This thesis investigates methods to combine and infer information from genetic\ud epidemiological studies. Three issues are explored, each in a distinct and self-contained\ud chapter.\ud Chapter 1 investigates how best to incorporate treatment information in genetic\ud analyses of blood pressure. Different approaches to adjusting for treatment are\ud compared in a number of simulated scenarios, and the approaches that utilise\ud all the observed data are generally shown to perform best. One particular\ud condition, however, causes these approaches to suffer bias. This is where a\ud genetic variant (or some other factor) interacts with treatment. This chapter\ud therefore urges caution in the interpretation of results from these studies, and\ud suggests some possible approaches to identifying existing interactions with\ud treatment.\ud Chapter 2 concerns participant privacy in genome-wide association studies\ud (GWAS). Recent methods claim to be able to infer whether an individual\ud participated in a study, using only aggregate statistics from the study such as\ud allele frequencies. In the past, these statistics have been freely published\ud online. This chapter explores the full implications of these methods, by\ud investigating their true capabilities and limitations. In addition, some\ud modifications are proposed to one particular method, to demonstrate how it can\ud be adapted for use in practice. This work finds that participant identification is\ud possible in ideal conditions, but common characteristics of real studies may\ud prevent any reliable application of these methods in practice.\ud Chapter 3 proposes a new approach to synthesising data between studies.\ud This approach – named “DataSHIELD” – guarantees identical results to an\ud individual-level meta-analysis, while offering greater flexibility than the studylevel\ud meta-analysis. DataSHIELD also potentially circumvents some of the laws\ud that restrict data use, because it does not involve sharing any individual-level\ud data between studies. This chapter outlines the principles underpinning\ud DataSHIELD, and demonstrates its use in a simulated data example
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.