Search results

1 – 10 of 469
Book part
Publication date: 7 May 2019

Francesco Ciclosi, Paolo Ceravolo, Ernesto Damiani and Donato De Ieso

This chapter analyzes the compliance of some category of Open Data in Politics with EU General Data Protection Regulation (GDPR) requirements. After clarifying the legal basis of…

Abstract

This chapter analyzes the compliance of some category of Open Data in Politics with EU General Data Protection Regulation (GDPR) requirements. After clarifying the legal basis of this framework, with specific attention to the processing procedures that conform to the legitimate interests pursued by the data controller, including open data licenses or anonymization techniques, that can result in partial application of the GDPR, but there is no generic guarantee, and, as a consequence, an appropriate process of analysis and management of risks is required.

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Keywords

Article
Publication date: 30 July 2021

Tanvi Garg, Navid Kagalwalla, Shubha Puthran, Prathamesh Churi and Ambika Pawar

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of…

Abstract

Purpose

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of health-care infrastructure, effective treatment given to patients and encourage the development of new health-care technologies by researchers. These objectives are achieved through the proposed system, a “privacy-aware data tagging system using role-based access control for health-care data.”

Design/methodology/approach

Health-care data must be stored and shared in such a manner that the privacy of the patient is maintained. The method proposed, uses data tags to classify health-care data into various color codes which signify the sensitivity of data. It makes use of the ARX tool to anonymize raw health-care data and uses role-based access control as a means of ensuring only authenticated persons can access the data.

Findings

The system integrates the tagging and anonymizing of health-care data coupled with robust access control policies into one architecture. The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control.

Originality/value

The paper integrates three disparate topics – data tagging, anonymization and role-based access policies into one seamless architecture. Codifying health-care data into different tags based on International Classification of Diseases 10th Revision (ICD-10) codes and applying varying levels of anonymization for each data tag along with role-based access policies is unique to the system and also ensures the usability of data for research.

Details

World Journal of Engineering, vol. 20 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 18 October 2023

Langdon Holmes, Scott Crossley, Harshvardhan Sikka and Wesley Morris

This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.

Abstract

Purpose

This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.

Design/methodology/approach

The authors evaluate the performance of their deidentification system on two data sets of student-generated text. Each data set was human-annotated for PII. The authors evaluate using two approaches: per-token PII classification accuracy and a simulated reidentification attack design. In the reidentification attack, two reviewers attempted to recover student identities from the data after PII was obfuscated by the authors’ system. In both cases, results are reported in terms of recall and precision.

Findings

The authors’ deidentification system recalled 84% of student name tokens in their first data set (96% of full names). On the second data set, it achieved a recall of 74% for student name tokens (91% of full names) and 75% for all direct identifiers. After the second data set was obfuscated by the authors’ system, two reviewers attempted to recover the identities of students from the obfuscated data. They performed below chance, indicating that the obfuscated data presents a low identity disclosure risk.

Research limitations/implications

The two data sets used in this study are not representative of all forms of student-generated text, so further work is needed to evaluate performance on more data.

Practical implications

This paper presents an open-source and automatic deidentification system appropriate for student-generated text with technical explanations and evaluations of performance.

Originality/value

Previous study on text deidentification has shown success in the medical domain. This paper develops on these approaches and applies them to text in the educational domain.

Details

Information and Learning Sciences, vol. 124 no. 9/10
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 15 July 2014

Sue Childs, Julie McLeod, Elizabeth Lomas and Glenda Cook

This paper aims to explore the issues, the role of research data management (RDM) as a mechanism for implementing open research data and the role and opportunities for records…

3283

Abstract

Purpose

This paper aims to explore the issues, the role of research data management (RDM) as a mechanism for implementing open research data and the role and opportunities for records managers. The open data agenda is premised on making as much data as possible open and available. However, in the context of open research data there are methodological, ethical and practical issues with this premise.

Design/methodology/approach

Two collaborative research projects focusing on qualitative health data were conducted. “DATUM for Health” designed and delivered a tailored RDM skills training programme for postgraduate research students in health studies. “DATUM in Action” was an action research project between researchers from information sciences, health, mathematics and computing, looking at planning and implementing RDM.

Findings

Three key issues emerged about what research data is appropriate to make open/accessible for sharing and reuse: re-using qualitative data conflicts with some of the epistemological and methodological principles of qualitative research; there are ethical concerns about making data obtained from human participants open, which are not completely addressed by consent and anonymisation; many research projects are small scale and the costs of preparing and curating data for open access can outweigh its value. In exploring these issues, the authors advocate the need for effective appraisal skills and researcher-focused RDM with records managers playing a useful role.

Research limitations/implications

The findings come from two small-scale qualitative projects in health studies. Further exploration of these issues is required.

Practical implications

Records managers have new crucial opportunities in the open data and RDM contexts, bringing their expertise and experience in managing a wider range of data and information. They can help realise the benefits of multiple perspectives (researcher, data manager, records manager and archivist) on open research data.

Social implications

Researcher-focused RDM offers a mechanism for implementing open research data.

Originality/value

It raises complex issues around open research data not found in the records management literature, highlights the need for researcher-focussed RDM and research data appraisal skills and a not yet fully recognised role for records managers.

Details

Records Management Journal, vol. 24 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 4 July 2016

Dimple Patel

Research data management (RDM) is gaining a lot of momentum in the present day and rightly so. Research data are the core of any research study. The findings and conclusions of a…

5552

Abstract

Purpose

Research data management (RDM) is gaining a lot of momentum in the present day and rightly so. Research data are the core of any research study. The findings and conclusions of a study are entirely dependent on the research data. Traditional publishing did not focus on the presentation of data, along with the publications such as research monographs and especially journal articles, probably because of the difficulties involved in managing the research data sets. The current day technology, however, has helped in making this task easier. The purpose of this paper is to present a conceptual framework for managing research data at the institutional level.

Design/methodology/approach

This paper discusses the significance and advantages of sharing research data. In the spirit of open access to publications, freeing research data and making it available openly, with minimal restrictions, will help in not only furthering research and development but also avoiding duplication of efforts. The issues and challenges involved in RDM at the institutional level are discussed.

Findings

A conceptual framework for RDM at the institutional level is presented. A model for a National Repository of Open Research Data (NRORD) is also proposed, and the workflow of the functioning of NRORD is also presented.

Originality/value

The framework clearly presents the workflow of the data life-cycle in its various phases right from its creation, storage, organization and sharing. It also attempts to address crucial issues in RDM such as data privacy, data security, copyright and licensing. The framework may help the institutions in managing the research data life-cycle in a more efficient and effective manner.

Details

Library Review, vol. 65 no. 4/5
Type: Research Article
ISSN: 0024-2535

Keywords

Article
Publication date: 5 May 2020

Rashmi Gupta, Martin Crane and Cathal Gurrin

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog…

278

Abstract

Purpose

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog technologies would have the potential to pose challenges for ensuring the personal privacy of subjects and bystanders in lifelog data. This paper presents preliminary findings from a study of lifeloggers with the aim of better understanding their concerns regarding privacy in lifelog data.

Design/methodology/approach

In this study, we have collected a visual dataset of 64,837 images from 25 lifelogging participants over a period of two days each, and we conducted an interactive session (face to face conversation) with each participant in order to capture their concerns when sharing the lifelog data across three specified categories (i.e. Private (Only for Me), Semi-Private (Family/Friends) and Public).

Findings

In general, we found that participants tend to err on the side of conservative privacy settings and that there is a noticeable difference in what different participants are willing to share. In summary, we found that the categories of images that the participants wished to be kept private included personally identifiable information and professional information; categories of images that could be shared with family/friends include family moments or content related to daily routine lifestyle, and other visual lifelog data could potentially be made public).

Originality/value

We analysed the potential differences in the willingness of 25 participants to share data. In addition, reasons for being a volunteer to collect lifelog data and how the lifelogging device affected the lifestyle of the lifelogger are analysed. Based on the findings of this study, we propose a set of challenges for the anonymisation of lifelog data that should be solved when supporting lifelog data sharing.

Details

Online Information Review, vol. 45 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 21 November 2022

Petter Kvalvik, Mary Sánchez-Gordón and Ricardo Colomo-Palacios

Smart cities require data governance to articulate data sharing and use among relevant stakeholders. Given the lack of a comprehensive examination of this research topic, this…

Abstract

Purpose

Smart cities require data governance to articulate data sharing and use among relevant stakeholders. Given the lack of a comprehensive examination of this research topic, this study aims to review data governance publications to detect and categorize endeavors backing up data sharing in smart cities.

Design/methodology/approach

A systematic literature review was conducted, and 568 academic and professional sources were identified, but finally, only 10 relevant papers were selected.

Findings

Results reveal that data governance must be based on well-defined mechanisms, procedures and roles to achieve accountability and responsibility in a multi-actor environment. Moreover, data governance should be adapted to address power imbalances among all interested parties.

Research limitations/implications

The main limitation is the list of sources considered for the literature review. However, this study provides a holistic overview for researchers and professionals willing to know more about smart city data sharing.

Originality/value

This review identifies the data governance approaches supporting data sharing in smart cities, analyzes their data dimension, enhances the state-of-the-art literature on this topic and suggests possible areas for future research.

Details

Aslib Journal of Information Management, vol. 75 no. 6
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 20 March 2017

Mortaza S. Bargh, Sunil Choenni and Ronald Meijer

Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the…

Abstract

Purpose

Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the trust of various stakeholders such as citizens and enterprises. Information dissemination, on the other hand, may increase the chance of privacy breaches, which can undermine those stakeholders’ trust and thus the objectives of transparency. Moreover, fear of potential privacy breaches compels information disseminators to share minimum or no information. The purpose of this study is to address these contending issues of information disseminations, i.e. privacy versus transparency, when disseminating judicial information to gain (public) trust. Specifically, the main research questions are: What is the nature of the aforementioned “privacy–transparency” problem and how can we approach and address this class of problems?

Design/methodology/approach

To address these questions, the authors have carried out an explorative case study by reconsidering and analyzing a number of information dissemination cases within their research center for the past 10 years, reflecting upon the whole design research process, consulting peers through publishing a preliminary version of this contribution and embedding the work in an in-depth literature study on research methodologies, wicked problems and e-government topics.

Findings

The authors show that preserving privacy while disseminating information for transparency purposes is a typical wicked problem, propose an innovative designerly model called transitional action design research (TADR) to address the class of such wicked problems and describe three artifacts which are designed, intervened and evaluated according to the TADR model in a judicial research organization.

Originality/value

Classifying the privacy transparency problem in the judicial settings as wicked is new, the proposed designerly model is innovative and the realized artifacts are deployed and still operational in a real setting.

Details

Transforming Government: People, Process and Policy, vol. 11 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Open Access
Article
Publication date: 1 August 2019

Bart Valks, Monique Arkesteijn and Alexandra Den Heijer

The purpose of this study is to generate knowledge about the use of smart campus tools to improve the effective and efficient use of campuses. Many universities are facing a…

2475

Abstract

Purpose

The purpose of this study is to generate knowledge about the use of smart campus tools to improve the effective and efficient use of campuses. Many universities are facing a challenge in attuning their accommodation to organisational demand. How can universities invest their resources as effectively as possible and not in space that will be poorly utilized? The hypothesis of this paper is that by using smart campus tools, this problem can be solved.

Design/methodology/approach

To answer the research question, previous survey at 13 Dutch universities was updated and compared with a survey of various universities and other organizations. The survey consisted of interviews with structured and semi-structured questions, which resulted in a unified output for 27 cases.

Findings

Based on the output of the cases, the development of smart campus tools at Dutch universities was compared to that of international universities and other organizations. Furthermore, the data collection led to insights regarding the reasons for initiating smart campus tools, user and management information, costs and benefits and foreseen developments.

Originality/value

Although the use of smart tools in practice has gained significant momentum in the past few years, research on the subject is still very technology-oriented and not well-connected to facility management and real estate management. This paper provides an overview of the ways in which universities and organizations are currently supporting their users, improving the use of their buildings and reducing their energy footprint through the use of smart tools.

Article
Publication date: 30 January 2024

Li Si and Xianrui Liu

This research aims to explore the research data ethics governance framework and collaborative network to optimize research data ethics governance practices, to balance the…

Abstract

Purpose

This research aims to explore the research data ethics governance framework and collaborative network to optimize research data ethics governance practices, to balance the relationship between data development and utilization, open sharing, data security and to reduce the ethical risks that may arise from data sharing and utilization.

Design/methodology/approach

This study explores the framework and collaborative network of research data ethics policies by using the UK as an example. 78 policies from the UK government, university, research institution, funding agency, publisher, database, library and third-party organization are obtained. Adopting grounded theory (GT) and social network analysis (SNA), Nvivo12 is used to analyze these samples and summarize the research data ethics governance framework. Ucinet and Netdraw are used to reveal collaborative networks in policy.

Findings

Results indicate that the framework covers governance context, subject and measure. The content of governance context contains context description and data ethics issues analysis. Governance subject consists of defining subjects and facilitating their collaboration. Governance measure includes governance guidance and ethics governance initiatives in the data lifecycle. The collaborative network indicates that research institution plays a central role in ethics governance. The core of the governance content are ethics governance initiatives, governance guidance and governance context description.

Research limitations/implications

This research provides new insights for policy analysis by combining GT and SNA methods. Research data ethics and its governance are conceptualized to complete data governance and research ethics theory.

Practical implications

A research data ethics governance framework and collaborative network are revealed, and actionable guidance for addressing essential aspects of research data ethics and multiple subjects to confer their functions in collaborative governance is provided.

Originality/value

This study analyzes policy text using qualitative and quantitative methods, ensuring fine-grained content profiling and improving policy research. A typical research data ethics governance framework is revealed. Various stakeholders' roles and priorities in collaborative governance are explored. These contribute to improving governance policies and governance levels in both theory and practice.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of 469