Papers by Jeffrey Collmann

CC-BY-NC-ND 4.0 International license
Interest in sustainable learning has been growing over the... more CC-BY-NC-ND 4.0 International license
Interest in sustainable learning has been growing over the past 20 years but it has never been determined whether students—whose learning we are trying to sustain—can perceive either the sustainability of their learning or any of the features of this construct. A four-item survey was developed based on a published definition of " sustainable learning " , and was sent to the 12 graduate students who have completed a new seminar in ethical reasoning. A thematic analysis of the narrative responses was submitted to a degrees-of-freedom analysis to determine the level and type of evidence for student perception of sustainability. Respondents (n = 9) endorsed each of the four dimensions of sustainable learning—and each gave examples for each dimension outside of, and after the end of, the course. One respondent endorsed all dimensions of sustainable learning, but was uncertain whether the course itself led to one particular sustainability dimension. While these results must be considered preliminary because our sample is small and the survey is the first of its kind, they suggest that graduate students can and do perceive each of the four features of sustainability. The survey needs refinement for future/wider use; but this four-dimensional definition could be useful to develop and promote (and assess) sustainable learning in higher education.
IGI Global eBooks, Jan 18, 2011
Practical Action and Mindfulness in Health Information Security (9781605669885): Jeff Collmann, T... more Practical Action and Mindfulness in Health Information Security (9781605669885): Jeff Collmann, Ted Cooper: Book Chapters.

Springer eBooks, 2016
A series of authored and edited monographs that utilize quantitative and computational methods to... more A series of authored and edited monographs that utilize quantitative and computational methods to model, analyze and interpret large-scale social phenomena. Titles within the series contain methods and practices that test and develop theories of complex social processes through bottom-up modeling of social interactions. Of particular interest is the study of the co-evolution of modern communication technology and social behavior and norms, in connection with emerging issues such as trust, risk, security and privacy in novel socio-technical environments. Computational Social Sciences is explicitly transdisciplinary: quantitative methods from fields such as dynamical systems, artificial intelligence, network theory, agentbased modeling, and statistical mechanics are invoked and combined with state-ofthe-art mining and analysis of large data sets to help us understand social agents, their interactions on and offline, and the effect of these interactions at the macro level. Topics include, but are not limited to social networks and media, dynamics of opinions, cultures and conflicts, socio-technical co-evolution and social psychology. Computational Social Sciences will also publish monographs and selected edited contributions from specialized conferences and workshops specifically aimed at communicating new findings to a large transdisciplinary audience. A fundamental goal of the series is to provide a single forum within which commonalities and differences in the workings of this field may be discerned, hence leading to deeper insight and understanding.

Science and Engineering Ethics, Nov 28, 2014
The use of Big Data-however the term is defined-involves a wide array of issues and stakeholders,... more The use of Big Data-however the term is defined-involves a wide array of issues and stakeholders, thereby increasing numbers of complex decisions around issues including data acquisition, use, and sharing. Big Data is becoming a significant component of practice in an ever-increasing range of disciplines; however, since it is not a coherent ''discipline'' itself, specific codes of conduct for Big Data users and researchers do not exist. While many institutions have created, or will create, training opportunities (e.g., degree programs, workshops) to prepare people to work in and around Big Data, insufficient time, space, and thought have been dedicated to training these people to engage with the ethical, legal, and social issues in this new domain. Since Big Data practitioners come from, and work in, diverse contexts, neither a relevant professional code of conduct nor specific formal ethics training are likely to be readily available. This normative paper describes an approach to conceptualizing ethical reasoning and integrating it into training for Big Data use and research. Our approach is based on a published framework that emphasizes ethical reasoning rather than topical knowledge. We describe the formation of professional community norms from two key disciplines that contribute to

This paper presents general principles and case examples of how health care providers might prepa... more This paper presents general principles and case examples of how health care providers might prepare themselves to become data security capable organizations; that is, organizations in which ensuring the security and confidentiality of medical information becomes incorporated into the every day working routines of all staff. Building a security capable organization requires institutionalizing a security surveillance process, not just implementing security measures. Implementing a security surveillance process requires several steps, including: monitoring the changing legal and regulatory environment; enhancing patient understanding of the organization's data security efforts; and continuously updating data security policies, procedures and practices in light of changing mission. Case examples from KP Online, an interactional patient tool from Kaiser Permanente Health Care and Project Phoenix, a telemedicine project from Georgetown University Medical Center illustrate the general points
International Journal of Qualitative Studies in Education, 1988
This paper explores some basic questions about how graduate life science students manage risks in... more This paper explores some basic questions about how graduate life science students manage risks in their research and educational careers. Because they work with living systems [cells], they constantly face conditions which threaten to destroy the very objects of their work. More generally, they face organizational circumstances in the laboratory which fundamentally condition the kinds of projects they may develop
ABSTRACT Project RavenCare is an initiative designed to provide sustained routine clinical teleme... more ABSTRACT Project RavenCare is an initiative designed to provide sustained routine clinical telemedicine/teleradiology support for a village clinic in Hoonah, Alaska and Mt. Edgecumbe Hospital in Sitka. The village clinic is linked to the regional hospital and this hospital is in turn linked to Georgetown University Medical Center (GUMC) through the NASA-ACTS (Advanced Communication Technology Satellite). Project RavenCare is a joint project between the Department of Radiology at GUMC and the Southeast Alaska Regional Health Corporation (SEARHC) in Sitka. Regional physicians in Hoonah lack support in providing relatively routine care in areas such as radiology and pathology. This project will address the existing communication problem between the village health clinics and the hospital as well as the lack of subspecialty support for hospital-based physicians in Sitka

Proceedings of SPIE, May 12, 1995
ABSTRACT Project RavenCare is a testbed for assessing the utility of teleradiology, telemedicine ... more ABSTRACT Project RavenCare is a testbed for assessing the utility of teleradiology, telemedicine and electronic patient records systems for delivering health care to Native Alaskans in remote villages. It is being established as a joint project between the department of radiology at Georgetown University Medical Center and the Southeast Alaska Regional Health Corporation (SEARHC) in Sitka, Alaska. This initiative will establish a sustained routine clinical multimedia telemedicine support for a village clinic in Hoonah, Alaska and a regional hospital in Sitka. It will link the village clinic in Hoonah to Mt. Edgecumbe Hospital in Sitka. This regional hospital will in turn be linked to Georgetown University Hospital through the T1- VSAT (very small aperture terminal) of the NASA-ACTS (Advanced Communication Technology Satellite). Regional physicians in Hoonah lack support in providing relatively routine care in areas such as radiology and pathology. This project is an initial step in a general plan to upgrade telecommunications in the health care system of the Southeast Alaska region and will address aspects of two problems; limited communication between the village health clinics and the hospital and lack of subspecialty support for hospital-based physicians in Sitka.

Critical Reviews in Biomedical Engineering, 2000
Under what conditions might the cloning of human beings constitute an ethical practice? A tendenc... more Under what conditions might the cloning of human beings constitute an ethical practice? A tendency exists to analyze human cloning merely as a technical procedure. As with all revolutionary technological developments, however, human cloning potentially exists in a broad social context that will both shape and be shaped by the biological techniques. Although human cloning must be subjected to technical analysis that addresses fundamental ethical questions such as its safety and efficacy, questions exist that focus our attention on broader issues. Asserting that cloning inevitably leads to undesirable consequences commits the fallacy of technological determinism and untenably separates technological and ethical evaluation. Drawing from the Report of the National Bioethics Advisory Committee and Aldous Huxley&#39;s Brave New World, we offer a draft &quot;Code of Ethics for Human Cloning&quot; in order to stimulate discussion about the ethics of the broader ramifications of human cloning as well as its particular technological properties.

International Congress Series, Jun 1, 2004
Kaiser Permanente developed its approach to compliance with the privacy and security rules of the... more Kaiser Permanente developed its approach to compliance with the privacy and security rules of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 as part of its national, enterprise-wide approach to health information system design, purchasing, implementation and management. Widely perceived as a self-directed, leader in health information security, its experience in HIPAA compliance provides lessons in mobilizing and changing large, stable organizations in response to an externally imposed mandate. While Kaiser approached HIPAA primarily as an effort in certifying compliance, it saw HIPAA as an opportunity to investigate its security business processes and information technology. This paper explains how Kaiser evaluated over 3000 computer systems along with hundreds of types of biomedical devices and made the decisions necessary to bring them into compliance with the HIPAA Security Standard.

Journal of Refugee Studies, Jun 20, 2016
A menacing context has emerged when a dread threat persists and requires a community to reorganiz... more A menacing context has emerged when a dread threat persists and requires a community to reorganize its life to help mitigate consequences of threat. This article explores how menacing context links drivers of forced migration, the perception of threat among local families and domestic decision-making about remaining in place, fleeing or combinations of both. Employing a coding scheme based on dread threat theory, this article illustrates through case studies of a cholera epidemic, total war setting and a complex situation with infectious disease, civil strife and drought threats how to transform qualitative data from ethnographic, autobiographical and journalistic sources into a quantitative measurement scale of local perception of threat for use in formal modelling, forecasting and potentially enhanced humanitarian responses to mass displacement.
This paper describes initial efforts to use open-source data to capture knowledge about forced mi... more This paper describes initial efforts to use open-source data to capture knowledge about forced migration in Iraq. Our goal is to understand the connection between open-source data and possible leading indicators of forced migration. For our preliminary analyses, we use a corpus of 2.6 million documents. Here we describe the techniques we used and challenges we faced. We conclude with recommendations for those using open-source data for grand-scale data science challenges.

International Congress Series, 2004
Why HIPAA only addresses part of the data security problem'' presents special papers illustrating... more Why HIPAA only addresses part of the data security problem'' presents special papers illustrating the complexities of deploying good data security practices for the protection of computerized information assets in the contemporary healthcare environment. From the perspective of the data security rules, HIPAA implements a broad approach based on standard industry good practice in information assurance. While healthcare organizations find implementing ''good industry practice'' difficult enough to accomplish, other issues such as the safe patching of security vulnerabilities in the software of biomedical devices, safely sharing information across enterprise boundaries, organizing information security programs in competition with other organizational missions, and managing risk in networked environments loom large and often unnoticed, especially for networks of hospitals seeking to manage information resources as an enterprise.

Background: Effective treatment of HIV since 1996 has reduced morbidity and mortality through vir... more Background: Effective treatment of HIV since 1996 has reduced morbidity and mortality through virologic suppression. Combination antiretroviral therapy (cART) has been recognized as key to the prevention of drug resistance and the transmission of infection. We used eighteen years of virologic outcomes in a long-standing cohort of women to describe longitudinal viral load trajectories; and examine factors associated with sustained viremia and mortality. Methods: We analyzed data from DC WIHS women with> four semiannual visits using a group-based logistic trajectory analysis approach to identify patterns of HIV RNA detection (>80 copies/mL or lower assay limit, and>1000 copies/mL). We verified findings using cumulative viral load suppression-years, explored group characteristics using generalized linear modeling with generalized estimating equations for repeated measures, and examined survival using the Kaplan-Meier and Cox proportional hazard analyses.

Education Sciences, 2016
Interest in sustainable learning has been growing over the past 20 years but it has never been de... more Interest in sustainable learning has been growing over the past 20 years but it has never been determined whether students-whose learning we are trying to sustain-can perceive either the sustainability of their learning or any of the features of this construct. A four-item survey was developed based on a published definition of "sustainable learning", and was sent to the 12 graduate students who have completed a new seminar in ethical reasoning. A thematic analysis of the narrative responses was submitted to a degrees-of-freedom analysis to determine the level and type of evidence for student perception of sustainability. Respondents (n = 9) endorsed each of the four dimensions of sustainable learning-and each gave examples for each dimension outside of, and after the end of, the course. One respondent endorsed all dimensions of sustainable learning, but was uncertain whether the course itself led to one particular sustainability dimension. While these results must be considered preliminary because our sample is small and the survey is the first of its kind, they suggest that graduate students can and do perceive each of the four features of sustainability. The survey needs refinement for future/wider use; but this four-dimensional definition could be useful to develop and promote (and assess) sustainable learning in higher education.

Science and engineering ethics, Jan 28, 2014
The use of Big Data-however the term is defined-involves a wide array of issues and stakeholders,... more The use of Big Data-however the term is defined-involves a wide array of issues and stakeholders, thereby increasing numbers of complex decisions around issues including data acquisition, use, and sharing. Big Data is becoming a significant component of practice in an ever-increasing range of disciplines; however, since it is not a coherent "discipline" itself, specific codes of conduct for Big Data users and researchers do not exist. While many institutions have created, or will create, training opportunities (e.g., degree programs, workshops) to prepare people to work in and around Big Data, insufficient time, space, and thought have been dedicated to training these people to engage with the ethical, legal, and social issues in this new domain. Since Big Data practitioners come from, and work in, diverse contexts, neither a relevant professional code of conduct nor specific formal ethics training are likely to be readily available. This normative paper describes an appro...
Transparency in Social Media, 2015

Biosurveillance entails the collection and analysis of information needed to provide early warnin... more Biosurveillance entails the collection and analysis of information needed to provide early warning of outbreaks of infectious disease, both naturally occurring and intentionally introduced. Data derived from repositories containing various types of sensitive information may be required for this purpose, including individually identifiable, copyrighted, and proprietary information. The Project Argus Biosurveillance Doctrine was developed to ensure that ethical and legal principles guide the collection and handling of such information. Project Argus does not, however, use individually identifiable information or any material derived from individually identifiable information for any phase of the project. Further, Project Argus is not used for purposes of law enforcement, counterterrorism, or public health surveillance. This chapter details why and how the doctrine was developed and summarizes its guiding principles and key elements. Through these efforts, the system incorporated requi...
Uploads
Papers by Jeffrey Collmann
Interest in sustainable learning has been growing over the past 20 years but it has never been determined whether students—whose learning we are trying to sustain—can perceive either the sustainability of their learning or any of the features of this construct. A four-item survey was developed based on a published definition of " sustainable learning " , and was sent to the 12 graduate students who have completed a new seminar in ethical reasoning. A thematic analysis of the narrative responses was submitted to a degrees-of-freedom analysis to determine the level and type of evidence for student perception of sustainability. Respondents (n = 9) endorsed each of the four dimensions of sustainable learning—and each gave examples for each dimension outside of, and after the end of, the course. One respondent endorsed all dimensions of sustainable learning, but was uncertain whether the course itself led to one particular sustainability dimension. While these results must be considered preliminary because our sample is small and the survey is the first of its kind, they suggest that graduate students can and do perceive each of the four features of sustainability. The survey needs refinement for future/wider use; but this four-dimensional definition could be useful to develop and promote (and assess) sustainable learning in higher education.
Interest in sustainable learning has been growing over the past 20 years but it has never been determined whether students—whose learning we are trying to sustain—can perceive either the sustainability of their learning or any of the features of this construct. A four-item survey was developed based on a published definition of " sustainable learning " , and was sent to the 12 graduate students who have completed a new seminar in ethical reasoning. A thematic analysis of the narrative responses was submitted to a degrees-of-freedom analysis to determine the level and type of evidence for student perception of sustainability. Respondents (n = 9) endorsed each of the four dimensions of sustainable learning—and each gave examples for each dimension outside of, and after the end of, the course. One respondent endorsed all dimensions of sustainable learning, but was uncertain whether the course itself led to one particular sustainability dimension. While these results must be considered preliminary because our sample is small and the survey is the first of its kind, they suggest that graduate students can and do perceive each of the four features of sustainability. The survey needs refinement for future/wider use; but this four-dimensional definition could be useful to develop and promote (and assess) sustainable learning in higher education.