Data provenance tracking and reporting in a high-security digital research environment.
Objective To protect privacy, routinely-collected data are processed and anonymised by third parties before being used for research. However, the methods used to do this are rarely shared, leaving the resulting research difficult to evaluate and liable to undetected errors. Here, we present a proven...
Main Authors: | Bernhard Scheliga, Milan Markovic, Helen Rowlands, Artur Wozniak, Katie Wilde, Jessica Butler |
---|---|
Format: | Article |
Language: | English |
Published: |
Swansea University
2022-08-01
|
Series: | International Journal of Population Data Science |
Subjects: | |
Online Access: | https://ijpds.org/article/view/1909 |
Similar Items
-
A Model To Capture Interaction Between Data Provenance And Workflow Provenance
by: Zeeshan Ahmed, et al.
Published: (2014-12-01) -
Geospatial Queries on Data Collection Using a Common Provenance Model
by: Guillem Closa, et al.
Published: (2021-03-01) -
Provenance Data Management in Health Information Systems: A Systematic Literature Review
by: Márcio José Sembay, et al.
Published: (2023-06-01) -
Securing Synchrophasors Using Data Provenance in the Quantum Era
by: Kashif Javed, et al.
Published: (2024-01-01) -
Lessons learned from the development of a national registry on dementia care and support based on linked national health and administrative data
by: Iris van derHeide, et al.
Published: (2024-04-01)