Protecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing
dc.contributor.author | Myers, Claire A. | |
dc.contributor.author | Long, Shelby E. | |
dc.contributor.author | Polasek, Faye O. | |
dc.date.accessioned | 2020-11-04T15:58:44Z | |
dc.date.available | WITHHELD_12_MONTHS | |
dc.date.available | 2020-11-04T15:58:44Z | |
dc.date.issued | 2020-10 | |
dc.identifier.citation | Myers, Claire A.; Long, Shelby E.; Polasek, Faye O. (2020). "Protecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing." Proceedings of the Association for Information Science and Technology 57(1): n/a-n/a. | |
dc.identifier.issn | 2373-9231 | |
dc.identifier.issn | 2373-9231 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/163391 | |
dc.description.abstract | The Library Assessment for Research and Scholarship Lab investigates qualitative research support across disciplines. In 2018–2019, the lab conducted 29 interviews with faculty, librarians, and doctoral students who engaged in qualitative research to understand their needs during the research lifecycle. At the conclusion of this project, the qualitative data will be deposited in a repository where it can be made available for future secondary use. The deposited data will include de‐identified versions of the complete interview transcripts. This poster supplements existing de‐identification standards, details drafting and revising protocol for de‐identification of our data, and discusses the de‐identification process we used for the qualitative data. Existing de‐identification literature and standards are limited and not widely uniform in qualitative research. In developing de‐identification protocol, our lab recognized several potential challenges in the process and created procedures to ensure future data usability. There is inherent tension between keeping privacy intact and sharing undistorted qualitative data. We aim to address some of the hazards with de‐identification best practices, demonstrating methodology for producing high quality de‐identified qualitative data. In offering up a test case with suggested methods to better protect participants’ identities, this work will lend itself to sustainable qualitative data sharing and reuse. | |
dc.publisher | John Wiley & Sons, Inc. | |
dc.subject.other | data sharing | |
dc.subject.other | qualitative research | |
dc.subject.other | data de‐identification | |
dc.title | Protecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing | |
dc.type | Article | |
dc.rights.robots | IndexNoFollow | |
dc.subject.hlbsecondlevel | Information Science | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.description.peerreviewed | Peer Reviewed | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/163391/2/pra2415_am.pdf | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/163391/1/pra2415.pdf | en_US |
dc.identifier.doi | 10.1002/pra2.415 | |
dc.identifier.source | Proceedings of the Association for Information Science and Technology | |
dc.identifier.citedreference | Data Security Guidelines. ( 2020 ). Retrieved from: https://research-compliance.umich.edu/data-security-guidelines | |
dc.identifier.citedreference | CESSDA Training Team. ( 2020 ). CESSDA Data Management Expert Guide. Bergen, Norway: CESSDA ERIC. | |
dc.identifier.citedreference | Kirilova, D., & Karcher, S. ( 2017 ). Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm. Data Science Journal, 16 ( 43 ), 1 – 7. https://doi.org/10.5334/dsj-2017-043 | |
dc.identifier.citedreference | Guide to Social Science Data Preparation and Archiving: Best Practice Throughout the Data Life Cycle 6th ed. (n.d.). Retrieved from: https://www.icpsr.umich.edu/files/deposit/dataprep.pdf | |
dc.identifier.citedreference | De‐Identification. (n.d.). Retrieved from: https://qdr.syr.edu/guidance/human-participants/deidentification | |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.