Potential research subject complains about the violation of her privacy
Maloney, D.M.
Human Research Report 17(10): 6-7
2002
ISSN/ISBN: 0885-0615
PMID: 12731497
Accession: 049966893
PDF emailed within 1 workday: $29.90
Related References
Maloney, D.M. 2005: Research subject complains about how she was treated by an institutional review board (IRB) Human Research Report 20(12): 7Rahu, M.; McKee, M. 2008: Epidemiological research labelled as a violation of privacy: the case of Estonia International Journal of Epidemiology 37(3): 678-682
Noone, M.C.; Walters, K.Christian.; Gillespie, M.Boyd. 2004: Research subject privacy protection in otolaryngology Archives of Otolaryngology--Head and Neck Surgery 130(3): 266-269
Lin, Z.; Owen, A.B.; Altman, R.B. 2004: Genetics. Genomic research and human subject privacy Science 305(5681): 183
Cook-Deegan, R.M. 2001: Privacy, families, and human subject protections: some lessons from pedigree research Journal of Continuing Education in the Health Professions 21(4): 224-237
Harris,M.A.; Levy,A.R.; Teschke,K.E. 2008: Personal privacy and public health potential impacts of privacy legislation on health research in Canada Canadian Journal Of Public Health: 4, 293-296
Harris, M.Anne.; Levy, A.R.; Teschke, K.E. 2008: Personal privacy and public health: potential impacts of privacy legislation on health research in Canada Canadian Journal of Public Health 99(4): 293-296
Maloney, D.M. 2002: Research firm changes subject notification procedure after complaint by potential subject Human Research Report 17(11): 6-7
Kuo, K-Ming.; Ma, C-Chung.; Alexander, J.W. 2013: How do patients respond to violation of their information privacy? Him Journal: -
Kuo, K-Ming.; Ma, C-Chung.; Alexander, J.W. 2014: How do patients respond to violation of their information privacy? Health Information Management: Journal of the Health Information Management Association of Australia 43(2): 23-33
2013: Prisons. Inmate cannot proceed with violation of privacy claims Aids Policy and Law 28(5): 5
Bond, B.I.; Pedersen, D.M. 1984: Violation of privacy norms a variation of the lost letter technique Psychological Reports 54(3): 985-986
2011: Prisons. Court says inmate presented evidence of privacy violation Aids Policy and Law 26(9): 5
Fanti Silva, D.Adão.; Colleoni, R. 2018: Patient's Privacy Violation on Social Media in the Surgical Area American Surgeon 84(12): 1900-1905
2002: Canada: Privacy Commissioner finds "egregious" violation of inmates' confidentiality Canadian Hiv/Aids Policy and Law Review 7(1): 17 20
Ragupathy, R.; Yogarajan, V.; Luoni, C. 2019: Health information research privacy standards should include Māori perspectives on privacy New Zealand Medical Journal 132(1494): 64-67
Gostin, L.O.; Nass, S. 2009: Reforming the HIPAA Privacy Rule: safeguarding privacy and promoting research JAMA 301(13): 1373-1375
Bentley-Cooper, J.E. 1991: Protecting human research from an invasion of privacy: the unintended results of the Commonwealth Privacy Act 1988 Australian Journal of Public Health 15(3): 228-234
Berglund, C.A. 1990: Australian standards for privacy and confidentiality of health records in research: implications of the Commonwealth Privacy Act Medical Journal of Australia 152(12): 664-669
Powell, A.C.; Singh, P.; Torous, J. 2018: The Complexity of Mental Health App Privacy Policies: A Potential Barrier to Privacy Jmir Mhealth and Uhealth 6(7): E158