Show simple item record

Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists

dc.contributor.authorFrank, Rebecca D.
dc.contributor.authorKriesberg, Adam
dc.contributor.authorYakel, Elizabeth
dc.contributor.authorFaniel, Ixchel M.
dc.date.accessioned2016-03-07T19:05:30Z
dc.date.available2016-03-07T19:05:30Z
dc.date.issued2015
dc.identifier.citationFrank, Rebecca D.; Kriesberg, Adam; Yakel, Elizabeth; Faniel, Ixchel M. (2015). "Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists." Proceedings of the Association for Information Science and Technology 52(1): 1-10.
dc.identifier.issn2373-9231
dc.identifier.issn2373-9231
dc.identifier.urihttps://hdl.handle.net/2027.42/117482
dc.description.abstractResearchers in the social and health sciences are used to dealing with confidential data, and repositories in these areas have developed mechanisms to prevent unethical or illegal disclosure of this data. However, other scientific communities also collect data whose disclosure may cause harm to communities, cultures, or the environment. This paper presents results from 62 interviews and observations with archaeologists and zoologists. It focuses on how researchers’ perceptions of potential harm influence attitudes about data confidentiality, and how these, in turn, influence opinions about who should be responsible for managing access to data. This is particularly problematic in archaeology when harm is not to a living individual but is targeted at a community or culture that may or may not have living representatives, and in zoology when an environment or a species may be at risk. We find that while both archaeologists and zoologists view location information as highly important and valuable in facilitating use and reuse of data, they also acknowledge that location should at times be considered confidential information since it can be used to facilitate the destruction of cultural property through looting or decimation of endangered species through poaching. While researchers in both disciplines understand the potential dangers of allowing disclosure of this information, they disagree about who should take responsibility for access decisions and conditions.
dc.publisherGlobal Biodiversity Information Facility
dc.publisherWiley Periodicals, Inc.
dc.subject.otherdata sharing
dc.subject.otherdata curation
dc.subject.otherDigital repositories
dc.subject.otherdata reuse
dc.subject.otheraccess to data
dc.subject.otherdata confidentiality
dc.titleLooting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists
dc.typeArticleen_US
dc.rights.robotsIndexNoFollow
dc.subject.hlbsecondlevelInformation Science
dc.subject.hlbtoplevelSocial Sciences
dc.description.peerreviewedPeer Reviewed
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/117482/1/pra2145052010037.pdf
dc.identifier.doi10.1002/pra2.2015.145052010037
dc.identifier.sourceProceedings of the Association for Information Science and Technology
dc.identifier.citedreferenceLynott, M. J. ( 1997 ). Ethical principles and archaeological practice: development of an ethics policy. American Antiquity, 589 – 599.
dc.identifier.citedreferenceChavan, V., & Penev, L. ( 2011 ). The data paper: a mechanism to incentivize data publishing in biodiversity science. BMC Bioinformatics, 12 ( Suppl 15 ), S2. http://doi.org/10.1186/1471-2105-12-S15-S2
dc.identifier.citedreferenceCorti, L., Day, A., & Backhouse, G. ( 2000 ). Confidentiality and informed consent: Issues for consideration in the preservation of and provision of access to qualitative data archives. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 1 ). Retrieved from http://www.qualitative-research.net/index.php/fqs/article/viewArticle/1024
dc.identifier.citedreferenceDallmeier‐Tiessen, S., Darby, R., Gitmans, K., Lambert, S., Matthews, B., Mele, S., … Wilson, M. ( 2014 ). Enabling Sharing and Reuse of Scientific Data. New Review of Information Networking, 19 ( 1 ), 16 – 43. http://doi.org/10.1080/13614576.2014.883936
dc.identifier.citedreferenceEl Emam, K., Arbuckle, L., Koru, G., Eze, B., Gaudette, L., Neri, E., … Gluck, J. ( 2012 ). De‐identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset. Journal of Medical Internet Research, 14 ( 1 ), e33. http://doi.org/10.2196/jmir.2001
dc.identifier.citedreferenceFong, J. J., & Qiao, G. ( 2010 ). New localities of endangered Chinese turtles from museum specimens and the practical and ethical challenges using and reporting natural history collection data. Zootaxa, 2393, 59 – 68.
dc.identifier.citedreferenceHartter, J., Ryan, S. J., MacKenzie, C. A., Parker, J. N., & Strasser, C. A. ( 2013 ). Spatially Explicit Data: Stewardship and Ethical Challenges in Science. PLoS Biol, 11 ( 9 ), e1001634. http://doi.org/10.1371/journal.pbio.1001634
dc.identifier.citedreferenceHodder, I. ( 2011 ). Is a Shared Past Possible? The Ethics and Practice of Archaeology in the Twenty‐First Century. In K. Okamura & A. Matsuda (Eds.), New Perspectives in Global Public Archaeology (pp. 19 – 28 ). Springer New York. Retrieved from http://link.springer.com/chapter/10.1007/978-1-4614-0341-8_2
dc.identifier.citedreferenceInter‐university Consortium for Political and Social Research (ICPSR). ( 2015 ). About ICPSR. Retrieved April 19, 2015, from http://www.icpsr.umich.edu/icpsrweb/content/membership/about.html
dc.identifier.citedreferenceJahnke, L. M., & Asher, A. ( 2013 ). Dilemmas of Digital Stewardship: Research Ethics and the Problems of Data Sharing. Research Data Management, 80.
dc.identifier.citedreferenceKarasti, H., Baker, K. S., & Halkola, E. ( 2006 ). Enriching the Notion of Data Curation in E‐Science: Data Managing and Information Infrastructuring in the Long Term Ecological Research (LTER) Network. Computer Supported Cooperative Work (CSCW), 15 ( 4 ), 321 – 358. http://doi.org/10.1007/s10606-006-9023-2
dc.identifier.citedreferenceKersel, M. M., & Chesson, M. S. ( 2013 ). Looting Matters. Early Bronze Age Cemeteries of Jordan's southeast Dead Sea Plain in the Past and Present. Retrieved from http://works.bepress.com/cgi/viewcontent.cgi?article=1059&context=morag_kersel
dc.identifier.citedreferenceKrieger, W. H. ( 2014 ). Marketing Archaeology. Ethical Theory and Moral Practice, 17 ( 5 ), 923 – 939. http://doi.org/10.1007/s10677-014-9497-9
dc.identifier.citedreferenceKuula, A. ( 2010 ). Methodological and ethical dilemmas of archiving qualitative data. IASSIST Quarter.y, 34 ( 3 ), 12 – 17.
dc.identifier.citedreferenceLagoze, C., Block, W. C., Williams, J., Abowd, J., & Vilhuber, L. ( 2013 ). Data Management of Confidential Data. International Journal of Digital Curation, 8 ( 1 ), 265 – 278. http://doi.org/10.2218/ijdc.v8i1.259
dc.identifier.citedreferenceLyle, J. ( 2014 ). OpenICPSR: OpenICPSR. Bulletin of the American Society for Information Science and Technology, 40 ( 5 ), 55 – 56. http://doi.org/10.1002/bult.2014.1720400514
dc.identifier.citedreferenceOderkirk, J., Ronchi, E., & Klazinga, N. ( 2013 ). International comparisons of health system performance among OECD countries: Opportunities and data privacy protection challenges. Health Policy, 112 ( 1 ), 9 – 18. http://doi.org/10.1016/j.healthpol.2013.06.006
dc.identifier.citedreferenceParry, O., & Mauthner, N. S. ( 2004 ). Whose Data are They Anyway?: Practical, Legal and Ethical Issues in Archiving Qualitative Research Data. Sociology, 38 ( 1 ), 139 – 152. http://doi.org/10.1177/0038038504039366
dc.identifier.citedreferenceProtection of Human Subjects ( 2009 ). Retrieved from http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.html
dc.identifier.citedreferenceSociety for American Archaeology. ( 1996 ). Principles of Archaeological Ethics. Retrieved from http://www.saa.org/AbouttheSociety/PrinciplesofArchaeologicalEthics/tabid/203/Default.aspx
dc.identifier.citedreferenceSweeney, L. ( 1997 ). Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. (AMIA). Retrieved from http://dataprivacylab.org/datafly/paper4.pdf
dc.identifier.citedreferenceWallis, J. C., Rolando, E., & Borgman, C. L. ( 2013 ). If We Share Data, Will Anyone Use Them? Data Sharing and Reuse in the Long Tail of Science and Technology. PLoS ONE, 8 ( 7 ), e67332. http://doi.org/10.1371/journal.pone.0067332
dc.identifier.citedreferenceWylie, A. ( 1996 ). Ethical dilemmas in archaeological practice: Looting, repatriation, stewardship, and the (trans) formation of disciplinary identity. Perspectives on Science: Historical Philosophical, Social, 4 ( 2 ), 154 – 194.
dc.identifier.citedreferenceZimmerman, A. S. ( 2008 ). New Knowledge from Old Data. Science, Technology & Human Values, 33 ( 5 ), 631 – 652. http://doi.org/10.1177/0162243907306704
dc.identifier.citedreferenceAbout Open Context: Publishing. ( 2015 ). Retrieved April 29, 2015, from http://opencontext.org/about/publishing
dc.identifier.citedreferenceArzberger, P. W., Schroeder, P., Beaulieu, A., Bowker, G. C., Casey, K., Laaksonen, L., … Wouters, P. ( 2004 ). Promoting Access to Public Research Data for Scientific, Economic, and Social Development. Data Science Journal, 3 ( 29 ), 135 – 152.
dc.identifier.citedreferenceBorgman, C. L. ( 2012 ). The conundrum of sharing research data. Journal of the American Society for Information Science and Technology, 63 ( 6 ), 1059 – 1078. http://doi.org/10.1002/asi.22634
dc.identifier.citedreferenceChapman, A. D., & Grafton, O. ( 2008 ). Guide to Best Practices for Generalising Primary Species‐Occurrence Data (p. 27 ). Copenhagen: Global Biodiversity Information Facility. Retrieved from http://www.gbif.org/orc/?doc_id=1233
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.