This is a set of interview transcripts executed by Niccolò Tempini between September 2015 and October 2016, as part of the ERC project "The Epistemology of Data-Intensive Science", and in the context of a case study of SAIL. Please read the "Notes on transcript editing" document for further information. Two papers that specifically make use of these interviews have been published as of 2018: Tempini, N., Leonelli, S., 2018. Concealment and discovery: The role of information security in biomedical data re-use. Soc Stud Sci 48, 663–690. https://doi.org/10.1177/0306312718804875 Tempini, N., 2016. Science Through the “Golden Security Triangle”: Information Security and Data Journeys in Data-intensive Biomedicine, in: Proceedings of the 37th ...
BACKGROUND: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment suppo...
Interviews provide a valuable source of evidence, but are of-ten neglected or mistrusted because of ...
The dataset contains interviews from case study material on three open source software ecosystems: D...
This is a set of interview transcripts executed by Niccolò Tempini between September 2015 and Octobe...
This is a set of interview transcripts executed by Niccolò Tempini between March and October 2016, a...
This is a set of interview transcripts executed by Niccolò Tempini between May 2016 and July 2017, a...
Here you find the transcripts of interviews collected by Sabina Leonelli as part of the ERC project ...
These are eleven transcripts of the interviews conducted in the context of the study “Information Sc...
Here are two transcripts from a set of interviews executed by Sabina Leonelli in the fall of 2015 as...
This is a collection of transcripts from interviews conducted by Gregor Halfmann as part of the ERC ...
ABSTRACT Objectives Whilst the current expansion of health-related big data and data linkage rese...
This is the author accepted manuscript. The final version is available from SAGE Publications via th...
This paper analyses the role of information security (IS) in shaping the dissemination and re-use of...
37th International Conference on Information Systems, Dublin, Ireland, 11-14 December 2016This is th...
This entry relates to data collected as part of the DAiSIeS study to inform strategies to improve ca...
BACKGROUND: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment suppo...
Interviews provide a valuable source of evidence, but are of-ten neglected or mistrusted because of ...
The dataset contains interviews from case study material on three open source software ecosystems: D...
This is a set of interview transcripts executed by Niccolò Tempini between September 2015 and Octobe...
This is a set of interview transcripts executed by Niccolò Tempini between March and October 2016, a...
This is a set of interview transcripts executed by Niccolò Tempini between May 2016 and July 2017, a...
Here you find the transcripts of interviews collected by Sabina Leonelli as part of the ERC project ...
These are eleven transcripts of the interviews conducted in the context of the study “Information Sc...
Here are two transcripts from a set of interviews executed by Sabina Leonelli in the fall of 2015 as...
This is a collection of transcripts from interviews conducted by Gregor Halfmann as part of the ERC ...
ABSTRACT Objectives Whilst the current expansion of health-related big data and data linkage rese...
This is the author accepted manuscript. The final version is available from SAGE Publications via th...
This paper analyses the role of information security (IS) in shaping the dissemination and re-use of...
37th International Conference on Information Systems, Dublin, Ireland, 11-14 December 2016This is th...
This entry relates to data collected as part of the DAiSIeS study to inform strategies to improve ca...
BACKGROUND: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment suppo...
Interviews provide a valuable source of evidence, but are of-ten neglected or mistrusted because of ...
The dataset contains interviews from case study material on three open source software ecosystems: D...