Show simple item record

Protecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing

dc.contributor.authorMyers, Claire A.
dc.contributor.authorLong, Shelby E.
dc.contributor.authorPolasek, Faye O.
dc.date.accessioned2020-11-04T15:58:44Z
dc.date.availableWITHHELD_12_MONTHS
dc.date.available2020-11-04T15:58:44Z
dc.date.issued2020-10
dc.identifier.citationMyers, Claire A.; Long, Shelby E.; Polasek, Faye O. (2020). "Protecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing." Proceedings of the Association for Information Science and Technology 57(1): n/a-n/a.
dc.identifier.issn2373-9231
dc.identifier.issn2373-9231
dc.identifier.urihttps://hdl.handle.net/2027.42/163391
dc.description.abstractThe Library Assessment for Research and Scholarship Lab investigates qualitative research support across disciplines. In 2018–2019, the lab conducted 29 interviews with faculty, librarians, and doctoral students who engaged in qualitative research to understand their needs during the research lifecycle. At the conclusion of this project, the qualitative data will be deposited in a repository where it can be made available for future secondary use. The deposited data will include de‐identified versions of the complete interview transcripts. This poster supplements existing de‐identification standards, details drafting and revising protocol for de‐identification of our data, and discusses the de‐identification process we used for the qualitative data. Existing de‐identification literature and standards are limited and not widely uniform in qualitative research. In developing de‐identification protocol, our lab recognized several potential challenges in the process and created procedures to ensure future data usability. There is inherent tension between keeping privacy intact and sharing undistorted qualitative data. We aim to address some of the hazards with de‐identification best practices, demonstrating methodology for producing high quality de‐identified qualitative data. In offering up a test case with suggested methods to better protect participants’ identities, this work will lend itself to sustainable qualitative data sharing and reuse.
dc.publisherJohn Wiley & Sons, Inc.
dc.subject.otherdata sharing
dc.subject.otherqualitative research
dc.subject.otherdata de‐identification
dc.titleProtecting participant privacy while maintaining content and context: Challenges in qualitative data De‐identification and sharing
dc.typeArticle
dc.rights.robotsIndexNoFollow
dc.subject.hlbsecondlevelInformation Science
dc.subject.hlbtoplevelSocial Sciences
dc.description.peerreviewedPeer Reviewed
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/163391/2/pra2415_am.pdfen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/163391/1/pra2415.pdfen_US
dc.identifier.doi10.1002/pra2.415
dc.identifier.sourceProceedings of the Association for Information Science and Technology
dc.identifier.citedreferenceData Security Guidelines. ( 2020 ). Retrieved from: https://research-compliance.umich.edu/data-security-guidelines
dc.identifier.citedreferenceCESSDA Training Team. ( 2020 ). CESSDA Data Management Expert Guide. Bergen, Norway: CESSDA ERIC.
dc.identifier.citedreferenceKirilova, D., & Karcher, S. ( 2017 ). Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm. Data Science Journal, 16 ( 43 ), 1 – 7. https://doi.org/10.5334/dsj-2017-043
dc.identifier.citedreferenceGuide to Social Science Data Preparation and Archiving: Best Practice Throughout the Data Life Cycle 6th ed. (n.d.). Retrieved from: https://www.icpsr.umich.edu/files/deposit/dataprep.pdf
dc.identifier.citedreferenceDe‐Identification. (n.d.). Retrieved from: https://qdr.syr.edu/guidance/human-participants/deidentification
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.