Confidentiality Research Papers - Academia.edu (original) (raw)

Seventy-six percent of 65 psychotherapy cases seen in a child guidance clinic either did not change or improved following a mandated report of suspected child abuse. In a significant minority of cases, the therapy relationship... more

Seventy-six percent of 65 psychotherapy cases seen in a child guidance clinic either did not change or improved following a mandated report of suspected child abuse. In a significant minority of cases, the therapy relationship deteriorated when the report was made about a client in treatment, and improved when the report was made about a third party not in treatment.

Türkiye ile AB ülkeleri arasında, AB ülkelerinin kendi içlerindeki dalgalanmadan daha büyük bir fark teşkil eden durumlar vardır. Bunların başında, tarafların farklı dinlere mensup olması ve dolayısıyla kültürlerin dinle ilintili alt... more

Türkiye ile AB ülkeleri arasında, AB ülkelerinin kendi içlerindeki dalgalanmadan daha büyük bir fark teşkil eden durumlar vardır. Bunların başında, tarafların farklı dinlere mensup olması ve dolayısıyla kültürlerin dinle ilintili alt bölümleri yer alır. Daha basit rahatsızlıklarda olduğu gibi, ölümcül sayılan hastalıklarda da Avrupalılara kıyasla Türk hastanın tevekkülcü bir yaklaşımla, çözüm peşinde koşmak konusunda daha az ısrarcı davrandığı ve daha az deneme yaptığı söylenebilir. Çoğu hastanın bizzat girişimci olmak yerine konuyu etrafındakilere havale etmeye eğilimli olduğu görülür. Hekime Batı toplumlarından daha fazla hikmet atfetmeye meyilli Türk hasta, karar verme sürecine daha az müdahil olarak, doktorun kendi adına karar alacağı bir tedaviyi kabul eder görünmektedir.

The tendency to keep secrets in adolescents has been studied in particular in their relationships with their parents and associated with psychosocial disadvantages. The current study focused on peer relationships and investigated the... more

The tendency to keep secrets in adolescents has been studied in particular in their relationships with their parents and associated with psychosocial disadvantages. The current study focused on peer relationships and investigated the effects of friendship quality, loneliness in a multidimensional perspective, and self-esteem on secrecy from friends. Italian adolescents (N = 457; 47% male; 100% white) aged between 13 and 19 years (M = 16.11; SD = 1.53) reported their secrecy from friends, peer and parent-related loneliness, aversion and affinity for aloneness, their self-esteem and the quality of their relationships with their friends. The results showed that peer-related loneliness, affinity for aloneness and self-esteem in particular affect keeping secrets from friends, independent of the participant's gender. Moreover, peer-related loneliness and affinity for aloneness mediated the relationship between self-esteem and secrecy. The data were discussed in the light of adolescenc...

With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and... more

With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for... more

Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the origi...

Dental education on specific knowledge and intervention approaches for working with people living on welfare is crucial to the therapeutic success of the relationships dental professionals establish with this clientele. Despite growing... more

Dental education on specific knowledge and intervention approaches for working with people living on welfare is crucial to the therapeutic success of the relationships dental professionals establish with this clientele. Despite growing attention to the importance of cultural competence and communication skills training in dentistry, very few initiatives have been documented in relation to serving low-income populations. Following discussions at a 2006 Montreal-based colloquium on access to dental care, academics, dental association administrators, and public health agency and antipoverty coalition representatives began collaborating to develop innovative pedagogy designed to increase providers' competence in interacting with their underprivileged patients. The group's first round of workshops (November 2006-October 2007) resulted in the creation of an original video-based tool containing testimonies from six individuals living currently or formerly on welfare. The videotaped...

Recent increases in sexually transmitted infection (STI) rates in males having sex with males and simultaneous increases in the use of crystal meth within gay circuit parties (GCP) highlight the growing need for research aimed at sex,... more

Recent increases in sexually transmitted infection (STI) rates in males having sex with males and simultaneous increases in the use of crystal meth within gay circuit parties (GCP) highlight the growing need for research aimed at sex, drug, and leisure, practices. While epidemiological evidence exists correlating these activities, no decreases in STI rates have occurred. The objective of this article is to provide an ethical framework for qualitative research that ‘colours outside the lines’ of traditional epidemiological sexual health research methods. To date, all GCP research has used survey methods; however, no literature addresses the ethical concerns of naturalistic observation that is aimed toward understanding the sexualized environment of GCPs. This review found that while ethical risks are inherent, the benefits to society and to the group-under-study significantly outweigh the risks.

This is the output from an ESSNet project to provide guidelines for those responsible for checkinghte outputs of researchers for residual disclosure risk. It provides both hard rules and 'rules-of-thumb' (for principles-based OSDC). It... more

This is the output from an ESSNet project to provide guidelines for those responsible for checkinghte outputs of researchers for residual disclosure risk. It provides both hard rules and 'rules-of-thumb' (for principles-based OSDC). It also contains some suggestions on training researchers.

The internet is widely used for health information and support, often by vulnerable people. Internet-based research raises both familiar and new ethical problems for researchers and ethics committees. While guidelines for internet-based... more

The internet is widely used for health information and support, often by vulnerable people. Internet-based research raises both familiar and new ethical problems for researchers and ethics committees. While guidelines for internet-based research are available, it is unclear to what extent ethics committees use these. Experience of gaining research ethics approval for a UK study (SharpTalk), involving internet-based discussion groups with young people who self-harm and health professionals is described. During ethical review, unsurprisingly, concerns were raised about the vulnerability of potential participants. These were dominated by the issue of anonymity, which also affected participant safety and consent. These ethical problems are discussed, and our solutions, which included: participant usernames specific to the study, a closed website, private messaging facilities, a direct contact email to researchers, information about forum rules displayed on the website, a 'report&#x...

Choderlos de Laclos’ novel, Les liaisons dangereuses, entices readers to transgress a boundary by offering confidential letters exchanged between libertines and their victims to a reading public. Even within the universe of the novel,... more

Choderlos de Laclos’ novel, Les liaisons dangereuses, entices readers to transgress a boundary by offering confidential letters exchanged between libertines and their victims to a reading public. Even within the universe of the novel, confidential letters are intercepted and read in order to exert power and manipulate others. Recognizing the late eighteenth century and the cyber age as periods of historical transition, I read Les liaisons dangereuses as a cautionary tale about the uses of electronic communication in the context of an institutional setting such as a research university. Within the setting of the research university, confidential correspondence also circulates in ways that reinforce power, hierarchy and privilege. Questions about what is public and what is private, what is privileged and what is not, haunt Laclos’ novel, as they haunt us today. Reading Les liaisons dangereuses in light of social media, hacking and legal concepts of privileged communication yields fruitful lessons about the politics of our self-delusions concerning our private lives. Most importantly, thinking about the way in which the eighteenth-century novel stages relations of knowledge, power and critical insight in the context of breaches of confidentiality sheds light on the trade-offs between control and freedom, privilege and open-access that color our understanding of electronic communications and vulnerability today.

School social workers frequently face ethical quandaries about which student disclosures to keep confidential and which ones to divulge for the student's or the school's best interests. A seven-step process is recommended for working... more

School social workers frequently face ethical quandaries about which student disclosures to keep confidential and which ones to divulge for the student's or the school's best interests. A seven-step process is recommended for working through this decision. These steps include: knowing yourself, analyzing the dilemma, seeking consultation, identifying courses of action, managing clinical concerns, enacting the decision, and reflecting on the process. The boundaries between ethics and the law is also clarified as well as issues in recordkeeping. A checklist for confidentiality is included.

Simple Confidentiality Agreement