As the body of social science research data grows, so does interest in obtaining data for replication and secondary analysis purposes. Research data involving individuals tend to be highly disclosive and often sensitive. Traditional methods of coarsening, truncating, or otherwise altering the data for public consumption limits both the utility of the study and the impact of the initial investment. There is growing interest in establishing innovative ways of sharing research data in its fullest form while minimizing disclosure risk and honoring confidentiality assurances given to research subjects. ICPSR employs three main methods of restricted data dissemination, and this poster will highlight these methods and demonstrate the features of t...
The volume of restricted use data files distributed by data archives and data producers has increas...
ICPSR performs a valuable service to the research community by taking in research data and making th...
This poster introduces two projects exploring the concept of a secure virtual research environment a...
A challenge of managing access to restricted-use data is to ensure adequate protections and at the s...
As researchers consider making their data available to others, they are concerned with the responsib...
Restricted-use data is available at ICPSR through highly secure, highly controlled data access mecha...
As researchers consider making their data available to others, they are concerned with the responsib...
nbsp;Federal data sharing requirements increase public access to federally-funded scientific data....
Some content from the presentation was presented with George Alter at the 8th International Digital ...
There exists a growing desire, and growing requirements for scientific research data collected by f...
Presented as part of Session on The Conflict Between Research Transparency and Respondent Confidenti...
Researchers collect data from both individuals and organizations under pledges of confidentiality. T...
Research data often have special security requirements. This presentation will show a framework for ...
Restricted Data Use Agreement, revised in 2018, used to govern researcher access to restricted data ...
The Researcher Passport: Improving Data Access and Confidentiality Protection ICPSR’s Strategy for ...
The volume of restricted use data files distributed by data archives and data producers has increas...
ICPSR performs a valuable service to the research community by taking in research data and making th...
This poster introduces two projects exploring the concept of a secure virtual research environment a...
A challenge of managing access to restricted-use data is to ensure adequate protections and at the s...
As researchers consider making their data available to others, they are concerned with the responsib...
Restricted-use data is available at ICPSR through highly secure, highly controlled data access mecha...
As researchers consider making their data available to others, they are concerned with the responsib...
nbsp;Federal data sharing requirements increase public access to federally-funded scientific data....
Some content from the presentation was presented with George Alter at the 8th International Digital ...
There exists a growing desire, and growing requirements for scientific research data collected by f...
Presented as part of Session on The Conflict Between Research Transparency and Respondent Confidenti...
Researchers collect data from both individuals and organizations under pledges of confidentiality. T...
Research data often have special security requirements. This presentation will show a framework for ...
Restricted Data Use Agreement, revised in 2018, used to govern researcher access to restricted data ...
The Researcher Passport: Improving Data Access and Confidentiality Protection ICPSR’s Strategy for ...
The volume of restricted use data files distributed by data archives and data producers has increas...
ICPSR performs a valuable service to the research community by taking in research data and making th...
This poster introduces two projects exploring the concept of a secure virtual research environment a...