Data management for social anthropology ADVANCED MODULE.

Slides:



Advertisements
Similar presentations
Directorate of Learning Resources Teaching resources in RADAR.
Advertisements

Depositing Data for Archiving Libby Bishop ESDS Qualidata, University of Essex Changing Families, Changing Food Meeting University of Sheffield 15 March.
Organise Workplace Information
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
DIY Research Data Management Training Kit for Librarians Ethics and copyright Robin Rice, Data Librarian EDINA and Data Library Information Services.
MSc Dissertation Preparation Session 2. Literature review The literature review is the means by which we establish what is already known and recorded.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Archives Search Tips for Claims Researchers S. Hurford and J. Wilhelm 2010.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Overview To Date. You Should have -- Awareness of “creativity” – Yours and others Experience critiquing creative work – Peer Reviews Insight into creative.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
Historic collection for researchers Sarah Price and Richard Pears.
Washington State Archives Documenting Democracy Washington State Archives September 2010 Managing Public Records Websites, Databases, and Social Media.
DATA MANAGEMENT FOR SOCIAL ANTHROPOLOGY a basic course.
DATA MANAGEMENT for SOCIAL ANTHROPOLOGY a course for writing-up students.
Management of information. Objectives Discuss the benefits of good management practice Present reference management tools Present bookmark management.
USING STUDENT OUTCOMES WHEN INTEGRATING INFORMATION LITERACY SKILLS INTO COURSES Information Literacy Department Asa H. Gordon Library Savannah State University.
Fuschia M. Sirois A Research Ethics Board Educational Seminar Web-based Research & Surveys.
The term web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. CILIP Scotland
BECOME A BLOGGER: Create a Classroom that Extends Beyond the Boundaries of the School Building.
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
A socio-technical model for content sharing
CPS Acceptable Use Policy Day 2 – Technology Session.
Item Web 2.0 application relevant to teacher’s work.
MANAGING YOUR RESEARCH DATA: PLANNING TO SHARE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Team working in distributed environments M253 Project Logs Faculty of Computer Studies Arab Open University Kuwait Branch 9/19/20151Kwuait Branch.
5-7 November 2014 DR Workflow Practical Digital Content Management from Digital Libraries & Archives Perspective.
Introduction to Databases A line manager asks, “If data unorganized is like matter unorganized and God created the heavens and earth in six days, how come.
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice SISP Training Documentation Template.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Contract Models for Virtual Teaching Helsinki University Porthania III 24 October 2001 Kristiina Harenko Attorneys at Law Borenius & Kemppinen Oy.
DIRECTIVE 2003/98/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 November 2003 on the re-use of public sector information (PSI directive) Theory.
DINI „Electronic Publishing Group“ DINI – Certificate Document and Publication Repositories “Electronic Publishing Group“
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
From FAUST to VOYAGER efforts to maintain map and geodata stocks 17th Conference of the LIBER Groupe des Cartothécaires TALLINN, Estonia June 2010.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
FILE NUMBER Kent Grey, Partner 1 June 2012 Technology in Governance Risk-intelligent approach to the use of technology “in the Boardroom”
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data Protection and Records Management. Key Responsibilities - Record Management Keep Information Accurate Disclose only if compatible with purpose for.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
PatentScope - Electronic Publication World Intellectual Property Organization.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Systematic literature searching Information skills for PhD students: 2 Jane Falconer Improving health worldwidewww.lshtm.ac.uk.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
Data for secondary analysis: the experience of the UK Data Archive Hilary Beedham UK Data Archive.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Data Management Lesley A. Brown Director of Proposal Development.
Nov 26, Health-y sharing of human data. 2 Plan ahead.. It can be done in many cases, to great success and benefit!
Personal data protection in research projects
University Retention Schedule Training. Introduction to the University Retention Schedule.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Engaging our students with Web2.0 tools. Teacher delivers content and skills based on government standards Content and skills delivered by the teacher.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Electronic Records Management Alan Cameron Records Management Consultant.
Technology Transfer Office
What can we expect from the lawyers ?
Data Protection GCSE ICT Mrs N Steventon-2005.
New challenges for archives in Iceland
Lenva Shearing Gail Mitchell
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Security of People, Property and Information
SFU Open Access Policy Endorsed by Senate January 9, 2017
ScHARR Bite Size Research Ethics and GDPR: legal requirements for research - what you need to know.
Data Management Ethical considerations for educational research
GDPR – General Data Protection Regulation
Communicating in the IT Industry
What can we expect from the lawyers ?
ScHARR Bite Size Research Ethics and GDPR: legal requirements for research - what you need to know.
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

data management for social anthropology ADVANCED MODULE

[OUTLINE] 1. DOCUMENTING YOUR DATA i. Paper archives and indexes ii. Digital archives iii. Brainstorm iv. Techniques and software v. Categories and ontology vi. Sharing 2. ETHICAL AND LEGAL ISSUES i. Risks and issues in data dissemination ii. Some tips and techniques to make data safer iii. Data Protection Act 1998 iv. Freedom of Information Act 2000 v. Intellectual Property and copyright

N.B. - THIS IS A P A R T I C I P A T O R Y EXERCISE!

1

docume ntation & metadat a

=Catalog&type=default&fname=Malinowski\ Malinowski_3_18_5.jpg

For instance, my present mode of life: I turn in too late, I get up at irregular hours. Too little time devoted to observation, contact with natives, too much to barren collecting of information. I rest too frequently, and indulge in "demoralization". I also thought about problems of keeping a diary. How immensely difficult it is to formulate the endless variety of things in the current of a life. Keeping a diary as a problem of psychological analysis: to isolate essential elements, to classify them (from what point of view?), then, in describing them indicate more or less clearly what is their actual importance at the given moment, proportion; my subjective reaction, etc. (Malinowski, B A Diary in the Strict Sense of the Term. Stanford: Stanford University Press; entry for , p. 247)

what is an index, and how does it work?

rlane.com/FILES/fraz er.htm

why paper-slip indexes collapse: size, untransportability, cannot be accessed remotely shifting, complex, rigid classification difficult to find cards in the dataset

t.htm

Description.asp?sn= 5801&key=caplan+f ood

e.org/repolist repositories ar.org/

documentation WHAT TECHNIQUES, CATEGORIES, SOFTWARE, ISSUES ? BRAINSTORM

TECHNIQUES&SOFTWARE - FORMAT-SPECIFIC: -digital: linking and back-linking, tagging, searching, horizontal classification -analogue: hierarchical classification, manual tagging OR -GENERIC: e.g. colour-coding, categories, dates, place names… - REPORTS CAN HELP! - KEEP AS MUCH OF YOUR DATA AND DOCUMENTATION IN THE SAME PLACE - SOFTWARE MIGHT PROVE USEFUL – wikis, databases, reference managers, spreadsheets..

CATEGORIES/ONTOLOGY -EVALUATE PROS & CONS (time consuming, expensive, but useful in the long-term and for analysis) -PROJECT- & FOCUS-SPECIFIC - VOLATILE!  BETTER TO STICK TO GENERIC DESCRIPTORS? (e.g. places and personal names, more easily remembered; dates; …) - NEED DOCUMENTING AND UPDATING: make an index of the categories you use, and systematically update as you add new ones

HOW TO DEVELOP AND INDEX

SHARING WITH: - your supervisor - peers - other academics - research participants - wider audiences

agree on rules and conventions on mode of sharing and file naming

USEFUL TOOLS: - institutional networked storage -virtual learning/research environments - Dropbox - GoogleDocs - Google+ - academic web networks - blogs - wikis - digital repositories

ac.uk/

2

law & ethics

m/2010/11/archive.jpg

RISKS of DISSEMIN ATION: -online storage - sharing and consent -crossing borders

ww.theas a.org/ethi cs/guideli nes.shtml

TIPS [multiple copies] [restrict access] [log out] [firewalls & anti-virus] [destroy data if necessary] [encryption] [tiered consent] [anonymisation]

DATA PROTECTION ACT data may only be used for the purposes it was collected for -data must not be disclosed to other parties without consent - individuals have a right of access to information held about them - personal information may be kept for no longer than is necessary, and may not be sent outside the EEA

FREEDOM of INFORMATION ACT gives right to request access to recorded information (such as research data) held by public sector organisations; or be informed whether information is held -exceptions: personal data, data accessible by other means, meant for publication or subject to confidentiality agreement

iNTELLECTUAL pROPERTY copyright = creative works fixed in material form depends on academic status/institution/employment position right to control copying, adaptation, publishing, performance, broadcast of the work, and their conditions exceptions for personal use and teaching limited time duration

SHARING & PUBL]SHING: ethics, politics, analyitics – your views