Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists

Show simple item record

dc.contributor.author Frank, Rebecca D.
dc.contributor.author Kriesberg, Adam
dc.contributor.author Yakel, Elizabeth
dc.contributor.author Faniel, Ixchel M.
dc.date.accessioned 2016-03-07T19:05:30Z
dc.date.available 2016-03-07T19:05:30Z
dc.date.issued 2015
dc.identifier.citation Frank, Rebecca D.; Kriesberg, Adam; Yakel, Elizabeth; Faniel, Ixchel M. (2015). "Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists." Proceedings of the Association for Information Science and Technology 52(1): 1-10.
dc.identifier.issn 2373-9231
dc.identifier.issn 2373-9231
dc.identifier.uri http://hdl.handle.net/2027.42/117482
dc.description.abstract Researchers in the social and health sciences are used to dealing with confidential data, and repositories in these areas have developed mechanisms to prevent unethical or illegal disclosure of this data. However, other scientific communities also collect data whose disclosure may cause harm to communities, cultures, or the environment. This paper presents results from 62 interviews and observations with archaeologists and zoologists. It focuses on how researchers’ perceptions of potential harm influence attitudes about data confidentiality, and how these, in turn, influence opinions about who should be responsible for managing access to data. This is particularly problematic in archaeology when harm is not to a living individual but is targeted at a community or culture that may or may not have living representatives, and in zoology when an environment or a species may be at risk. We find that while both archaeologists and zoologists view location information as highly important and valuable in facilitating use and reuse of data, they also acknowledge that location should at times be considered confidential information since it can be used to facilitate the destruction of cultural property through looting or decimation of endangered species through poaching. While researchers in both disciplines understand the potential dangers of allowing disclosure of this information, they disagree about who should take responsibility for access decisions and conditions.
dc.publisher Global Biodiversity Information Facility
dc.publisher Wiley Periodicals, Inc.
dc.subject.other data sharing
dc.subject.other data curation
dc.subject.other Digital repositories
dc.subject.other data reuse
dc.subject.other access to data
dc.subject.other data confidentiality
dc.title Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists
dc.rights.robots IndexNoFollow
dc.subject.hlbsecondlevel Information Science
dc.subject.hlbtoplevel Social Sciences
dc.description.peerreviewed Peer Reviewed
dc.description.bitstreamurl http://deepblue.lib.umich.edu/bitstream/2027.42/117482/1/pra2145052010037.pdf
dc.identifier.doi 10.1002/pra2.2015.145052010037
dc.identifier.source Proceedings of the Association for Information Science and Technology
dc.identifier.citedreference Lynott, M. J. ( 1997 ). Ethical principles and archaeological practice: development of an ethics policy. American Antiquity, 589 – 599.
dc.identifier.citedreference Chavan, V., & Penev, L. ( 2011 ). The data paper: a mechanism to incentivize data publishing in biodiversity science. BMC Bioinformatics, 12 ( Suppl 15 ), S2. http://doi.org/10.1186/1471-2105-12-S15-S2
dc.identifier.citedreference Corti, L., Day, A., & Backhouse, G. ( 2000 ). Confidentiality and informed consent: Issues for consideration in the preservation of and provision of access to qualitative data archives. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 1 ). Retrieved from http://www.qualitative-research.net/index.php/fqs/article/viewArticle/1024
dc.identifier.citedreference Dallmeier‐Tiessen, S., Darby, R., Gitmans, K., Lambert, S., Matthews, B., Mele, S., … Wilson, M. ( 2014 ). Enabling Sharing and Reuse of Scientific Data. New Review of Information Networking, 19 ( 1 ), 16 – 43. http://doi.org/10.1080/13614576.2014.883936
dc.identifier.citedreference El Emam, K., Arbuckle, L., Koru, G., Eze, B., Gaudette, L., Neri, E., … Gluck, J. ( 2012 ). De‐identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset. Journal of Medical Internet Research, 14 ( 1 ), e33. http://doi.org/10.2196/jmir.2001
dc.identifier.citedreference Fong, J. J., & Qiao, G. ( 2010 ). New localities of endangered Chinese turtles from museum specimens and the practical and ethical challenges using and reporting natural history collection data. Zootaxa, 2393, 59 – 68.
dc.identifier.citedreference Hartter, J., Ryan, S. J., MacKenzie, C. A., Parker, J. N., & Strasser, C. A. ( 2013 ). Spatially Explicit Data: Stewardship and Ethical Challenges in Science. PLoS Biol, 11 ( 9 ), e1001634. http://doi.org/10.1371/journal.pbio.1001634
dc.identifier.citedreference Hodder, I. ( 2011 ). Is a Shared Past Possible? The Ethics and Practice of Archaeology in the Twenty‐First Century. In K. Okamura & A. Matsuda (Eds.), New Perspectives in Global Public Archaeology (pp. 19 – 28 ). Springer New York. Retrieved from http://link.springer.com/chapter/10.1007/978-1-4614-0341-8_2
dc.identifier.citedreference Inter‐university Consortium for Political and Social Research (ICPSR). ( 2015 ). About ICPSR. Retrieved April 19, 2015, from http://www.icpsr.umich.edu/icpsrweb/content/membership/about.html
dc.identifier.citedreference Jahnke, L. M., & Asher, A. ( 2013 ). Dilemmas of Digital Stewardship: Research Ethics and the Problems of Data Sharing. Research Data Management, 80.
dc.identifier.citedreference Karasti, H., Baker, K. S., & Halkola, E. ( 2006 ). Enriching the Notion of Data Curation in E‐Science: Data Managing and Information Infrastructuring in the Long Term Ecological Research (LTER) Network. Computer Supported Cooperative Work (CSCW), 15 ( 4 ), 321 – 358. http://doi.org/10.1007/s10606-006-9023-2
dc.identifier.citedreference Kersel, M. M., & Chesson, M. S. ( 2013 ). Looting Matters. Early Bronze Age Cemeteries of Jordan's southeast Dead Sea Plain in the Past and Present. Retrieved from http://works.bepress.com/cgi/viewcontent.cgi?article=1059&context=morag_kersel
dc.identifier.citedreference Krieger, W. H. ( 2014 ). Marketing Archaeology. Ethical Theory and Moral Practice, 17 ( 5 ), 923 – 939. http://doi.org/10.1007/s10677-014-9497-9
dc.identifier.citedreference Kuula, A. ( 2010 ). Methodological and ethical dilemmas of archiving qualitative data. IASSIST Quarter.y, 34 ( 3 ), 12 – 17.
dc.identifier.citedreference Lagoze, C., Block, W. C., Williams, J., Abowd, J., & Vilhuber, L. ( 2013 ). Data Management of Confidential Data. International Journal of Digital Curation, 8 ( 1 ), 265 – 278. http://doi.org/10.2218/ijdc.v8i1.259
dc.identifier.citedreference Lyle, J. ( 2014 ). OpenICPSR: OpenICPSR. Bulletin of the American Society for Information Science and Technology, 40 ( 5 ), 55 – 56. http://doi.org/10.1002/bult.2014.1720400514
dc.identifier.citedreference Oderkirk, J., Ronchi, E., & Klazinga, N. ( 2013 ). International comparisons of health system performance among OECD countries: Opportunities and data privacy protection challenges. Health Policy, 112 ( 1 ), 9 – 18. http://doi.org/10.1016/j.healthpol.2013.06.006
dc.identifier.citedreference Parry, O., & Mauthner, N. S. ( 2004 ). Whose Data are They Anyway?: Practical, Legal and Ethical Issues in Archiving Qualitative Research Data. Sociology, 38 ( 1 ), 139 – 152. http://doi.org/10.1177/0038038504039366
dc.identifier.citedreference Protection of Human Subjects ( 2009 ). Retrieved from http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.html
dc.identifier.citedreference Society for American Archaeology. ( 1996 ). Principles of Archaeological Ethics. Retrieved from http://www.saa.org/AbouttheSociety/PrinciplesofArchaeologicalEthics/tabid/203/Default.aspx
dc.identifier.citedreference Sweeney, L. ( 1997 ). Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. (AMIA). Retrieved from http://dataprivacylab.org/datafly/paper4.pdf
dc.identifier.citedreference Wallis, J. C., Rolando, E., & Borgman, C. L. ( 2013 ). If We Share Data, Will Anyone Use Them? Data Sharing and Reuse in the Long Tail of Science and Technology. PLoS ONE, 8 ( 7 ), e67332. http://doi.org/10.1371/journal.pone.0067332
dc.identifier.citedreference Wylie, A. ( 1996 ). Ethical dilemmas in archaeological practice: Looting, repatriation, stewardship, and the (trans) formation of disciplinary identity. Perspectives on Science: Historical Philosophical, Social, 4 ( 2 ), 154 – 194.
dc.identifier.citedreference Zimmerman, A. S. ( 2008 ). New Knowledge from Old Data. Science, Technology & Human Values, 33 ( 5 ), 631 – 652. http://doi.org/10.1177/0162243907306704
dc.identifier.citedreference About Open Context: Publishing. ( 2015 ). Retrieved April 29, 2015, from http://opencontext.org/about/publishing
dc.identifier.citedreference Arzberger, P. W., Schroeder, P., Beaulieu, A., Bowker, G. C., Casey, K., Laaksonen, L., … Wouters, P. ( 2004 ). Promoting Access to Public Research Data for Scientific, Economic, and Social Development. Data Science Journal, 3 ( 29 ), 135 – 152.
dc.identifier.citedreference Borgman, C. L. ( 2012 ). The conundrum of sharing research data. Journal of the American Society for Information Science and Technology, 63 ( 6 ), 1059 – 1078. http://doi.org/10.1002/asi.22634
dc.identifier.citedreference Chapman, A. D., & Grafton, O. ( 2008 ). Guide to Best Practices for Generalising Primary Species‐Occurrence Data (p. 27 ). Copenhagen: Global Biodiversity Information Facility. Retrieved from http://www.gbif.org/orc/?doc_id=1233
dc.owningcollname Interdisciplinary and Peer-Reviewed
 Show simple item record

This item appears in the following Collection(s)


Search Deep Blue

Advanced Search

Browse by

My Account

Information

Coming Soon


MLibrary logo