Changes

From Genome Analysis Wiki
Jump to navigationJump to search
226 bytes added ,  23:03, 14 November 2013
no edit summary
Line 1: Line 1:  +
<!--        BANNER ACROSS TOP OF PAGE        -->
 +
 +
{| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
 +
|-
 +
| style="width:100%; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">This Page is No Longer Supported. Please Visit http://gscan.sph.umich.edu</div>
 +
|}
 +
 +
 +
 
[[File:EMADS_thumb5.png|thumb|340px|right]]
 
[[File:EMADS_thumb5.png|thumb|340px|right]]
 
Welcome! This is an informational page devoted to the EMADS consortium, the exome meta-analysis of drinking and smoking.
 
Welcome! This is an informational page devoted to the EMADS consortium, the exome meta-analysis of drinking and smoking.
Line 19: Line 28:  
We have a primary teleconference on a monthly basis. Senior and junior investigators from each site contribute to consortium planning.
 
We have a primary teleconference on a monthly basis. Senior and junior investigators from each site contribute to consortium planning.
   −
'''The next primary call will take place on June 21 2013 at 11am EDT (4pm BST).'''
+
'''The next primary call will take place on August 16 2013 at 11am EDT (4pm BST).'''
 
  −
=== Analyst Call ===
  −
In addition, we have a (roughly) biweekly analyst call to discuss technical issues and analysis coordination. 
  −
 
  −
'''The next analyst call will take place on June 6 2013 at 11am EDT (4pm BST)'''
      
== Analysis Projects  ==
 
== Analysis Projects  ==
Line 61: Line 65:  
=== Categories of Proposals ===
 
=== Categories of Proposals ===
 
==== Secondary Analyses of Existing Summary Data ====
 
==== Secondary Analyses of Existing Summary Data ====
At the time of this writing (5/7/2013), all summary statistics will be protected on University of Michigan servers, and curated by Scott and Goncalo. Proposals that call for analysis of existing data will be discussed by local site principal investigators. Note that some principal investigators may have to obtain permission from committees overseeing the study (e.g., for very large and/or complex cohorts). If approved, these proposals will be granted to selected portions of the summary statistics. Any manuscript generated from these secondary analyses must not be submitted for publication until the primary EMADS manuscript has been accepted for publication.
+
At the time of this writing (5/7/2013), all summary statistics will be protected on University of Michigan servers, and curated by Scott and Goncalo. Proposals that call for analysis of existing data will be discussed by local site principal investigators. Note that some principal investigators may have to obtain permission from committees overseeing their study before sharing summary statistics from that study (e.g., for very large and/or complex cohorts). If approved, these proposals will be granted access to selected portions of the summary statistics. Any manuscript generated from these secondary analyses must not be submitted for publication until the primary EMADS manuscript has been accepted for publication.
    
In general, we expect most if not all proposals for secondary analysis of existing summary data to be approved.
 
In general, we expect most if not all proposals for secondary analysis of existing summary data to be approved.
Line 72: Line 76:     
=== Data Security ===
 
=== Data Security ===
Summary statistics of genetic variants are not truly de-identified, as they can still be used by a sufficiently sophisticated and motivated person to re-identify individuals. This concern must be taken very seriously, and any proposal to use EMADS data, even if only summary statistics, must have a plan to assure the safety and security of the data, protect against its re-release, and must guarantee that they will not attempt to re-identify the data.
+
Summary statistics of genetic variants are not truly de-identified, as they can still be used by a sufficiently sophisticated and motivated person to re-identify individuals. This concern must be taken very seriously, and any proposal to use EMADS data, even if only summary statistics, must have a plan to assure the safety and security of the data, protect against its re-release, and must guarantee that there will be no attempt to re-identify the data.
    
=== Submitting Proposals ===
 
=== Submitting Proposals ===
235

edits

Navigation menu