Joon Lin, Jacqueline Chin

Chin Joon Lin, Jacqueline

  • Associate Professor, Centre for Biomedical Ethics
Administrative Appointment(s)
  • Member, Hospital Ethics Committee, National University Health System
Joint Appointment(s)
  • Honorary Secretary, National Ethics Capability Committee
  • Member, National Transplant Ethics Panel of Laypersons
  • Member, Hospital Ethics Committee, Tan Tock Seng Hospital
  • Member, Hospital Ethics Committee, Ang Mo Kio-Thye Kuan Community Hospital
  • Member, National Genomic Medicine Strategy Workgroup
  • Member, Pro-Tem Subcommittee for Exemption from Commercial Trading Clauses (Therapy)
  • Member, Hospital Ethics Committee, Institute of Mental Health
  • Board Member of the International Association of Bioethics
Academic Qualifications
  • DPhil, Oxford University, United Kingdom
  • BPhil, Oxford University, United Kingdom
  • BA (Hons), National University of Singapore, Singapore
Research Interest(s)
  • Genomics (ELSI)
  • Transplant Ethics
  • End-of-life Care
  • Ethics in Population Ageing
  • Ethics Education  
Recent Publications
  • 1. Mohamad MS, Poh GS, Chin JJ. 2017 Aug. Protection of data on multiple storage providers. Malaysian Journal of Mathematical Sciences. 11(S3):89-102.
  • 2. Poh GS, Baskaran VM, Chin JJ, Mohamad MS, Lee KW, Maniam D, Z'aba MR. 2017 Jun. Searchable data vault: Encrypted queries in secure distributed cloud storage. Algorithms. 10(2). doi: 10.3390/a10020052.
  • 3. Poh GS, Chin JJ, Yau WC, Choo KKR, Mohamad MS. 2017 May. Searchable symmetric encryption: Designs and challenges. ACM Computing Surveys. 50(3). doi: 10.1145/3064005.
  • 4. Teh TY, Lee YS, Cheah ZY, Chin JJ. 2017 May. IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. Wireless Personal Communications. 94(1):127-144. doi: 10.1007/s11277-016-3320-y.
  • 5. Chin JJ, Tan SY, Heng SH, Phan RCW. 2016 Oct. Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptography and Communications. 8(4):579-591. doi: 10.1007/s12095-015-0162-5.