SIRI thinks "Data" is a woman called "Sara"😎 Regards | Saludos,
Andrés Leopoldo Pacheco Sanfuentes <a...@acm.org> > On Mar 21, 2016, at 3:44 PM, Andrés Pacheco <alps6...@gmail.com> wrote: > > I think it would greatly benefit people involved as data sources in any kind > of research or other data-driven pursuits to have the certainty that their > information is completely anonymized, "sanitized!" > > One cannot rely on the good will of researchers or other Dara professionals. > Given the prevalence of surveys and other data-driven activities today, it's > almost like we need HIPPA for BIG SARA!😈👿 > > Regards | Saludos, > > Andrés Leopoldo Pacheco Sanfuentes > <a...@acm.org> > >> On Mar 21, 2016, at 1:46 PM, Oltmann, Shannon M <shannon.oltm...@uky.edu> >> wrote: >> >> Good questions for discussion! First, I believe the overwhelming majority of >> qualitative social science research that is conducted is of little to no >> interest to the FBI--in particular, the FBI may be interested in the results >> from the occasional social science research project, but rarely would they >> be interested enough to want access to the original data (such as audio >> files or transcripts), rather than the summaries provided in, say, an >> academic article. Second, I and most researchers that I know of, take >> precautions to make original data much less useful to potential law >> enforcement interest. For example, I explicitly de-link audio files from the >> names of those I interview, creating a stand-alone audio file that is >> impossible to link to an individual. The audio files get encrypted and >> assigned a code name, then later a pseudonym. In addition, people can give >> me a pseudonym before the interview, so that their real name is not even in >> my email files. Third, I'm willing to defy an o >> rder from the FBI to turn over files--and I think many researchers would do >> similarly. >> >> At the same time, I'm well aware that this is an imperfect approach and >> outlook. I'm very interested in hearing from others, especially if anyone >> has a different (perhaps more systematic?) approach. In the minds of other >> readers, are there additional steps I can/should take? Thanks in advance for >> any input. >> >> >> -Shannon Oltmann >> >> >> >> >> Dr. Shannon M. Oltmann >> Assistant Professor >> School of Information Science >> College of Communication & Information >> University of Kentucky >> shannon.oltm...@uky.edu >> 320 Lucille Little Library >> Lexington KY 40506 >> 859-257-0788 >> 859-257-4205 (fax) >> >> -----Original Message----- >> From: Joseph Lorenzo Hall [mailto:j...@cdt.org] >> Sent: Monday, March 21, 2016 10:02 AM >> To: liberationtech >> Cc: Oltmann, Shannon M >> Subject: Re: [liberationtech] Research project on privacy and encryption >> >> Hi, >> >> Having done (and hoping to do more!) qualitative interview research in the >> past, I wonder if researchers like Prof. Oltmann are concerned about the FBI >> recently subpoenaing research data sets for investigations/prosecutions. >> While there may not be much of interest to the FBI in any given study such >> as this, I'm wondering if researchers are starting to factor in the FBI into >> their data collection and analysis protocols. For medical studies funded by >> NIH, there are Certificates of Confidentiality ( >> https://grants.nih.gov/grants/policy/coc/index.htm ) that can prevent >> subpoenaing of data, but I know non-medical research cannot obtain those >> kinds of protections. >> >> Anyway, not that anything in this particular study prompted this, just a >> slew of growing concerns from me and wondering if anyone on libtech has >> heard of more coordinated, coherent approaches to doing research with data >> that may be subject to subpoena. >> >> best, Joe >> >>> On Sun, Mar 20, 2016 at 1:51 PM, Yosem Companys <compa...@stanford.edu> >>> wrote: >>> From: Shannon M Oltmann <shannon.oltm...@uky.edu> >>> >>> Hello! I am conducting a new research project, interviewing people who >>> use encryption for personal (non-work related) use. Please read more >>> about the project below and contact me if interested in participating. >>> Thanks for your time. >>> >>> You are invited to take part in a research study about the use of >>> encryption for hard drives and/or email. >>> >>> The purpose of this study is to find out more about reasons people use >>> encryption and to better understand all perspectives. Although you >>> will not get personal benefit from taking part in this research study, >>> your responses may help us understand more about why people use >>> encryption and about different perspectives. >>> >>> I would like to interview you about your perspective. >>> >>> I hope to complete approximately 50 interviews, so your answers are >>> important to me. Of course, you have a choice about whether or not to >>> complete the interview, but if you do participate, you are free to >>> skip any questions or discontinue at any time. >>> >>> The interview will last 30-45 minutes. It will be performed over the >>> telephone unless you request another format. With your permission, the >>> interview will be audio recorded and later transcribed for analysis. >>> Both the audio and the transcription will be stored in a locked filing >>> cabinet or on an encrypted drive. There are no known risks beyond what >>> is experienced in everyday life to participating in this study. Your >>> response to the survey will be kept confidential to the extent allowed >>> by law. When I write about the study you will not be identified. >>> >>> Before you decide whether to accept this invitation to take part in >>> the study, please ask any questions that might come to mind now. If >>> you have questions about the study, please feel free to ask; my >>> contact information is given below. >>> >>> Thank you in advance for your assistance with this important project. >>> >>> Dr. Shannon M. Oltmann >>> Assistant Professor >>> School of Information Science >>> University of Kentucky >>> shannon.oltm...@uky.edu >>> >>> >>> -- >>> Liberationtech is public & archives are searchable on Google. >>> Violations of list guidelines will get you moderated: >>> https://mailman.stanford.edu/mailman/listinfo/liberationtech. >>> Unsubscribe, change to digest, or change password by emailing >>> moderator at compa...@stanford.edu. >> >> >> >> -- >> Joseph Lorenzo Hall >> Chief Technologist, Center for Democracy & Technology [https://www.cdt.org] >> e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key >> Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10 1607 5F86 6987 40A9 A871 >> >> CDT's annual dinner, Tech Prom, is April 6, 2016! >> https://cdt.org/annual-dinner >> -- >> Liberationtech is public & archives are searchable on Google. Violations of >> list guidelines will get you moderated: >> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, >> change to digest, or change password by emailing moderator at >> compa...@stanford.edu. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.