{"id":24158,"date":"2024-10-16T10:16:45","date_gmt":"2024-10-16T08:16:45","guid":{"rendered":"https:\/\/www.wjst.de\/blog\/?p=24158"},"modified":"2024-10-16T10:24:32","modified_gmt":"2024-10-16T08:24:32","slug":"risks-you-should-be-aware-of-as-study-participant","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2024\/10\/risks-you-should-be-aware-of-as-study-participant\/","title":{"rendered":"Risks you should be aware of as study participant"},"content":{"rendered":"<p>I wrote about this <a href=\"https:\/\/bmcmedethics.biomedcentral.com\/articles\/10.1186\/1472-6939-11-21\">about this<\/a> basically 15 years ago<\/p>\n<blockquote><p>Confidentiality has been seen in the past as a fundamental ethical principle in health care and breaching confidentiality is usually a reason for disciplinary action. It has been assigned such a great value because it directly originates from the patient&#8217;s autonomy to control his or her own life [&#8230;] Two types of re-identification are possible: the &#8220;Netflix&#8221; type and the &#8220;profiling&#8221; type.<\/p><\/blockquote>\n<p>There is a new <a href=\"https:\/\/doi.org\/10.1016\/j.cell.2024.09.012\">Cell paper<\/a> that builds a &#8220;profiling&#8221; attack using even single-cell gene expression data only<\/p>\n<blockquote><p>we demonstrate that individuals in single-cell gene expression datasets are vulnerable to linking attacks, where attackers can infer their sensitive phenotypic information using publicly available tissue or cell-type-specific expression quantitative trait loci (eQTLs) information.<\/p><\/blockquote>\n<p>So this should be included in informed consent forms also.<\/p>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 22.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>I wrote about this about this basically 15 years ago Confidentiality has been seen in the past as a fundamental ethical principle in health care and breaching confidentiality is usually a reason for disciplinary action. It has been assigned such a great value because it directly originates from the patient&#8217;s autonomy to control his or &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2024\/10\/risks-you-should-be-aware-of-as-study-participant\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Risks you should be aware of as study participant<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5],"tags":[68,1595,2035,132],"class_list":["post-24158","post","type-post","status-publish","format-standard","hentry","category-genetics-biology","category-philosophy-of-science","tag-anonymity","tag-ethics","tag-informed-consent","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/24158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=24158"}],"version-history":[{"count":3,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/24158\/revisions"}],"predecessor-version":[{"id":24161,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/24158\/revisions\/24161"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=24158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=24158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=24158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}