Abstract
After Reading This Chapter, You Will:
Know what confidentiality entails and why it is important in research
Become familiar with techniques of securing confidentiality
Understand the difference between anonymity and confidentiality
Be able to identify breaches of confidentiality
Publisher
Springer International Publishing
Reference55 articles.
1. Amiri, F., Yazdani, N., Shakery, A., & Chinaei, A. H. (2016). Hierarchical anonymization algorithms against background knowledge attack in data releasing. Knowledge-Based Systems, 101, 71–89.
https://doi.org/10.1016/j.knosys.2016.03.004
.
2. Behnke, S. (2014, April). Disclosing confidential information. Monitor on Psychology, 45(4).
http://www.apa.org/monitor/2014/04/disclosing-information
.
3. Bersoff, D. N. (2014). Protecting victims of violent patients while protecting confidentiality. American Psychologist, 69(5), 461–467.
https://doi.org/10.1037/a0037198
.
4. Bjarnason, T., & Adalbjarnardottir, S. (2000). Anonymity and confidentiality in school surveys on alcohol, tobacco, and cannabis use. Journal of Drug Issues, 30(2), 335–343.
https://doi.org/10.1177/002204260003000206
.
5. Blomley, N., & Davis, S. (1998). Russel Ogden decision review. Online: SFU President’s Homepage,
http://www.sfu.ca/pres/OgdenReview.htm
(date accessed: 12 Mar 2020).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献