Health Organ 72:285-304. 1994..Finally, some points to be considered in establishing a new surveillance system are presented...
- Confidentiality laws and secrecy in medical research: improving public access to data on drug safetyAaron S Kesselheim
Division of Pharmacoepidemiology and Pharmacoeconomics, Brigham and Women s Hospital, Boston, Massachusetts, USA
Health Aff (Millwood) 26:483-91. 2007..We suggest regulatory and legislative policy changes regarding how the FDA handles confidential information that can improve understanding of the risks of prescription drugs...
- Developing a simplified consent form for biobankingLaura M Beskow
Center for Genome Ethics, Law and Policy, Duke Institute for Genome Sciences and Policy, Duke University, Durham, North Carolina, United States of America
PLoS ONE 5:e13302. 2010..We then gathered preliminary data concerning its content from hypothetical biobank participants...
- 2008 European Guideline on HIV testingM Poljak
Faculty of Medicine, Institute of Microbiology and Immunology, University of Liubljana, Zatoska 4, 1000, Ljubljana, Slovenia
Int J STD AIDS 20:77-83. 2009..Its aim is to provide practical guidance to clinicians in these settings who undertake HIV testing and suggest appropriate standards for the audit of service provision...
- Sharing patient data: competing demands of privacy, trust and research in primary careMargaret A Stone
Department of Health Sciences, University of Leicester
Br J Gen Pract 55:783-9. 2005..Patient privacy may conflict with the advancement of knowledge through data sharing. The data contained in primary care records are uniquely comprehensive...
- Research on medical records without informed consentFranklin G Miller
Department of Bioethics, National Institutes of Health, USA
J Law Med Ethics 36:560-6. 2008..This article analyzes the scope of these norms and provides an ethical justification for research using personally identifiable medical information without consent...
- Consent, confidentiality, and the Data Protection ActAmy Iversen
King s Centre for Military Health Research, King s College London, Institute of Psychiatry, London
BMJ 332:165-9. 2006
- Alternatives to project-specific consent for access to personal information for health research: insights from a public dialogueDonald J Willison
Department of Clinical Epidemiology and Biostatistics, McMaster University, Hamilton, Canada
BMC Med Ethics 9:18. 2008..We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues...
- Factors influencing attitudes towards medical confidentiality among Swiss physiciansB S Elger
University Center of Legal Medicine of Geneva and Lausanne, Switzerland
J Med Ethics 35:517-24. 2009Medical confidentiality is a core concept of professionalism and should be an integral part of pregraduate and postgraduate medical education...
- What do Islamic institutional fatwas say about medical and research confidentiality and breach of confidentiality?Ghiath Alahmad
National Guard Health Affairs, King Abdullah International Research Center, P O Box 22490 mail code 1515 Riyadh 11426, Saudi Arabia
Dev World Bioeth 12:104-12. 2012Protecting confidentiality is an essential value in all human relationships, no less in medical practice and research...
- Patient privacy and social mediaAmy L Hader
American Association of Nurse Anesthetists, Park Ridge, Illinois, USA
AANA J 78:270-4. 2010..Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics...
- The legal and ethical aspects of telemedicine. 1: Confidentiality and the patient's rights of accessB Stanberry
Seafarers International Research Centre, Department of Maritime Studies and International Transport, University of Wales, Cardiff, UK
J Telemed Telecare 3:179-87. 1997This paper reviews the principle of confidentiality and the rights of access by patients to their medical records...
- STRUCTURE-BASED TUBERCULOSIS DRUG DESIGN TARGETED AT ACYL-COA CARBOXYLASEShiou Chuan Tsai; Fiscal Year: 2010..PERFORMANCE SITE(S) (organization, city, state) University of California, Irvine, CA 92697, USA REVISED ABSTRACT SECTION ..
- Genome-wide recombination as a risk factor for nondisjunctionNATASHA D HOLLIS; Fiscal Year: 2010..The research plan is well written and attention has been paid to potential risks and confidentiality issues. The preliminary data collected suggest a high likelihood of success of the project...
- Behavioral Activation Therapy for Rural Veterans with Diabetes and DepressionAanand Dinkar Naik; Fiscal Year: 2013..7. Human Subject Protections. Acceptable. The primary risks associated with this study are risks to confidentiality and possible psychological distress associated with questionnaires or the content of the intervention...
- NADPH oxidase-associated transition from Barrett's esophagus to adenocarcinomaWeibiao Cao; Fiscal Year: 2013..In addition, NOX5-S may be a potential biomarker for early detection of esophageal dysplasia. Our model may also be applicable to other inflammation-associated cancers. ..
- Protein Structure/Function by NMR, Crystallography and Computational ChemistryEric Oldfield; Fiscal Year: 2012....
- Epithelial Regulation of Th2 Immune Responses in the LungMarsha Wills-Karp; Fiscal Year: 2013..List all other key personnel in alphabetical order, last name first. Name eRA Commons User Name Organization Role on Project Wills-Karp, Marsha Wildc7 CCHMC PI Finkelman, Fred frefin CCHMC Co-Investigator ..
- 10-Theory and Experiment for Genome Packaging in HBV NucleocapsidsJIANZHONG contact WU; Fiscal Year: 2010....
- DNA cross-linking by diepoxybutaneNatalia Y Tretyakova; Fiscal Year: 2013..PERFORMANCE SITE(S) (organization, city, state) The Cancer Center, University of Minnesota Minneapolis, Minnesota ..
- Mechanism of Heat Shock Protein Induction by GlutaminePaul E Wischmeyer; Fiscal Year: 2012..abstract_text> ..
- Aging Together: Brothers and Sisters of the Wisconsin Longitudinal StudyJohn Robert Warren; Fiscal Year: 2013..directly or through a secure data enclave, consistent with high standards of protection for the privacy and confidentiality of research participants-as soon as they have been collected, cleaned, and documented...
- Strengthening Supports for Healthy Relationships: A Gender-Sensitive, Mixed MethoPoco Kernsmith; Fiscal Year: 2013..At each stage of the research process, extensive measures will be taken to preserve the confidentiality of participants...
- NEWBORN SCREENING TRANSLATIONAL RESEARCH NETWORK (NBSTRN)Michael Watson; Fiscal Year: 2013..promote progress and avoid fragmentation of effort Develop policies and procedures that support privacy and confidentiality of patient-related information as well as appropriate rules by which to conduct the research The NBSTRN works ..
- Rapid Response Surveillance Study #09-5 - Constructing Geographic Areas in GIS foSally L Glaser; Fiscal Year: 2009..estimating reliable tract-level incidence rates that would not jeopardize patients[unreadable] privacy and confidentiality. Several geographic strategies have been proposed to mitigate the problem...
- Molecular mechanisms of Axenfeld-Rieger syndromeElena V Semina; Fiscal Year: 2013....
- Molecular characterization of congenital cataractElena V Semina; Fiscal Year: 2013..Name Organization Role on Project Elena V. Semina, PhD Medical College of Wisconsin PI Disclosure Permission Statement. Applicable to SBIR/STTR Only. See instructions. Yes No PHS 398 (Rev. 05/01) Page _2___ Form Page 2 ..
- Patient Awareness and Consumer Education Research Cente*Maria E Suarez Almazor; Fiscal Year: 2010..Publications 2. Research Grants 3. Conceptual Framework &DemonstrationProjects 4. VisionTree Software PHS 398 (Rev. 09/04) Page 4 Form Page 3 ..
- Primary biliary cirrhosis: molecular genetics and microbial pathogenesisJochen Mattner; Fiscal Year: 2013..BENDELAC University of Chicago Consultant Hildeman, David DHILDE CCHMC Consultant University of Pittsburgh ..
- The Effects of Insiderness on Data in the Dominican RepublicMARIANO SANA; Fiscal Year: 2010..on data quality are reduced when self-administered questionnaires are used to increase confidence in response confidentiality;and (d) explore how characteristics associated with respondents, interviewers, and the interview process ..
- Assessing the Accuracy of Self-Report of HIV Testing BehaviorKaren J Chronister; Fiscal Year: 2011..in surveillance procedures and protocols developed following CDC guidelines with special consideration to confidentiality and security...
- Data Coordinating Center for Autism &Other Developmental Disabilities: SEED I&IIPhilip L Reed; Fiscal Year: 2013..levels and capabilities;(5) Maintain information system infrastructure;(6) Provide leadership regarding data confidentiality and security policies;(7) Support study sites, and users broadly;(7) facilitte data sharing, data access for ..
- Integrated Samples of Eurasian CensusesROBERT EDWARD MCCAA; Fiscal Year: 2013..This work involved data cleaning, drawing samples, implementing confidentiality protections, creating integrated variables, developing comprehensive metadata, and disseminating the data and ..
- An Audio Music Self-management Program to Improve ART Adherence in Rural GAMarcia McDonnell Holstad; Fiscal Year: 2013..the delivery of HIV adherence self-management education by overcoming barriers of isolation, transportation, confidentiality and stigma in this vulnerable group...
- Adapting the Women's CoOp for At-Risk TeensWendee M Wechsberg; Fiscal Year: 2011..g., age, relationships with males, changes in knowledge about HIV risk behaviors, and competency in active refusal, negotiation, and condom skills). ..
- Autism Genetics, Phase II: Increasing Representation of Human DiversityMatthew W State; Fiscal Year: 2013..As has been our practice, our Network will make all phenotypic and genotype data accessible via the internet on a rolling basis, further enhancing the value of this resource to the community. ..
- Professional Dilemmas:Health Workers'Perceptions of Postabortion Care in SenegalJULIA SIRI SUH; Fiscal Year: 2012..The research protocol will protect confidentiality and anonymity of respondents...
- Barriers to Alcohol, Drug and PTSD Treatment for Returning National GuardRoland S Moore; Fiscal Year: 2013..g., military and civilian employer screening procedures, lack of military confidentiality, insurance coverage, promotion policies and procedures, etc...
- Prenatal tobacco exposure: effects on neuropsychological outcomes and ADHDValerie S Knopik; Fiscal Year: 2013..abstract_text> ..
- Tennessee Valley Cooperative Human Tissue NetworkMary Kay Washington; Fiscal Year: 2013..quality control on all tissues harvested to ensure tissue quality and appropriateness;6) to protect patient confidentiality by developing and implementing improved approaches to obtain explicit informed consent for use of extraneous ..
- Developing Rwandan Research Capacity in Cervical Cancer and other AIDS MalignanciKathryn M Anastos; Fiscal Year: 2013..both the epidemiologist and local staff in the use of registry matching, with appropriate steps to guard confidentiality, as a powerful epidemiologic tool elucidating ARM patterns in the era of AIDS treatment in Africa...
- Shaping the Health of Adolescents in Zimbabwe (SHAZ!)MEGAN SUZANNE DUNBAR; Fiscal Year: 2013..savings, as well as conceal the HIV status of study participants, facilitating our ethical mandate to ensure confidentiality. Through our proposed design-that brings together the Women's Global Health Imperative at RTI ..
- Affective influences on adolescent sexual risk behavior: Couple &family contextsVINCENT M GUILAMO-RAMOS; Fiscal Year: 2013..abstract_text> ..
- Vanderbilt Genome Electronic Records ProjectDan M Roden; Fiscal Year: 2013..4) To develop new tools to maximize our ability to effectively share genomic information and ensure patient confidentiality. We subscribe to a vision of Personalized Medicine in which genomic and other patient-specific information ..
- TAS::75 0850::TAS RECOVERY ACT ADOPT COMMON INFRASTRUCTURE SUPPORT UNDER OPERATISUDHIR RAJU; Fiscal Year: 2009..unreadable] Improve communication between CTEP and its collaborators. [unreadable] Assure the security and confidentiality of proprietary and patient information...
- Sharing Restricted Data for Secondary Research: Evolving Tools and ProtocolsJames W McNally; Fiscal Year: 2013..In recent years growing concern over data confidentiality has emerged as a core directly impacting access to and the availably of research data for secondary analysis...
- Families created by assisted reproduction: parenting and child developmentSUSAN ESTHER GOLOMBOK; Fiscal Year: 2011..These samples are the first of their kind to be followed up from infancy, thus providing an opportunity to examine the influence of early experience on later development in these new family forms. ..
- Archiving Additional Waves of the Swedish Adoption/Twin Study of Aging (SATSA)Nancy L Pedersen; Fiscal Year: 2012..the course of preparing data files for archiving, we will further de-identify the data o protect the confidentiality of participants...
- Community Appalachian Investigation and Research Network (CAIRN)ANN L CHESTER; Fiscal Year: 2010..Health Portal to facilitate bidirectional information flow and organization while maintaining security and confidentiality. These cores are designed to interface the community and academia, and interact seamlessly with each other...
- MULTIDISCIPLINARY ENVIRONMENTAL HEALTH TRAININGDavid Carpenter; Fiscal Year: 2006..Foreign Collaborator Major Foreign Collaborator Major Foreign Collaborator Major Foreign Collaborator Major Foreign Collaborator BB tf Principal Wcstigator/Program Director (Last, first, middle): C^Bpenter, David OrlO ..
- POL and Access Intervention to Reduce HIV Stigma among Service Providers in ChinaLi Li; Fiscal Year: 2012..settings discourages PLH from seeking care if they previously experienced unwelcoming treatment or their confidentiality was not protected...
- Advancing Spatial Evaluation Methods to Improve Healthcare Efficiency and QualityLuc Anselin; Fiscal Year: 2013..abstract_text> ..
- Action for Health in Diabetes Brain Magnetic Resonance Imaging Ancillary StudyMARK ANDREW ESPELAND; Fiscal Year: 2013..be willing to join brain imaging studies and we have developed successful protocols for maintaining safety, confidentiality, and quality...
- Rethinking Informed Consent for Pragmatic Comparative Effectiveness TrialsDanielle Whicher; Fiscal Year: 2011..the use of data from electronic medical records for research purposes, including how to manage privacy and confidentiality and whether informed consent is required from patients...
- Optimal Micro-Data Switching: An Enhanced Framework and Decision Tool for ConfidJames Kelly; Fiscal Year: 2009..make the data available for analysis without disclosing information that would infringe on privacy, violate confidentiality, or endanger national security...
- Using Community Participation to Improve the Health System in South IndiaKAIVAN MUNSHI; Fiscal Year: 2013..receiving direct benefits in return-is seen as the primary motivation for community volunteers when strict confidentiality must be maintained, as with TB case management...
- Community Context of Colorectal Cancer DisparitiesJim P Stimpson; Fiscal Year: 2012..NHIS was collected under statutory authority that requires strict protection of respondent confidentiality. To maintain confidentiality, public versions of these data do not contain aggregate level identifiers...
- DRW HIV-Ab/HBsAg Duplex Rapid Test submission for FDA-PMA approvalHelen Lee; Fiscal Year: 2009..This is especially true in blood banks processing less than10,000 donations/year located in regions of high prevalence for the HIV and HBV viral markers. Confidential information: patent application in process ..
- Genome-Wide Study of Cataract and Low HDL in the Personalized Medicine Research PCatherine Anne McCarty; Fiscal Year: 2010..conduct of whole genome association studies, and maximize data sharing without compromising data security or confidentiality, 3a) elucidate combinations of genetic markers that predispose subjects to the development of cataract, 3b) ..
- Probing optical property changes in photonic materials for faster timing in PETCraig S Levin; Fiscal Year: 2013..The following contains confidential information that should not be used except for purpose of review and evaluation of this proposal. ..
- Preparing for research careers related to diabetes, digestive and kidney diseasesWILLIAM BRIAN REEVES; Fiscal Year: 2013..The curriculum will also include discussions on normative standards of conduct, privacy and confidentiality issues, laboratory safety, research integrity, record keeping, data management, and communication skills...
- Carolinas Conversations: A Multiethnic Digital Corpus of Speech for Older PersonsCharlene Pope; Fiscal Year: 2009..Privacy and confidentiality will be maintained for the persons recorded, using previously developed consent procedures and research ..
- Exploring New Methods for Protecting and Distributing Confidential Research DataFELICIA B LECLERE; Fiscal Year: 2010..Each custom system will secure the data storage and usage environment in accordance with the confidentiality requirements of each data file...
- Software Leveraging a Standards-Based Web Service Framework for Decision SupportDavid Lobach; Fiscal Year: 2009..Increased use of decision support tools can be expected to improve care quality, reduce medical errors, lower healthcare costs, and augment disease management for patients and populations. ..
- Para un Futuro: Feasability of a Photovoice approach to Increase Latino Parent-AdMeagan Gallagher; Fiscal Year: 2009..At the beginning of each data collection activity, the interviewer or group facilitator will confirm confidentiality and the participant's right to refuse participation...
- COOPERATIVE HUMAN TISSUE NETWORKWilliam E Grizzle; Fiscal Year: 2013..the scientists receiving tissues and the CHTN;3) development of regulatory policies to include: positions on confidentiality and informed consent;inclusion of guidelines for implementation of new and modified Federal regulations and ..
- Geisinger eGenonic Medicine (GeM) ProgramMarc S Williams; Fiscal Year: 2013..and tissue) that are linkable to data in the Geisinger EMR for broad research use in a manner that protects confidentiality of patient information...
- NYSDOH Hurricane Sandy Recovery: Priority Research Area C - Evaluation of the PubGuthrie S Birkhead; Fiscal Year: 2013..analysis will be conducted as approved by the NYSDOH Institutional Review Board to assure informed consent and confidentiality. All research activities will be overseen by a Guidance Team with academic, local, and state representatives.
- Curricular and Pedagogical Innovations in Quantitative BiologyWeigang Qiu; Fiscal Year: 2012..The proposed project will produce a future generation of scientists with the quantitative skills required for biomedical research in the 21st century. PERFORMANCE ..
- SBIRT (Pain Management) for Veterans Filing Compensation ClaimsMarc I Rosen; Fiscal Year: 2013..SBIRT-PM will be delivered around the time of the Compensation examination by a counselor, with confidentiality assured...
- Expansion Research Capability to Study Comparative Effectiveness in Complex Pati*Youjie Huang; Fiscal Year: 2010..The linked data will be documented. Protection of patient's confidentiality will be enforced throughout the project...
- New Technology to Preserve Patient Privacy and Data Quality in Health ResearchXiaoBai Li; Fiscal Year: 2013..By adequately protecting privacy, the proposed technology will alleviate concerns about loss of participant confidentiality and enable improved quality and efficiency for research based on secondary use of data...
- UCSD Integrated Cardiovascular Epidemiology FellowshipBESS HYA MARCUS; Fiscal Year: 2013..didactic coursework on epidemiology and /or behavioral medicine, protection of human subjects in research, confidentiality requirements, elements of appropriate and unbiased analysis of data, and, after the completion of training, ..
- School-based Health Clinics: Effects on Youth and Young Adult Sexual BehaviorMelina Bersamin; Fiscal Year: 2013..g., finances, confidentiality concerns;Kirby, 2002);and (3) directly or indirectly expose youth to family planning resources and services ..
- ETHICS COURSE SCIENTIST-PARTICIPANT PARTNERSHIPSCelia Fisher; Fiscal Year: 2000..adults with impaired capacity to consent, and federal guidelines for emergency research consent waivers; (5) confidentiality procedures including ethical issues associated with genetic testing, HIV/AIDS related research, and use of ..
- Rural Trial of Clinic Order Entry with Decision SupportMatthew Samore; Fiscal Year: 2006..will allow common access to records across providers who share patients while maintaining strict levels of confidentiality. The CCOE decision support logic will encompass drug interactions, allergy contraindications, disease ..
- International Program for Mining Health and SafetyJefferey Burgess; Fiscal Year: 2006..Jefferey L. Type the name of the principal investigator/program director at the top of each printed page and each continuation page. (For type specifications, see instructions on page 6.) RESEARCH GRANT ..
- Novel Corneal Implant MaterialsShiao Chang; Fiscal Year: 2006..The name of the principal investigator/program director must be provided at the top of each printed page and each continuation page. RESEARCH GRANT ..
- TRAINING PROGRAM IN GENETICS AND GENOMICSWilliam Gelbart; Fiscal Year: 2006..Type the name of the program director at the top of each printed page and each continuation page. (For type specifications, see instructions on page 6.) INSTITUTIONAL NATIONAL RESEARCH SERVICE AWARD (Substitute Page) ..
- AIDS Stigma & Gender: Health Consequences in Urban IndiaMaria Ekstrand; Fiscal Year: 2006..additional charges for protective equipment such as extra gloves, masks, fumigation of rooms, and lack of confidentiality. The data also suggest that AIDS stigma in urban India is a gendered phenomenon...
- Congenital and neonatal malaria in MaliAbdoulaye Djimde; Fiscal Year: 2006..research grant ..
- The Sexual Abuse of Vulnerable Adults in InstitutionsPamela Teaster; Fiscal Year: 2006..abstract_text> ..
- Analyzing the Effectiveness of a Non-Verbal Response Card: Evidence from EthiopiaDavid Lindstrom; Fiscal Year: 2009..The card increases the level of privacy and confidentiality in an interviewer- administered survey, and it makes minimal cognitive demands on the respondent...
- Nanoscale patterning that promotes cell adhesionHEATHER MAYNARD; Fiscal Year: 2006..research grant ..