Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-06T09:11:44.356Z Has data issue: false hasContentIssue false

11 - Portable Approaches to Informed Consent and Open Data

Published online by Cambridge University Press:  05 July 2014

John Wilbanks
Affiliation:
Sage Bionetworks
Julia Lane
Affiliation:
American Institutes for Research, Washington DC
Victoria Stodden
Affiliation:
Columbia University, New York
Stefan Bender
Affiliation:
Institute for Employment Research of the German Federal Employment Agency
Helen Nissenbaum
Affiliation:
New York University
Get access

Summary

Introduction

What frameworks are available to permit data reuse? How can legal and technical systems be structured to allow people to donate their data to science? What are appropriate methods for repurposing traditional consent forms so that user-donated data can be gathered, de-identified, and syndicated for use in computational research environments?

This chapter will examine how traditional frameworks for permitting data reuse have been left behind by the mix of advanced techniques for re-identification and cheap technologies for the creation of data about individuals. Existing systems typically depend on the idea that de-identification is robust and stable, despite significant evidence that re-identification is regularly possible on at least some portion of a de-identified cohort. The promise that privacy can always be protected, that data can always be de-identified or made anonymous, is at odds with many of the emerging realities of our world.

At issue here is a real risk to scientific progress. If privacy concerns block the redistribution of data on which scientific and policy conclusions are based, then those conclusions will be difficult to justify to the public who must understand them. We must find a balance between our ability to make and produce identifiable data, the known failure rates of de-identification systems, and our need for policy and technology supported by ‘good’ data. If we cannot find this balance we risk a tragedy of the data commons in which the justifications for social, scientific, and political actions are available only to a select few.

Type
Chapter
Information
Privacy, Big Data, and the Public Good
Frameworks for Engagement
, pp. 234 - 252
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Porter, C. Christine, “De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information,” Shidler Journal of Law, Commerce and Technology 5 (September 23, 2008): 3Google Scholar
Ohm, Paul, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization” (August 13, 2009); UCLA Law Review 57 (2010)Google Scholar
Bambauer, Jane R., “Tragedy of the Data Commons,” Harvard Journal of Law and Technology 25 (2011): 1–67Google Scholar
Charkham, Avi, “5 Design Tricks Facebook Uses to Affect Your Privacy Decisions,” TechCrunch, August 25, 2012
Sachidanandam, R., Weissman, D., Schmidt, S. C., Kakol, J. M., Stein, L. D., Marth, G., Sherry, S., Mullikin, J. C., Mortimore, B. J., Willey, D. L., Hunt, S. E., Cole, C. G., Coggill, P. C., Rice, C. M., Ning, Z., Rogers, J., Bentley, D. R., Kwok, P. Y., Mardis, E. R., Yeh, R. T., Schultz, B., Cook, L., Davenport, R., Dante, M., Fulton, L., Hillier, L., Waterston, R. H., McPherson, J. D., Gilman, B., Schaffner, S., Van Etten, W. J., Reich, D., Higgins, J., Daly, M. J., Blumenstiel, B., Baldwin, J., Stange-Thomann, N., Zody, M. C., Linton, L., Lander, E. S., Altshuler, D., and International SNP Map Working Group, “A Map of Human Genome Sequence Variation Containing 1.42 Million Single Nucleotide Polymorphisms,” Nature 409, no. 6822 (February 15, 2001): 928–933CrossRefGoogle ScholarPubMed
Clabby, Catherine, “DNA Research Commons Scaled Back,” American Scientist 97, no. 2 (March–April 2009): 113CrossRefGoogle Scholar
Homer, Nils, Szelinger, Szabolcs, Redman, Margot, Duggan, David, Tembe, Waibhav, Muehling, Jill, Pearson, John V., Stephan, Dietrich A., Nelson, Stanley F., and Craig, David W., “Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays,” PLOS Genetics 4, no. 8 (August 29, 2008): e1000167CrossRefGoogle ScholarPubMed
Jacobs, Kevin B., Yeager, Meredith, Wacholder, Sholom, Craig, David, Kraft, Peter, Hunter, David J., Paschal, Justin, Manolio, Teri A., Tucker, Margaret, Hoover, Robert N., Thomas, Gilles D., Chanock, Stephen J., and Chatterjee, Nilanjan, “A New Statistic and Its Power to Infer Membership in a Genome-Wide Association Study using Genotype Frequencies,” Nature Genetics 41 (2009): 1253–1257CrossRefGoogle Scholar
El Emam, Khaled and Dankar, Fida Kamal, “Protecting Privacy Using k-Anonymity,” Journal of the American Medical Informatics Association 15, no. 5 (2008): 627–637CrossRefGoogle ScholarPubMed
Kamm, Liina, Bogdanov, Dan, Laur, Sven, and Vilo, Jaak, “A New Way to Protect Privacy in Large-Scale Genome-Wide Association Studies,” Bioinformatics 29, no. 7 (April 1, 2013): 886–893CrossRefGoogle ScholarPubMed
Micciancio, Daniele, “Technical Perspective: A First Glimpse of Cryptography’s Holy Grail,” Communications of the ACM 53, no. 3 (2010): 96CrossRefGoogle Scholar
Bogetoft, P. et al., “Secure Multiparty Computation Goes Live,” in Proc. Financial Cryptography 2009, ed. Dingledine, R. and Golle, P., Lecture Notes in Computer Science 5628 (Heidelberg: Springer, 2009), 325–343Google Scholar
Bogdanov, D. et al., “Deploying Secure Multi-party Computation for Financial Data Analysis,” in Proc. Financial Cryptography 2012, Lecture Notes in Computer Science 7397 (Heidelberg: Springer, 2012), 57–64Google Scholar
Antonenko, P. and Niederhauser, D., “The Influence of Leads on Cognitive Load and Learning in a Hypertext Environment,” Computers in Human Behavior 26, no. 2 (March 2010): 140–150CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×