Already a member?

Sign In

Achieving real data security via community self-enforcement

Presenter 1
Richard Welpton
UK Data Archive
Presenter 2
Katharina Kinder-Kurlanda
GESIS - Leibniz - Institute for Social Science

Providers of sensitive/confidential data typically rely on IT-based measures to control the security of their data. Examples include swipe-card access to “controlled” rooms, with CCTV monitoring, sign-in procedures etc. When providing access to research data such a focus on security reinforces the message that researchers are a security problem. We argue that these measures not only are costly and increase barriers to sensible research, but also create the wrong incentives for researchers, who are seen as a threat to rather than collaborators in creating and maintaining secure. We argue that fostering a community of trusted researchers is the most effective way of achieving security. With the right incentives in place, researchers, when considering themselves as part of a community, will reinforce standards upon each other, lest their entire community is denied access to data. In addition, cumbersome or hard to comprehend measures are more likely to result in security breaches as researchers make mistakes or deliberately flout rules for the sake of convenience. We will explain how to build trusted communities of researchers around the secure data services of both the UKDS and GESIS – Leibniz Institute for the Social Sciences and how these fit with providers’ and researchers’ interests in secure and accessible data.

Presentation File: 
  • IASSIST Quarterly

    Publications Special issue: A pioneer data librarian
    Welcome to the special volume of the IASSIST Quarterly (IQ (37):1-4, 2013). This special issue started as exchange of ideas between Libbie Stephenson and Margaret Adams to collect

    more...

  • Resources

    Resources

    A space for IASSIST members to share professional resources useful to them in their daily work. Also the IASSIST Jobs Repository for an archive of data-related position descriptions. more...

  • community

    • LinkedIn
    • Facebook
    • Twitter

    Find out what IASSISTers are doing in the field and explore other avenues of presentation, communication and discussion via social networking and related online social spaces. more...