Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists
dc.contributor.author | Frank, Rebecca D. | |
dc.contributor.author | Kriesberg, Adam | |
dc.contributor.author | Yakel, Elizabeth | |
dc.contributor.author | Faniel, Ixchel M. | |
dc.date.accessioned | 2016-03-07T19:05:30Z | |
dc.date.available | 2016-03-07T19:05:30Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Frank, Rebecca D.; Kriesberg, Adam; Yakel, Elizabeth; Faniel, Ixchel M. (2015). "Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists." Proceedings of the Association for Information Science and Technology 52(1): 1-10. | |
dc.identifier.issn | 2373-9231 | |
dc.identifier.issn | 2373-9231 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/117482 | |
dc.description.abstract | Researchers in the social and health sciences are used to dealing with confidential data, and repositories in these areas have developed mechanisms to prevent unethical or illegal disclosure of this data. However, other scientific communities also collect data whose disclosure may cause harm to communities, cultures, or the environment. This paper presents results from 62 interviews and observations with archaeologists and zoologists. It focuses on how researchers’ perceptions of potential harm influence attitudes about data confidentiality, and how these, in turn, influence opinions about who should be responsible for managing access to data. This is particularly problematic in archaeology when harm is not to a living individual but is targeted at a community or culture that may or may not have living representatives, and in zoology when an environment or a species may be at risk. We find that while both archaeologists and zoologists view location information as highly important and valuable in facilitating use and reuse of data, they also acknowledge that location should at times be considered confidential information since it can be used to facilitate the destruction of cultural property through looting or decimation of endangered species through poaching. While researchers in both disciplines understand the potential dangers of allowing disclosure of this information, they disagree about who should take responsibility for access decisions and conditions. | |
dc.publisher | Global Biodiversity Information Facility | |
dc.publisher | Wiley Periodicals, Inc. | |
dc.subject.other | data sharing | |
dc.subject.other | data curation | |
dc.subject.other | Digital repositories | |
dc.subject.other | data reuse | |
dc.subject.other | access to data | |
dc.subject.other | data confidentiality | |
dc.title | Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists | |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | |
dc.subject.hlbsecondlevel | Information Science | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.description.peerreviewed | Peer Reviewed | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/117482/1/pra2145052010037.pdf | |
dc.identifier.doi | 10.1002/pra2.2015.145052010037 | |
dc.identifier.source | Proceedings of the Association for Information Science and Technology | |
dc.identifier.citedreference | Lynott, M. J. ( 1997 ). Ethical principles and archaeological practice: development of an ethics policy. American Antiquity, 589 – 599. | |
dc.identifier.citedreference | Chavan, V., & Penev, L. ( 2011 ). The data paper: a mechanism to incentivize data publishing in biodiversity science. BMC Bioinformatics, 12 ( Suppl 15 ), S2. http://doi.org/10.1186/1471-2105-12-S15-S2 | |
dc.identifier.citedreference | Corti, L., Day, A., & Backhouse, G. ( 2000 ). Confidentiality and informed consent: Issues for consideration in the preservation of and provision of access to qualitative data archives. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 1 ). Retrieved from http://www.qualitative-research.net/index.php/fqs/article/viewArticle/1024 | |
dc.identifier.citedreference | Dallmeier‐Tiessen, S., Darby, R., Gitmans, K., Lambert, S., Matthews, B., Mele, S., … Wilson, M. ( 2014 ). Enabling Sharing and Reuse of Scientific Data. New Review of Information Networking, 19 ( 1 ), 16 – 43. http://doi.org/10.1080/13614576.2014.883936 | |
dc.identifier.citedreference | El Emam, K., Arbuckle, L., Koru, G., Eze, B., Gaudette, L., Neri, E., … Gluck, J. ( 2012 ). De‐identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset. Journal of Medical Internet Research, 14 ( 1 ), e33. http://doi.org/10.2196/jmir.2001 | |
dc.identifier.citedreference | Fong, J. J., & Qiao, G. ( 2010 ). New localities of endangered Chinese turtles from museum specimens and the practical and ethical challenges using and reporting natural history collection data. Zootaxa, 2393, 59 – 68. | |
dc.identifier.citedreference | Hartter, J., Ryan, S. J., MacKenzie, C. A., Parker, J. N., & Strasser, C. A. ( 2013 ). Spatially Explicit Data: Stewardship and Ethical Challenges in Science. PLoS Biol, 11 ( 9 ), e1001634. http://doi.org/10.1371/journal.pbio.1001634 | |
dc.identifier.citedreference | Hodder, I. ( 2011 ). Is a Shared Past Possible? The Ethics and Practice of Archaeology in the Twenty‐First Century. In K. Okamura & A. Matsuda (Eds.), New Perspectives in Global Public Archaeology (pp. 19 – 28 ). Springer New York. Retrieved from http://link.springer.com/chapter/10.1007/978-1-4614-0341-8_2 | |
dc.identifier.citedreference | Inter‐university Consortium for Political and Social Research (ICPSR). ( 2015 ). About ICPSR. Retrieved April 19, 2015, from http://www.icpsr.umich.edu/icpsrweb/content/membership/about.html | |
dc.identifier.citedreference | Jahnke, L. M., & Asher, A. ( 2013 ). Dilemmas of Digital Stewardship: Research Ethics and the Problems of Data Sharing. Research Data Management, 80. | |
dc.identifier.citedreference | Karasti, H., Baker, K. S., & Halkola, E. ( 2006 ). Enriching the Notion of Data Curation in E‐Science: Data Managing and Information Infrastructuring in the Long Term Ecological Research (LTER) Network. Computer Supported Cooperative Work (CSCW), 15 ( 4 ), 321 – 358. http://doi.org/10.1007/s10606-006-9023-2 | |
dc.identifier.citedreference | Kersel, M. M., & Chesson, M. S. ( 2013 ). Looting Matters. Early Bronze Age Cemeteries of Jordan's southeast Dead Sea Plain in the Past and Present. Retrieved from http://works.bepress.com/cgi/viewcontent.cgi?article=1059&context=morag_kersel | |
dc.identifier.citedreference | Krieger, W. H. ( 2014 ). Marketing Archaeology. Ethical Theory and Moral Practice, 17 ( 5 ), 923 – 939. http://doi.org/10.1007/s10677-014-9497-9 | |
dc.identifier.citedreference | Kuula, A. ( 2010 ). Methodological and ethical dilemmas of archiving qualitative data. IASSIST Quarter.y, 34 ( 3 ), 12 – 17. | |
dc.identifier.citedreference | Lagoze, C., Block, W. C., Williams, J., Abowd, J., & Vilhuber, L. ( 2013 ). Data Management of Confidential Data. International Journal of Digital Curation, 8 ( 1 ), 265 – 278. http://doi.org/10.2218/ijdc.v8i1.259 | |
dc.identifier.citedreference | Lyle, J. ( 2014 ). OpenICPSR: OpenICPSR. Bulletin of the American Society for Information Science and Technology, 40 ( 5 ), 55 – 56. http://doi.org/10.1002/bult.2014.1720400514 | |
dc.identifier.citedreference | Oderkirk, J., Ronchi, E., & Klazinga, N. ( 2013 ). International comparisons of health system performance among OECD countries: Opportunities and data privacy protection challenges. Health Policy, 112 ( 1 ), 9 – 18. http://doi.org/10.1016/j.healthpol.2013.06.006 | |
dc.identifier.citedreference | Parry, O., & Mauthner, N. S. ( 2004 ). Whose Data are They Anyway?: Practical, Legal and Ethical Issues in Archiving Qualitative Research Data. Sociology, 38 ( 1 ), 139 – 152. http://doi.org/10.1177/0038038504039366 | |
dc.identifier.citedreference | Protection of Human Subjects ( 2009 ). Retrieved from http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.html | |
dc.identifier.citedreference | Society for American Archaeology. ( 1996 ). Principles of Archaeological Ethics. Retrieved from http://www.saa.org/AbouttheSociety/PrinciplesofArchaeologicalEthics/tabid/203/Default.aspx | |
dc.identifier.citedreference | Sweeney, L. ( 1997 ). Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. (AMIA). Retrieved from http://dataprivacylab.org/datafly/paper4.pdf | |
dc.identifier.citedreference | Wallis, J. C., Rolando, E., & Borgman, C. L. ( 2013 ). If We Share Data, Will Anyone Use Them? Data Sharing and Reuse in the Long Tail of Science and Technology. PLoS ONE, 8 ( 7 ), e67332. http://doi.org/10.1371/journal.pone.0067332 | |
dc.identifier.citedreference | Wylie, A. ( 1996 ). Ethical dilemmas in archaeological practice: Looting, repatriation, stewardship, and the (trans) formation of disciplinary identity. Perspectives on Science: Historical Philosophical, Social, 4 ( 2 ), 154 – 194. | |
dc.identifier.citedreference | Zimmerman, A. S. ( 2008 ). New Knowledge from Old Data. Science, Technology & Human Values, 33 ( 5 ), 631 – 652. http://doi.org/10.1177/0162243907306704 | |
dc.identifier.citedreference | About Open Context: Publishing. ( 2015 ). Retrieved April 29, 2015, from http://opencontext.org/about/publishing | |
dc.identifier.citedreference | Arzberger, P. W., Schroeder, P., Beaulieu, A., Bowker, G. C., Casey, K., Laaksonen, L., … Wouters, P. ( 2004 ). Promoting Access to Public Research Data for Scientific, Economic, and Social Development. Data Science Journal, 3 ( 29 ), 135 – 152. | |
dc.identifier.citedreference | Borgman, C. L. ( 2012 ). The conundrum of sharing research data. Journal of the American Society for Information Science and Technology, 63 ( 6 ), 1059 – 1078. http://doi.org/10.1002/asi.22634 | |
dc.identifier.citedreference | Chapman, A. D., & Grafton, O. ( 2008 ). Guide to Best Practices for Generalising Primary Species‐Occurrence Data (p. 27 ). Copenhagen: Global Biodiversity Information Facility. Retrieved from http://www.gbif.org/orc/?doc_id=1233 | |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.