Show simple item record

Facilitating collaboration with restricted-use data

dc.contributor.authorMarcotte, John
dc.date.accessioned2019-11-01T16:14:13Z
dc.date.available2019-11-01T16:14:13Z
dc.date.issued2017-05-24
dc.identifier.urihttps://hdl.handle.net/2027.42/151922
dc.description.abstractData protection requirements often impede collaborations. A typical security plan requires a standalone (non-networked) computer in a locked office. This requirement makes collaborating with colleagues at the same institution difficult; moreover, it makes collaborating across institutions practically impossible. The challenge is to provide a platform that facilitates collaboration while also meeting security requirements. Cloud computing with virtualized machines can meet these challenges. Virtual machines can be configured to prevent them from accessing the Internet so that researchers cannot copy files to a server on the Internet. With virtual environment, implementing vetting of output by authorized reviewers can easily be incorporated into the protocols. Researchers from different institutions can access the virtual machines in the cloud and have access to shared project resources and files. Virtual environments have been recognized for their security. The most important feature of this type of virtual environment is that the restricted-use data never leave the system. Access to the data may be modified instantly. When a data use agreement expires, access can be immediately terminated. Another facet is controlling output so that it can be vetted for disclosure risk. In addition to these security controls, virtual environments can be setup with common disk space for projects. This disk space is a way for researcher at different location to collaborate. Since this space is within the virtual environment, it meets security requirements. How do we facilitate collaboration while maintaining adequate security? Security requirements typically put researchers in separate computing environments.en_US
dc.language.isoen_USen_US
dc.titleFacilitating collaboration with restricted-use dataen_US
dc.typePresentationen_US
dc.subject.hlbsecondlevelStatistics and Numeric Data
dc.subject.hlbtoplevelSocial Sciences
dc.contributor.affiliationumICPSRen_US
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttps://deepblue.lib.umich.edu/bitstream/2027.42/151922/1/JEMarcotte-Facilitating collaboration.pdf
dc.identifier.sourceIASSIST 2017en_US
dc.identifier.orcidhttps://orcid.org/0000-0002-6199-4454en_US
dc.description.filedescriptionDescription of JEMarcotte-Facilitating collaboration.pdf : Presentation Slides
dc.identifier.name-orcidMarcotte, John E; 0000-0002-6199-4454en_US
dc.owningcollnameInter-university Consortium for Political and Social Research (ICPSR)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.