Title

References

“After Havasupai Litigation, Native Americans Wary of Genetic Research.” 2010. American Journal of Medical Genetics Part A 152A (7): fm ix–. https://doi.org/10.1002/ajmg.a.33592.
Baggerly, Keith. 2018. “What ‘Data Thugs’ Really Need.” Nature, October. https://doi.org/10.1038/d41586-018-06903-2.
Baggerly, Keith A., and Kevin R. Coombes. 2009. “Deriving Chemosensitivity from Cell Lines: Forensic Bioinformatics and Reproducible Research in High-Throughput Biology.” The Annals of Applied Statistics 3 (4): 1309–34. https://doi.org/10.1214/09-AOAS291.
Begay, Rene L., Nanibaa’ A. Garrison, Franklin Sage, Mark Bauer, Ursula Knoki-Wilson, David H. Begay, Beverly Becenti-Pigman, and Katrina G. Claw. 2020. “Weaving the Strands of Life (Iiná Bitł’ool): History of Genetic Research Involving Navajo People.” Human Biology 91 (3): 189–208. https://doi.org/10.13110/humanbiology.91.3.04.
Broman, Karl W, Mark P Keller, Aimee Teo Broman, Christina Kendziorski, Brian S Yandell, Śaunak Sen, and Alan D Attie. 2015. “Identification and Correction of Sample Mix-Ups in Expression Genetic Data: A Case Study.” G3 GenesGenomesGenetics 5 (10): 2177–86. https://doi.org/10.1534/g3.115.019778.
Byrd, James Brian, Anna C. Greene, Deepashree Venkatesh Prasad, Xiaoqian Jiang, and Casey S. Greene. 2020. “Responsible, Practical Genomic Data Sharing That Accelerates Research.” Nature Reviews Genetics 21 (10): 615–29. https://doi.org/10.1038/s41576-020-0257-5.
“Cache (Computing).” 2022. Wikipedia. https://en.wikipedia.org/w/index.php?title=Cache_(computing)&oldid=1084000712.
Chen, Boyu, Hao Jin, Zhiwen Yang, Yingying Qu, Heng Weng, and Tianyong Hao. 2019. “An Approach for Transgender Population Information Extraction and Summarization from Clinical Trial Text.” BMC Medical Informatics and Decision Making 19 (Suppl 2). https://doi.org/10.1186/s12911-019-0768-1.
Chiruvella, Varsha, and Achuta Kumar Guddati. 2021. “Ethical Issues in Patient Data Ownership.” Interactive Journal of Medical Research 10 (2): e22269. https://doi.org/10.2196/22269.
Clark, Luther T., Laurence Watkins, Ileana L. Piña, Mary Elmer, Ola Akinboboye, Millicent Gorham, Brenda Jamerson, et al. 2019. “Increasing Diversity in Clinical Trials: Overcoming Critical Barriers.” Current Problems in Cardiology 44 (5): 148–72. https://doi.org/10.1016/j.cpcardiol.2018.11.002.
Colavizza, Giovanni, Iain Hrynaszkiewicz, Isla Staden, Kirstie Whitaker, and Barbara McGillivray. 2020. “The Citation Advantage of Linking Publications to Research Data.” PLOS ONE 15 (4): e0230416. https://doi.org/10.1371/journal.pone.0230416.
Commissioner, Office of the. 2020. “A Guide to Informed Consent.” U.S. Food and Drug Administration. https://www.fda.gov/regulatory-information/search-fda-guidance-documents/guide-informed-consent.
Daniel, Brett. n.d. “Symmetric Vs. Asymmetric Encryption: What’s the Difference.” Trenton Systems. https://www.trentonsystems.com/blog/symmetric-vs-asymmetric-encryption.
“Data Erasure.” 2021. Wikipedia. https://en.wikipedia.org/w/index.php?title=Data_erasure&oldid=1055626662.
Davis, Mark S., Michelle Riske-Morris, and Sebastian R. Diaz. 2007. “Causal Factors Implicated in Research Misconduct: Evidence from ORI Case Files.” Science and Engineering Ethics 13 (4): 395–414. https://doi.org/10.1007/s11948-007-9045-2.
“De-Identification.” 2022. Wikipedia. https://en.wikipedia.org/w/index.php?title=De-identification&oldid=1072643318.
DiNardi, Gaetano. 2022. “14 Dangers of Identity Theft With Serious Consequences Aura.” https://www.aura.com/learn/dangers-of-identity-theft.
Durken, Helen. 2021. “How to Keep Data on USB Flash Drives Safe.” MyMemory Blog. https://www.mymemory.co.uk/blog/how-to-keep-data-on-usb-flash-drives-safe/.
eLearning, Inspired. 2018. “Most Common HIPAA Violations With Examples.” Inspired eLearning. https://inspiredelearning.com/blog/hipaa-violation-examples/.
Farmer, Paul. 2004. Pathologies of Power: Health, Human Rights, and the New War on the Poor. University of California Press. https://doi.org/doi:10.1525/9780520931473.
“File-System Permissions.” 2021. Wikipedia. https://en.wikipedia.org/w/index.php?title=File-system_permissions&oldid=1035316630.
Garrison, Nanibaa’ A. 2013. “Genomic Justice for Native Americans: Impact of the Havasupai Case on Genetic Research.” Science, Technology & Human Values 38 (2): 201–23. https://doi.org/10.1177/0162243912470009.
Garrison, Nanibaa’ A., Māui Hudson, Leah L. Ballantyne, Ibrahim Garba, Andrew Martinez, Maile Taualii, Laura Arbour, Nadine R. Caron, and Stephanie Carroll Rainie. 2019. “Genomic Research Through an Indigenous Lens: Understanding the Expectations.” Annual Review of Genomics and Human Genetics 20 (1): 495–517. https://doi.org/10.1146/annurev-genom-083118-015434.
Gilbertson, Scott. 2021. “4 Best VPN Services (2022): For Routers, PC, iPhone, Android, and More WIRED.” https://www.wired.com/story/best-vpn/.
“Guidelines for Strong Passwords · Information Technology Services · Lafayette College.” n.d. Accessed February 10, 2022. https://its.lafayette.edu/policies/strongpasswords/.
“Guiding Principles for Ethical Research.” 2015. National Institutes of Health (NIH). https://www.nih.gov/health-information/nih-clinical-research-trials-you/guiding-principles-ethical-research.
“Henrietta Lacks: Science Must Right a Historical Wrong.” 2020. Nature 585 (7823): 7–7. https://doi.org/10.1038/d41586-020-02494-z.
Higgins, Gerald L. 1989. “The History of Confidentiality in Medicine: The Physician-Patient Relationship.” Canadian Family Physician Medecin De Famille Canadien 35 (April): 921–26.
HIPAA Privacy Regulations: Other Requirements Relating to Uses and Disclosures of Protected Health Information: Re-Identification - § 164.514(c).” n.d. Accessed May 19, 2022. https://www.bricker.com/industries-practices/health-care/insights-resources/resource/hipaa-privacy-regulations-other-requirements-relating-to-uses-and-disclosures-of-protected-health-information-re-identification-%c2%a7-164514c-368.
“Hippocratic Oath.” 2023. Wikipedia. https://en.wikipedia.org/w/index.php?title=Hippocratic_Oath&oldid=1145959645.
Hummel, Patrik, Matthias Braun, Max Tretter, and Peter Dabrock. 2021. “Data Sovereignty: A Review.” Big Data & Society 8 (1): 2053951720982012. https://doi.org/10.1177/2053951720982012.
“Informed Consent.” 2023. Wikipedia. https://en.wikipedia.org/w/index.php?title=Informed_consent&oldid=1147352914.
IOWA STATE UNIVERSITY Institutional Review BoardRecruitment of Research Participants.” 2015. https://www.compliance.iastate.edu/sites/default/files/imported/irb/guide/docs/Recruitment%20of%20Research%20Participants.pdf.
Kramer, Shelly. 2019. “Surescripts ReMy Health Breakup Creates Painful Situation for Amazon’s PillPack.” Futurum Research. https://futurumresearch.com/research-notes/surescripts-remy-health-breakup-creates-painful-situation-for-amazons-pillpack/.
“Least Privilege CISA.” n.d. Accessed November 16, 2021. https://us-cert.cisa.gov/bsi/articles/knowledge/principles/least-privilege#footnoteref1_jh2zxwu.
Lipworth, Wendy, Paul H. Mason, and Ian Kerridge. 2017. “Ethics and Epistemology of Big Data.” Journal of Bioethical Inquiry 14 (4): 485–88. https://doi.org/10.1007/s11673-017-9815-8.
“Manage File Permissions on Unix-Like Systems.” n.d. Accessed November 18, 2021. https://kb.iu.edu/d/abdb.
McKeown, Alex, Miranda Mourby, Paul Harrison, Sophie Walker, Mark Sheehan, and Ilina Singh. 2021. “Ethical Issues in Consent for the Reuse of Data in Health Data Platforms.” Science and Engineering Ethics 27 (1): 9. https://doi.org/10.1007/s11948-021-00282-0.
McVean, Ada. 2019. “40 Years of Human Experimentation in America: The Tuskegee Study.” Office for Science and Society. https://www.mcgill.ca/oss/article/history/40-years-human-experimentation-america-tuskegee-study.
Melvin, Holly. 2020. “Medical Ethics: Ethical Dilemmas in Healthcare.” Education Projects Group. https://educationprojects.co.uk/medical-ethics-ethical-dilemmas-in-healthcare/.
“Memory Caching.” n.d. Hazelcast. Accessed April 24, 2022. https://hazelcast.com/glossary/memory-caching/.
Moskop, John C., Catherine A. Marco, Gregory Luke Larkin, Joel M. Geiderman, and Arthur R. Derse. 2005. “From Hippocrates to HIPAA: Privacy and Confidentiality in Emergency MedicinePart I: Conceptual, Moral, and Legal Foundations.” Annals of Emergency Medicine 45 (1): 53–59. https://doi.org/10.1016/j.annemergmed.2004.08.008.
MyHeritage Statement About a Cybersecurity Incident.” 2018. MyHeritage Blog. https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/.
National Academies of Sciences, Engineering, Policy and Global Affairs, Engineering Committee on Science, and Committee on Responsible Science. 2017. Detailed Case Histories. National Academies Press (US). https://www.ncbi.nlm.nih.gov/books/NBK475955/.
“Phishing.” 2022. Wikipedia. https://en.wikipedia.org/w/index.php?title=Phishing&oldid=1089465113.
Posey, Brien. 2021. “Modernizing the 3-2-1 Backup RuleRedmondmag.com.” https://redmondmag.com/articles/2021/12/01/modernizing-the-3-2-1-backup-rule.aspx.
“Privacy Act of 1974.” 2022. Wikipedia. https://en.wikipedia.org/w/index.php?title=Privacy_Act_of_1974&oldid=1107883305.
Protections (OHRP), Office for Human Research. 2017. “Attachment F - Recommendations on Reporting Incidental Findings.” Text. HHS.gov. https://www.hhs.gov/ohrp/sachrp-committee/recommendations/attachment-f-august-2-2017/index.html.
REDCap.” 2022. Wikipedia. https://en.wikipedia.org/w/index.php?title=REDCap&oldid=1086529440.
Riddick, Frank A. 2003. “The Code of Medical Ethics of the American Medical Association.” The Ochsner Journal 5 (2): 6–10. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3399321/.
Rights (OCR), Office for Civil. 2012. “Guidance Regarding Methods for De-Identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule.” Text. HHS.gov. https://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-identification/index.html.
Security, R. S. I. 2021. “Major Components of the HITECH Act: What You Should Know.” RSI Security. https://blog.rsisecurity.com/major-components-of-the-hitech-act-what-you-should-know/.
Seh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. 2020. “Healthcare Data Breaches: Insights and Implications.” Healthcare 8 (2): 133. https://doi.org/10.3390/healthcare8020133.
“SSH Protocol – Secure Remote Login and File Transfer.” n.d. https://www.ssh.com/academy/ssh/protocol.
Teoli, Dac, and Sassan Ghassemzadeh. 2021. Informatics Ethics. StatPearls Publishing. https://www.ncbi.nlm.nih.gov/books/NBK538512/.
Tilly Holland. 2020. “What’s the Difference Between Data Deletion and Data Erasure?” Ontrack. https://www.ontrack.com/en-us/blog/whats-the-difference-between-data-deletion-and-data-erasure.
“Understanding Authentication, Authorization, and Encryption : TechWeb : Boston University.” n.d. Accessed November 17, 2021. https://www.bu.edu/tech/about/security-resources/bestpractice/auth/.
“Using Caution with USB Drives CISA.” 2019. Cybersecurity & Infrastructure Security Agency CISA.gov. https://www.cisa.gov/uscert/ncas/tips/ST08-001.
“What Is a Cache? UpGuard.” n.d. Accessed April 24, 2022. https://www.upguard.com/blog/cache.
“What Is Data Encryption?” 2018. Forcepoint. https://www.forcepoint.com/cyber-edu/data-encryption.
“What Is Data Security? Data Security Definition and Overview.” n.d. Accessed November 11, 2021. https://www.ibm.com/topics/data-security.
“What Is Encryption? Data Encryption Defined.” n.d. Accessed November 11, 2021. https://www.ibm.com/topics/encryption.
“What Is SSL (Secure Sockets Layer)? What Is an SSL Certificate? DigiCert.” n.d. Accessed November 17, 2021. https://www.digicert.com/what-is-an-ssl-certificate.
“Wikipedia: Principle of Least Privilege.” 2021. Wikipedia. https://en.wikipedia.org/w/index.php?title=Principle_of_least_privilege&oldid=1053221709.