SIRI thinks "Data" is a woman called "Sara"😎

Regards | Saludos,

Andrés Leopoldo Pacheco Sanfuentes
<a...@acm.org>

> On Mar 21, 2016, at 3:44 PM, Andrés Pacheco <alps6...@gmail.com> wrote:
> 
> I think it would greatly benefit people involved as data sources in any kind 
> of research or other data-driven pursuits to have the certainty that their 
> information is completely anonymized, "sanitized!"
> 
> One cannot rely on the good will of researchers or other Dara professionals. 
> Given the prevalence of surveys and other data-driven activities today, it's 
> almost like we need HIPPA for BIG SARA!😈👿
> 
> Regards | Saludos,
> 
> Andrés Leopoldo Pacheco Sanfuentes
> <a...@acm.org>
> 
>> On Mar 21, 2016, at 1:46 PM, Oltmann, Shannon M <shannon.oltm...@uky.edu> 
>> wrote:
>> 
>> Good questions for discussion! First, I believe the overwhelming majority of 
>> qualitative social science research that is conducted is of little to no 
>> interest to the FBI--in particular, the FBI may be interested in the results 
>> from the occasional social science research project, but rarely would they 
>> be interested enough to want access to the original data (such as audio 
>> files or transcripts), rather than the summaries provided in, say, an 
>> academic article. Second, I and most researchers that I know of, take 
>> precautions to make original data much less useful to potential law 
>> enforcement interest. For example, I explicitly de-link audio files from the 
>> names of those I interview, creating a stand-alone audio file that is 
>> impossible to link to an individual. The audio files get encrypted and 
>> assigned a code name, then later a pseudonym. In addition, people can give 
>> me a pseudonym before the interview, so that their real name is not even in 
>> my email files. Third, I'm willing to defy an o
>> rder from the FBI to turn over files--and I think many researchers would do 
>> similarly. 
>> 
>> At the same time, I'm well aware that this is an imperfect approach and 
>> outlook. I'm very interested in hearing from others, especially if anyone 
>> has a different (perhaps more systematic?) approach. In the minds of other 
>> readers, are there additional steps I can/should take? Thanks in advance for 
>> any input. 
>> 
>> 
>> -Shannon Oltmann
>> 
>> 
>> 
>> 
>> Dr. Shannon M. Oltmann
>> Assistant Professor
>> School of Information Science
>> College of Communication & Information
>> University of Kentucky
>> shannon.oltm...@uky.edu
>> 320 Lucille Little Library 
>> Lexington KY 40506
>> 859-257-0788
>> 859-257-4205 (fax)
>> 
>> -----Original Message-----
>> From: Joseph Lorenzo Hall [mailto:j...@cdt.org] 
>> Sent: Monday, March 21, 2016 10:02 AM
>> To: liberationtech
>> Cc: Oltmann, Shannon M
>> Subject: Re: [liberationtech] Research project on privacy and encryption
>> 
>> Hi,
>> 
>> Having done (and hoping to do more!) qualitative interview research in the 
>> past, I wonder if researchers like Prof. Oltmann are concerned about the FBI 
>> recently subpoenaing research data sets for investigations/prosecutions. 
>> While there may not be much of interest to the FBI in any given study such 
>> as this, I'm wondering if researchers are starting to factor in the FBI into 
>> their data collection and analysis protocols. For medical studies funded by 
>> NIH, there are Certificates of Confidentiality ( 
>> https://grants.nih.gov/grants/policy/coc/index.htm ) that can prevent 
>> subpoenaing of data, but I know non-medical research cannot obtain those 
>> kinds of protections.
>> 
>> Anyway, not that anything in this particular study prompted this, just a 
>> slew of growing concerns from me and wondering if anyone on libtech has 
>> heard of more coordinated, coherent approaches to doing research with data 
>> that may be subject to subpoena.
>> 
>> best, Joe
>> 
>>> On Sun, Mar 20, 2016 at 1:51 PM, Yosem Companys <compa...@stanford.edu> 
>>> wrote:
>>> From: Shannon M Oltmann <shannon.oltm...@uky.edu>
>>> 
>>> Hello! I am conducting a new research project, interviewing people who 
>>> use encryption for personal (non-work related) use. Please read more 
>>> about the project below and contact me if interested in participating. 
>>> Thanks for your time.
>>> 
>>> You are invited to take part in a research study about the use of 
>>> encryption for hard drives and/or email.
>>> 
>>> The purpose of this study is to find out more about reasons people use 
>>> encryption and to better understand all perspectives. Although you 
>>> will not get personal benefit from taking part in this research study, 
>>> your responses may help us understand more about why people use 
>>> encryption and about different perspectives.
>>> 
>>> I would like to interview you about your perspective.
>>> 
>>> I hope to complete approximately 50 interviews, so your answers are 
>>> important to me. Of course, you have a choice about whether or not to 
>>> complete the interview, but if you do participate, you are free to 
>>> skip any questions or discontinue at any time.
>>> 
>>> The interview will last 30-45 minutes. It will be performed over the 
>>> telephone unless you request another format. With your permission, the 
>>> interview will be audio recorded and later transcribed for analysis. 
>>> Both the audio and the transcription will be stored in a locked filing 
>>> cabinet or on an encrypted drive. There are no known risks beyond what 
>>> is experienced in everyday life to participating in this study. Your 
>>> response to the survey will be kept confidential to the extent allowed 
>>> by law. When I write about the study you will not be identified.
>>> 
>>> Before you decide whether to accept this invitation to take part in 
>>> the study, please ask any questions that might come to mind now. If 
>>> you have questions about the study, please feel free to ask; my 
>>> contact information is given below.
>>> 
>>> Thank you in advance for your assistance with this important project.
>>> 
>>> Dr. Shannon M. Oltmann
>>> Assistant Professor
>>> School of Information Science
>>> University of Kentucky
>>> shannon.oltm...@uky.edu
>>> 
>>> 
>>> --
>>> Liberationtech is public & archives are searchable on Google. 
>>> Violations of list guidelines will get you moderated:
>>> https://mailman.stanford.edu/mailman/listinfo/liberationtech. 
>>> Unsubscribe, change to digest, or change password by emailing 
>>> moderator at compa...@stanford.edu.
>> 
>> 
>> 
>> --
>> Joseph Lorenzo Hall
>> Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
>> e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
>> Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
>> 
>> CDT's annual dinner, Tech Prom, is April 6, 2016! 
>> https://cdt.org/annual-dinner
>> -- 
>> Liberationtech is public & archives are searchable on Google. Violations of 
>> list guidelines will get you moderated: 
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
>> change to digest, or change password by emailing moderator at 
>> compa...@stanford.edu.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to