Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection

Q2 Mathematics Journal of Privacy and Confidentiality Pub Date : 2023-12-06 DOI:10.29012/jpc.845
Amy Pienta, J. Jang, Margaret Levenstein
{"title":"Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection","authors":"Amy Pienta, J. Jang, Margaret Levenstein","doi":"10.29012/jpc.845","DOIUrl":null,"url":null,"abstract":"With a growing demand for data reuse and open data within the scientific ecosystem, protecting the confidentiality and privacy of survey data is increasingly important.  It requires more than legal procedures and technological controls; it requires social and behavioral intervention. In this research note, we delineate the disclosure risks of various types of survey data (i.e., longitudinal data, social network data, sensitive information and biomarkers, and geographic data), the current motivation for data reuse and challenges to data protection. Despite rigorous efforts to protect data, there are still threats to mitigate the protection of confidentiality in microdata. Unintentional data breaches, protocol violations, and the misuse of data are observed even in well-established restricted data access systems, which indicates that the systems all may rely heavily on trust. Creating and maintaining that trust is critical to secure data access. We suggest four ways of building trust; User-Centered Design Practices; Promoting Trust for Protecting Confidential Data; General Training in Research Ethics; Specific Training in Data Security Protocols, with an example of a new project ‘Researcher Passport’ by the Inter-university Consortium for Political and Social Research. Continuous user-focused improvements in restricted data access systems are necessary so that we promote a culture of trust among the research and data user community, train both in the general topic of responsible research and in the specific requirements of these systems, and offer systematic and holistic solutions.","PeriodicalId":52360,"journal":{"name":"Journal of Privacy and Confidentiality","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Privacy and Confidentiality","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29012/jpc.845","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

Abstract

With a growing demand for data reuse and open data within the scientific ecosystem, protecting the confidentiality and privacy of survey data is increasingly important.  It requires more than legal procedures and technological controls; it requires social and behavioral intervention. In this research note, we delineate the disclosure risks of various types of survey data (i.e., longitudinal data, social network data, sensitive information and biomarkers, and geographic data), the current motivation for data reuse and challenges to data protection. Despite rigorous efforts to protect data, there are still threats to mitigate the protection of confidentiality in microdata. Unintentional data breaches, protocol violations, and the misuse of data are observed even in well-established restricted data access systems, which indicates that the systems all may rely heavily on trust. Creating and maintaining that trust is critical to secure data access. We suggest four ways of building trust; User-Centered Design Practices; Promoting Trust for Protecting Confidential Data; General Training in Research Ethics; Specific Training in Data Security Protocols, with an example of a new project ‘Researcher Passport’ by the Inter-university Consortium for Political and Social Research. Continuous user-focused improvements in restricted data access systems are necessary so that we promote a culture of trust among the research and data user community, train both in the general topic of responsible research and in the specific requirements of these systems, and offer systematic and holistic solutions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
超越访问机密调查数据的法律框架和安全控制:让数据用户参与数据保护
随着科学生态系统中对数据重用和开放数据的需求不断增长,保护调查数据的机密性和隐私性变得越来越重要。它需要的不仅仅是法律程序和技术控制;它需要社会和行为干预。在这份研究报告中,我们描述了各种类型的调查数据(即纵向数据、社交网络数据、敏感信息和生物标记物以及地理数据)的披露风险、当前数据重用的动机以及数据保护面临的挑战。尽管为保护数据作出了严格的努力,但仍然存在减轻对微数据机密性保护的威胁。即使在完善的受限制的数据访问系统中,也可以观察到无意的数据泄露、协议违反和数据滥用,这表明系统都可能严重依赖信任。创建和维护这种信任对于确保数据访问的安全至关重要。我们提出了四种建立信任的方法:用户为中心的设计实践;促进信任以保护机密资料;研究伦理的一般训练;数据安全协议的具体培训,并以大学间政治和社会研究联盟的新项目“研究员护照”为例。不断以用户为中心改进受限制的数据访问系统是必要的,这样我们才能在研究和数据用户社区之间促进信任的文化,培训负责任的研究的一般主题和这些系统的具体要求,并提供系统和整体的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Privacy and Confidentiality
Journal of Privacy and Confidentiality Computer Science-Computer Science (miscellaneous)
CiteScore
3.10
自引率
0.00%
发文量
11
审稿时长
24 weeks
期刊最新文献
Differentially Private Guarantees for Analytics and Machine Learning on Graphs: A Survey of Results Differentially Private Guarantees for Analytics and Machine Learning on Graphs: A Survey of Results Protecting Sensitive Data Early in the Research Data Lifecycle Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection Restricted data management: the current practice and the future
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1