Summary and Discussion

Slides:



Advertisements
Similar presentations
A laptop computer will be provided to each group to record group responses. Each group will have a co-presenter assigned to their group to assist with.
Advertisements

Floridas Outcome-Based Evaluation Program Technical Session LSTA Coordinators Annual Conference November 16-17, 2000.
PD Plan Agenda August 26, 2008 PBTE Indicators Track
Milestones on the Way to the PhD
MSc Dissertation in Economics
Exciting experience in participating EDM forum commissioned projects Protect Patient Privacy When Sharing Data for CER 12/01/11 – 6/01/12 Write a commissioned.
Media Management and Distribution Workshop Next Step… Media Management and Distribution Workshop Zurich, Switzerland January, 2009 Peter Szegedi.
Educational portal and its integration with AHyCo LMS Nataša Hoić–Božić University of Rijeka (Croatia)
/ department of mathematics and computer science TU/e eindhoven university of technology CEDEFOP workshop: Policy, Practice, Partnership: Getting to Work.
Chapter 13 Selecting a Data Collection Method. DATA COLLECTION AND THE RESEARCH PROCESS Steps 1 and 2: Selecting a General Research Topic and Focusing.
Chapter 12 Selecting a Data Collection Method. DATA COLLECTION AND THE RESEARCH PROCESS Steps 1 and 2: Selecting a General Research Topic Steps 3 and.
Experience in Applying Online Learning Techniques in Computer Science & Engineering Dr. Aiman H. El-Maleh Computer Engineering Department King Fahd University.
Reinventing Institutional Repositories with cross- campus collaboration Kayla Siddell, Data Curation Librarian at Indiana State University OVGTSL 2015.
Roles & Responsibilities
CS300 Computers in Society Web- based course Rekha Gupta.
Group 1 Case Study Presentation Proposal for Open Access (OA) Library Leadership Institute 2014.
Integrating Information Literacy Into the Classroom TLM Institute Technology & Information Literacy Mount Mary College May 30, 2002.
ResearchData.arts.ac.uk The Rococo Project – A case study.
Some key resources for Knowledge Services. Scottish Health Libraries Catalogue Shelcat  Search the library catalogues.
E-participation and transparency in the decision making process Rauna Nerelli Ministry of Justice, Finland.
PROVOST’S REPORT March 19, Overview New Vice Provost and Dean Hiring Process Task Force recommendation near completion Special Faculty Meeting to.
Introduction to the Workshop from TERENA Performing Arts Production Workshop July 2009 Trieste, Italy Valentino Cavalli TERENA
1 10/14/2015 Defense Acquisition University ALUMNI ASSOCIATION 10 April 2012 General Membership Meeting & Report (State of DAU Alumni Assn)
How to give a PowerPoint Presentation Staff Development Group and Central Computing Services.
Beyond Open CETL The Open University’s Centres for Excellence in Teaching & Learning Where are we now? Dr Raquel Perry, Faculty of Business & Law, The.
S tandards Education in Technology Programs Amin Karim, DeVry University Jennifer McClain, IEEE Educational Activities.
The 1 st Competition on Critical Assessment of Data Privacy and Protection The privacy workshop is jointly sponsored by iDASH (U54HL108460) and the collaborating.
WP 9: 1 st Planning meeting summary Clarification between WP members of common objectives: Workshop planning and logistics with time- line Planning for.
Learning Objectives Product Design To learn about the assessment criteria used to determine levels in Design and Make Assignments. To learn the meaning.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Going from EGEE-NA ES cluster to EGI SSC.
Presented by Rebecca Ramirez, J.D., M.H.A. Associate Director for Operations SPCAA Head Start & Early Head Start September 17, 2009.
Evaluation Assistant Research Projects EAs are required to lead an evaluation research project for the academic year.
GCSE CHILD DEVELOPMENT. Summary of Assessment Unit 1 Written Paper 1½ hours (40% final mark, one tier only) Unit 2 Controlled Assessment – Child Study.
Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015.
“Inspiring our students to reach their full potential.”
Providing access to your data: Determining your audience Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
What is New Voices in Science? an event with some training to prepare a competition with 2 categories and more training – Publication and.
PCOR Privacy and Security Research Scenario Initiative and Legal Analysis and Ethics Framework Development Welcome and Please Sign In »Please sign into.
This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including.
CHILD POVERTY. Why do we think this topic is important? topic is important? children don’t have a voice protection worldwide.
An Introduction to the USENIX Association The Advanced Computing Systems Association.
BSHS 402 Week 4 Learning Team Informal Networks Paper Check this A+ tutorial guideline at 402/BSHS-402-Week-4-DQ-2.
BUS 642 master Education Begins/bus642master.com
EnFUSE PI Forum Apr. 27, 2016.
Creating an Academic Presence
RESEARCH METHODS Lecture 9
Implementation of the International Focus Programme
ESA/STAT/AC.161/Co.1 Coordination of social statistics at national and international levels Thoughts for discussion Rosemary Bender, Statistics Canada.
KickStart (Summer Education program
Bridging the cooperation gap
Grading and Student Progress
ICDIS 2018 Intelligence and Security
Towards Independence:
BSHS 435 Competitive Success/snaptutorial.com
HCS 430 Competitive Success-- snaptutorial.com
BUS 642Competitive Success/tutorialrank.com
PSY 315 Education on your terms/tutorialrank.com.
Effective Writing Where and how to start?
Cascading Failure Working Group of
Creating a Strategic Plan for Research and Scholarly Activity
Creating a Strategic Plan for Research and Scholarly Activity
Allied Health Improvement Group (B2)
Steering Group Meeting
Roles & Responsibilities
FRIENDS of sorption workshop
RUDIMENTS OF RESEARCH METHODOLOGY By
Topics for Discussion When making predictions: Validate, validate, validate. Journal submission pitfalls: conference submissions and citable pre-publication.
RESEARCH METHODS Lecture 09
Research Office Grant Writing
Presentation transcript:

Summary and Discussion

Follow-up BMC special issue on Human Genome Privacy Every participant is encouraged to submit a paper There is a publication fee involved Timeline

Resources for Genome Privacy Research Portal: A collection of related articles on genomic privacy research Tutorials on this topic from computing and biomedical viewpoints Data and tools Forum for providing information and encouraging discussion Any suggestions?

Next Competition Genome privacy Beyond genome Further study on privacy-preserving data dissertation technologies Evaluation on privacy-preserving analysis technologies (e.g., by using cryptographic techniques) Beyond genome Practical protection for health records? Other ideas?

1st PETS Workshop on Genome Privacy (GenoPri): July 15, Amsterdam A forum for discussing state-of-the-art genome privacy technologies Informal publication, discussion style Example topics: Privacy preserving genome-data analysis and dissemination, access control on genomic data, crypto techniques designed for genome protection, genome privacy with family members, storage protection of genomic data, etc. Deadline: Apr. 25