Starting from the End: What to do when Restricted Data is released

Repository managers can never be one hundred percent sure of the security of hosted research data. Even assuming that human errors and technical faults will never happen, repositories can be subject to hacking attacks. Therefore, repositories accepting personal/sensitive data (or other forms of rest...

Full description

Bibliographic Details
Main Authors: Marta Teperek, Rhys Morgan, Michelle Ellefson, Danny Kingsley
Format: Article
Language:English
Published: Ubiquity Press 2017-03-01
Series:Data Science Journal
Subjects:
Online Access:http://datascience.codata.org/articles/646