Facilitating collaboration with restricted-use data
dc.contributor.author | Marcotte, John | |
dc.date.accessioned | 2019-11-01T16:14:13Z | |
dc.date.available | 2019-11-01T16:14:13Z | |
dc.date.issued | 2017-05-24 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/151922 | |
dc.description.abstract | Data protection requirements often impede collaborations. A typical security plan requires a standalone (non-networked) computer in a locked office. This requirement makes collaborating with colleagues at the same institution difficult; moreover, it makes collaborating across institutions practically impossible. The challenge is to provide a platform that facilitates collaboration while also meeting security requirements. Cloud computing with virtualized machines can meet these challenges. Virtual machines can be configured to prevent them from accessing the Internet so that researchers cannot copy files to a server on the Internet. With virtual environment, implementing vetting of output by authorized reviewers can easily be incorporated into the protocols. Researchers from different institutions can access the virtual machines in the cloud and have access to shared project resources and files. Virtual environments have been recognized for their security. The most important feature of this type of virtual environment is that the restricted-use data never leave the system. Access to the data may be modified instantly. When a data use agreement expires, access can be immediately terminated. Another facet is controlling output so that it can be vetted for disclosure risk. In addition to these security controls, virtual environments can be setup with common disk space for projects. This disk space is a way for researcher at different location to collaborate. Since this space is within the virtual environment, it meets security requirements. How do we facilitate collaboration while maintaining adequate security? Security requirements typically put researchers in separate computing environments. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Facilitating collaboration with restricted-use data | en_US |
dc.type | Presentation | en_US |
dc.subject.hlbsecondlevel | Statistics and Numeric Data | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.contributor.affiliationum | ICPSR | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/151922/1/JEMarcotte-Facilitating collaboration.pdf | |
dc.identifier.source | IASSIST 2017 | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-6199-4454 | en_US |
dc.description.filedescription | Description of JEMarcotte-Facilitating collaboration.pdf : Presentation Slides | |
dc.identifier.name-orcid | Marcotte, John E; 0000-0002-6199-4454 | en_US |
dc.owningcollname | Inter-university Consortium for Political and Social Research (ICPSR) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.