SlideShare a Scribd company logo
1 of 14
OPEN DATA AND PRIVACY IN THE HUMANITIES 
(AND ARTS AND SOCIAL SCIENCES) 
Helen Cullyer, Program Officer 
Scholarly Communications 
The Andrew W. Mellon Foundation
OPEN DATA 
Available for universal reuse and redistribution (though 
some open licenses do prevent commercial use) 
Promotes transparency, reproducibility; advances research; 
and makes results of scholarly inquiry available to the 
public, policymakers in addition to other scholars
DATA IN THE HUMANITIES, ARTS, AND 
HUMANISTIC SOCIAL SCIENCES 
Digitized and born-digital primary source collections (text, 
image, multimedia) and their associated metadata 
Transcriptions and annotations 
Survey or other data collected by researchers 
Data that results from computational analysis of digital 
collections and raw datasets
OPEN KNOWLEDGE FOUNDATION 
ON OPEN DATA AND PRIVACY: 
Our Data is data with no personal element, and a clear sense of shared ownership. 
Some examples would be where the buses run in my city, what the government decides 
decides to spend my tax money on, how the national census is structured and the 
the aggregate data resulting from it. At the Open Knowledge Foundation, our default 
default position is that our data should be open data – it is a shared asset we can and 
can and should all benefit from. 
My Data is information about me personally, where I am identified in some way, regardless of who 
collects it. It should not be made open or public by others without my direct permission – but it 
should be “open” to me (I should have access to data about me in a useable form, and the right 
to share it myself, however I wish if I choose to do so). 
Transformed Data is information about individuals, where some effort has been made to 
anonymise or aggregate the data to remove individually identified elements. 
http://personal-data.okfn.org/2013/12/13/open-data-privacy/
IS THERE REALLY A PROBLEM? 
Can’t you just anonymize and aggregate data 
and make those data openly accessible? 
• Anonymized data are not necessarily de-identified 
data 
• Aggregated data are not always granular 
enough in the humanities and humanistic social 
sciences
SOME QUESTIONS 
• What types of transformations can be used to de-identify but retain 
the granularity and usefulness of data so that they can be made 
open? 
• Does the push for open data distract us from the need to craft 
careful and multi-level access policies for certain data types? 
• Is there a danger that in trying to make general rules and policies, 
we will ignore the differences among particular cases and: either 
(a) develop requirements that are too lax and endanger privacy; or 
(b) place unnecessary restrictions on data that could and should be 
open?
EXAMPLE #1: 
RECORDS OF THE CENTRAL LUNATIC ASYLUM FOR THE COLORED INSANE 
(King Davis, University of Texas at Austin) 
• Digitized organizational and medical records dating from 1868 through 
1967 
• Of interest to scholars in a number of fields (history, history of science and 
medicine, African American Studies) and to the families of former patients 
• Privacy challenges: HIPAA regulations; state law; IRB regulations; and a 
host of ethical concerns 
• What sort of access to different types of data will be given to different 
groups? How will access mechanisms for digital data be implemented?
EXAMPLE #2: 
SUBSCRIBERS TO THE NEW YORK PHILHARMONIC 
(Shamus Khan, Columbia; and Barbara Haws, NY Philharmonic) 
• Digitized and born-digital subscriber records (1842 to the present) that 
contain names and addresses 
• Columbia researchers transcribing records and augmenting them with 
other publicly available data (egs. census data, information from New 
York Social Register) 
• All names post-1953 are redacted in Columbia data 
• What to share openly, and how, of the post-1953 data? 
• NY Phil working on privacy and access policies for post-1953 archival 
records that they hold
EXAMPLE #3: 
EXCAVATING EPORTFOLIOS: 
DIGGING INTO A DECADE OF STUDENT-DRIVEN DATA 
Amanda Licastro, CUNY Graduate Center, @amandalicastro 
http://digitocentrism.commons.gc.cuny.edu/ 
• Data includes large sample of student writing (from publicly available 
WordPress eportfolio sites); anonymous survey responses; interviews 
• All private sites and private posts stripped out of eportfolios. No grading 
information or other official student records included within data 
• Results of computational analysis will be published 
• Raw data must be encrypted according to IRB requirements
SOME NEEDS: 
• Technical help and mentorship regarding data management 
• “…examples of data management plans and workflow 
sequences for large data projects that could serve as instructive 
models for humanists like myself. And this work would be done 
best in a collaborative maker space where scholars from across 
the disciplines could have designated sessions where we could 
trouble-shoot together.” 
Amanda Licastro
ARE IRB REQUIREMENTS TOO STRICT IN MANY CASES? 
See summary of recent National Academies report: 
“To first determine if research activities fall within the scope of the Common Rule, the report 
recommends that HHS define “human subjects research” as a systematic investigation designed 
to develop or contribute to generalizable knowledge that involves direct interaction or 
intervention with a living individual or that involves obtaining identifiable private information 
about an individual. Only research that fits this definition should be subject to IRB procedures 
and the Common Rule. 
Building on this definition, HHS should also clarify that research which relies on publicly available 
information, information in the public domain, or information that can be observed in public 
contexts does not meet the definition of human subjects research -- regardless of whether the 
information is personally identifiable -- as long as individuals whose information is used have no 
reasonable expectation of privacy. This includes digital data, some types of administrative 
records, and public-use data files...” 
http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=1 
8614
THE COMPLICATED HUMAN SUBJECTS PICTURE 
• Does the research involve personally identifiable data? Is the 
source data publicly available anyway? 
• Would the research involve presentation of data (digital or 
otherwise) to human subjects with the intention of deceiving or 
manipulating those subjects? 
• What is the potential for harm in the research itself and 
dissemination of data? 
For an excellent account of the current contested landscape, see Christopher Shea, 
“New Rules for Human-Subject Research are Delayed and Debated”, 
http://chronicle.com/article/New-Rules-for-Human- 
Subject/149767/?cid=wc&utm_source=wc&utm_medium=en
PRELIMINARY CONCLUSIONS 
• The dichotomy between open / non-open is, in many cases, a false one. 
There are plenty of data types and versions of data that cannot be made 
fully open yet can be shared with a limited group of individuals in carefully 
controlled ways 
• We need to be worried about privacy regulations and policies that are 
too stringent as well as those that are too lax 
• What is a “reasonable expectation of privacy” in a networked 
environment? 
• Need to generate robust regulations and policies, at a high level of 
generality, that both protect privacy and allow for collaborative and 
thoughtful discussion about what is appropriate in particular cases
FINAL THOUGHTS 
Utilitarian approach: Quantify the risk of harm 
Deontological (Kantian) approach: “Always do X”, “Never do Y” 
Aristotelian particularist approach: The standard of judgment is the reasonable 
person 
But how do we generate the “robust regulations and policies, at a high 
level of generality…” within which reasonable persons act? At what 
level of generality should those laws and policies function? 
A rich typology of research projects that involve personal, identifiable 
data is needed

More Related Content

What's hot

Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
Introduction What Is Information
Introduction   What Is InformationIntroduction   What Is Information
Introduction What Is Informationguestab667e
 
Information Seeking Behavior
Information Seeking Behavior Information Seeking Behavior
Information Seeking Behavior Dheeraj Negi
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseekingkcarter14
 
Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models2548233
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Modelsguestab667e
 
Information seeking behavior
Information seeking behaviorInformation seeking behavior
Information seeking behaviorPunjab University
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacyMicah Altman
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Share: Science Information Life Cycle
Share: Science Information Life CycleShare: Science Information Life Cycle
Share: Science Information Life Cyclekauberry
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...Ansgar Koene
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Ansgar Koene
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchNele Heise
 

What's hot (20)

Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Introduction What Is Information
Introduction   What Is InformationIntroduction   What Is Information
Introduction What Is Information
 
Information Seeking Behavior
Information Seeking Behavior Information Seeking Behavior
Information Seeking Behavior
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Internet Research Ethics and IRBs
Internet Research Ethics and IRBsInternet Research Ethics and IRBs
Internet Research Ethics and IRBs
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseeking
 
Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models
 
Niso library law
Niso library lawNiso library law
Niso library law
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Models
 
Information seeking behavior
Information seeking behaviorInformation seeking behavior
Information seeking behavior
 
Information seeking process
Information seeking processInformation seeking process
Information seeking process
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Share: Science Information Life Cycle
Share: Science Information Life CycleShare: Science Information Life Cycle
Share: Science Information Life Cycle
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online Research
 

Viewers also liked

Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...
Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...
Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...Charleston Conference
 
Collection development policies for the 21st century academic library
Collection development policies for the 21st century academic libraryCollection development policies for the 21st century academic library
Collection development policies for the 21st century academic libraryCharleston Conference
 
Webscale Discovery and Information Literacy
Webscale Discovery and Information LiteracyWebscale Discovery and Information Literacy
Webscale Discovery and Information LiteracyCharleston Conference
 
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-Resources
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-ResourcesFrom Spreadsheets to SUSHI: Five Years of Assessing Use of E-Resources
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-ResourcesCharleston Conference
 
Library of Congress Recommended Format Specifications (Donna Scanlon)
Library of Congress Recommended Format Specifications (Donna Scanlon)Library of Congress Recommended Format Specifications (Donna Scanlon)
Library of Congress Recommended Format Specifications (Donna Scanlon)Charleston Conference
 
Changing Library Operations (Allen McKiel)
Changing Library Operations (Allen McKiel)Changing Library Operations (Allen McKiel)
Changing Library Operations (Allen McKiel)Charleston Conference
 
Swets: What Is Going On In Our Industry?
Swets: What Is Going On In Our Industry?Swets: What Is Going On In Our Industry?
Swets: What Is Going On In Our Industry?Charleston Conference
 
Measuring Research Impact on the Web
Measuring Research Impact on the WebMeasuring Research Impact on the Web
Measuring Research Impact on the WebCharleston Conference
 
A Decade of Discovery: What We Know and Where We Will Go
A Decade of Discovery: What We Know and Where We Will GoA Decade of Discovery: What We Know and Where We Will Go
A Decade of Discovery: What We Know and Where We Will GoCharleston Conference
 
What Faculty Want Librarians to Know Richerme
What Faculty Want Librarians to Know RichermeWhat Faculty Want Librarians to Know Richerme
What Faculty Want Librarians to Know RichermeCharleston Conference
 
The Punishment for Dreamers - Adam Murray
The Punishment for Dreamers - Adam MurrayThe Punishment for Dreamers - Adam Murray
The Punishment for Dreamers - Adam MurrayCharleston Conference
 
Deploying Mendeley to Support Research Collaboration
Deploying Mendeley to Support Research CollaborationDeploying Mendeley to Support Research Collaboration
Deploying Mendeley to Support Research CollaborationCharleston Conference
 
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...Charleston Conference
 
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)Charleston Conference
 
Marketing opérationnel
Marketing opérationnel Marketing opérationnel
Marketing opérationnel raouia mira
 

Viewers also liked (17)

Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...
Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...
Triangle Research Libraries Network Oxford University Press Pilot: An Evolvin...
 
Collection development policies for the 21st century academic library
Collection development policies for the 21st century academic libraryCollection development policies for the 21st century academic library
Collection development policies for the 21st century academic library
 
Webscale Discovery and Information Literacy
Webscale Discovery and Information LiteracyWebscale Discovery and Information Literacy
Webscale Discovery and Information Literacy
 
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-Resources
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-ResourcesFrom Spreadsheets to SUSHI: Five Years of Assessing Use of E-Resources
From Spreadsheets to SUSHI: Five Years of Assessing Use of E-Resources
 
Library of Congress Recommended Format Specifications (Donna Scanlon)
Library of Congress Recommended Format Specifications (Donna Scanlon)Library of Congress Recommended Format Specifications (Donna Scanlon)
Library of Congress Recommended Format Specifications (Donna Scanlon)
 
Changing Library Operations (Allen McKiel)
Changing Library Operations (Allen McKiel)Changing Library Operations (Allen McKiel)
Changing Library Operations (Allen McKiel)
 
Founder Stories
Founder StoriesFounder Stories
Founder Stories
 
Swets: What Is Going On In Our Industry?
Swets: What Is Going On In Our Industry?Swets: What Is Going On In Our Industry?
Swets: What Is Going On In Our Industry?
 
Measuring Research Impact on the Web
Measuring Research Impact on the WebMeasuring Research Impact on the Web
Measuring Research Impact on the Web
 
A Decade of Discovery: What We Know and Where We Will Go
A Decade of Discovery: What We Know and Where We Will GoA Decade of Discovery: What We Know and Where We Will Go
A Decade of Discovery: What We Know and Where We Will Go
 
Taming the Wilde
Taming the WildeTaming the Wilde
Taming the Wilde
 
What Faculty Want Librarians to Know Richerme
What Faculty Want Librarians to Know RichermeWhat Faculty Want Librarians to Know Richerme
What Faculty Want Librarians to Know Richerme
 
The Punishment for Dreamers - Adam Murray
The Punishment for Dreamers - Adam MurrayThe Punishment for Dreamers - Adam Murray
The Punishment for Dreamers - Adam Murray
 
Deploying Mendeley to Support Research Collaboration
Deploying Mendeley to Support Research CollaborationDeploying Mendeley to Support Research Collaboration
Deploying Mendeley to Support Research Collaboration
 
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...
Scholarly eBooks in the Humanities and Social Sciences: Longitudinal Assessme...
 
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)
To Boldly Go Beyond Downloads (Carol Tenopir and Gabriel Hughes)
 
Marketing opérationnel
Marketing opérationnel Marketing opérationnel
Marketing opérationnel
 

Similar to Privacy in the Digital Age, Helen Cullyer

Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumUniversity of Southern California
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialKa_Kinder
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfAsefaAdimasu2
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Citizen Science - What's policy got to do with it?
Citizen Science - What's policy got to do with it?Citizen Science - What's policy got to do with it?
Citizen Science - What's policy got to do with it?Lea Shanley
 
Ethics, Openness & the Future of Education
Ethics, Openness & the Future of EducationEthics, Openness & the Future of Education
Ethics, Openness & the Future of EducationOER Hub
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningRobert Farrow
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commonsprofessormadison
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)MiguelRosario24
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open ScienceMark Parsons
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslideskcarter14
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG: connecting the knowledge community
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 

Similar to Privacy in the Digital Age, Helen Cullyer (20)

Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Citizen Science - What's policy got to do with it?
Citizen Science - What's policy got to do with it?Citizen Science - What's policy got to do with it?
Citizen Science - What's policy got to do with it?
 
Ethics, Openness & the Future of Education
Ethics, Openness & the Future of EducationEthics, Openness & the Future of Education
Ethics, Openness & the Future of Education
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of Learning
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open Science
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open Science
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslides
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 

Recently uploaded

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 

Recently uploaded (20)

INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 

Privacy in the Digital Age, Helen Cullyer

  • 1. OPEN DATA AND PRIVACY IN THE HUMANITIES (AND ARTS AND SOCIAL SCIENCES) Helen Cullyer, Program Officer Scholarly Communications The Andrew W. Mellon Foundation
  • 2. OPEN DATA Available for universal reuse and redistribution (though some open licenses do prevent commercial use) Promotes transparency, reproducibility; advances research; and makes results of scholarly inquiry available to the public, policymakers in addition to other scholars
  • 3. DATA IN THE HUMANITIES, ARTS, AND HUMANISTIC SOCIAL SCIENCES Digitized and born-digital primary source collections (text, image, multimedia) and their associated metadata Transcriptions and annotations Survey or other data collected by researchers Data that results from computational analysis of digital collections and raw datasets
  • 4. OPEN KNOWLEDGE FOUNDATION ON OPEN DATA AND PRIVACY: Our Data is data with no personal element, and a clear sense of shared ownership. Some examples would be where the buses run in my city, what the government decides decides to spend my tax money on, how the national census is structured and the the aggregate data resulting from it. At the Open Knowledge Foundation, our default default position is that our data should be open data – it is a shared asset we can and can and should all benefit from. My Data is information about me personally, where I am identified in some way, regardless of who collects it. It should not be made open or public by others without my direct permission – but it should be “open” to me (I should have access to data about me in a useable form, and the right to share it myself, however I wish if I choose to do so). Transformed Data is information about individuals, where some effort has been made to anonymise or aggregate the data to remove individually identified elements. http://personal-data.okfn.org/2013/12/13/open-data-privacy/
  • 5. IS THERE REALLY A PROBLEM? Can’t you just anonymize and aggregate data and make those data openly accessible? • Anonymized data are not necessarily de-identified data • Aggregated data are not always granular enough in the humanities and humanistic social sciences
  • 6. SOME QUESTIONS • What types of transformations can be used to de-identify but retain the granularity and usefulness of data so that they can be made open? • Does the push for open data distract us from the need to craft careful and multi-level access policies for certain data types? • Is there a danger that in trying to make general rules and policies, we will ignore the differences among particular cases and: either (a) develop requirements that are too lax and endanger privacy; or (b) place unnecessary restrictions on data that could and should be open?
  • 7. EXAMPLE #1: RECORDS OF THE CENTRAL LUNATIC ASYLUM FOR THE COLORED INSANE (King Davis, University of Texas at Austin) • Digitized organizational and medical records dating from 1868 through 1967 • Of interest to scholars in a number of fields (history, history of science and medicine, African American Studies) and to the families of former patients • Privacy challenges: HIPAA regulations; state law; IRB regulations; and a host of ethical concerns • What sort of access to different types of data will be given to different groups? How will access mechanisms for digital data be implemented?
  • 8. EXAMPLE #2: SUBSCRIBERS TO THE NEW YORK PHILHARMONIC (Shamus Khan, Columbia; and Barbara Haws, NY Philharmonic) • Digitized and born-digital subscriber records (1842 to the present) that contain names and addresses • Columbia researchers transcribing records and augmenting them with other publicly available data (egs. census data, information from New York Social Register) • All names post-1953 are redacted in Columbia data • What to share openly, and how, of the post-1953 data? • NY Phil working on privacy and access policies for post-1953 archival records that they hold
  • 9. EXAMPLE #3: EXCAVATING EPORTFOLIOS: DIGGING INTO A DECADE OF STUDENT-DRIVEN DATA Amanda Licastro, CUNY Graduate Center, @amandalicastro http://digitocentrism.commons.gc.cuny.edu/ • Data includes large sample of student writing (from publicly available WordPress eportfolio sites); anonymous survey responses; interviews • All private sites and private posts stripped out of eportfolios. No grading information or other official student records included within data • Results of computational analysis will be published • Raw data must be encrypted according to IRB requirements
  • 10. SOME NEEDS: • Technical help and mentorship regarding data management • “…examples of data management plans and workflow sequences for large data projects that could serve as instructive models for humanists like myself. And this work would be done best in a collaborative maker space where scholars from across the disciplines could have designated sessions where we could trouble-shoot together.” Amanda Licastro
  • 11. ARE IRB REQUIREMENTS TOO STRICT IN MANY CASES? See summary of recent National Academies report: “To first determine if research activities fall within the scope of the Common Rule, the report recommends that HHS define “human subjects research” as a systematic investigation designed to develop or contribute to generalizable knowledge that involves direct interaction or intervention with a living individual or that involves obtaining identifiable private information about an individual. Only research that fits this definition should be subject to IRB procedures and the Common Rule. Building on this definition, HHS should also clarify that research which relies on publicly available information, information in the public domain, or information that can be observed in public contexts does not meet the definition of human subjects research -- regardless of whether the information is personally identifiable -- as long as individuals whose information is used have no reasonable expectation of privacy. This includes digital data, some types of administrative records, and public-use data files...” http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=1 8614
  • 12. THE COMPLICATED HUMAN SUBJECTS PICTURE • Does the research involve personally identifiable data? Is the source data publicly available anyway? • Would the research involve presentation of data (digital or otherwise) to human subjects with the intention of deceiving or manipulating those subjects? • What is the potential for harm in the research itself and dissemination of data? For an excellent account of the current contested landscape, see Christopher Shea, “New Rules for Human-Subject Research are Delayed and Debated”, http://chronicle.com/article/New-Rules-for-Human- Subject/149767/?cid=wc&utm_source=wc&utm_medium=en
  • 13. PRELIMINARY CONCLUSIONS • The dichotomy between open / non-open is, in many cases, a false one. There are plenty of data types and versions of data that cannot be made fully open yet can be shared with a limited group of individuals in carefully controlled ways • We need to be worried about privacy regulations and policies that are too stringent as well as those that are too lax • What is a “reasonable expectation of privacy” in a networked environment? • Need to generate robust regulations and policies, at a high level of generality, that both protect privacy and allow for collaborative and thoughtful discussion about what is appropriate in particular cases
  • 14. FINAL THOUGHTS Utilitarian approach: Quantify the risk of harm Deontological (Kantian) approach: “Always do X”, “Never do Y” Aristotelian particularist approach: The standard of judgment is the reasonable person But how do we generate the “robust regulations and policies, at a high level of generality…” within which reasonable persons act? At what level of generality should those laws and policies function? A rich typology of research projects that involve personal, identifiable data is needed