10.5281/zenodo.4056242
https://zenodo.org/records/4056242
oai:zenodo.org:4056242
Adams, Andrew
Andrew
Adams
0000-0002-8276-1334
Avila, Kay
Kay
Avila
0000-0003-1138-0996
Basney, Jim
Jim
Basney
0000-0002-0139-0640
Christopherson, Laura
Laura
Christopherson
Cragin, Melissa
Melissa
Cragin
0000-0002-1857-6273
Dopheide, Jeannette
Jeannette
Dopheide
0000-0002-9475-7965
Fleury, Terry
Terry
Fleury
0000-0002-4619-140X
Frye, Calvin
Calvin
Frye
0000-0002-2926-8241
Hudson, Florence
Florence
Hudson
0000-0003-0896-2127
Kanodia, Manisha
Manisha
Kanodia
0000-0001-6492-2280
Kim, Jenna
Jenna
Kim
0000-0001-7438-448X
MacMullen, W. John
W. John
MacMullen
0000-0002-8175-7464
Rynge, Mats
Mats
Rynge
0000-0002-1779-7189
Sakai, Scott
Scott
Sakai
Thompson, Sandra
Sandra
Thompson
Vahi, Karan
Karan
Vahi
0000-0001-8622-2082
Zage, John
John
Zage
0000-0001-7303-7910
Guidance for Trustworthy Data Management in Science Projects
Zenodo
2020
2020-09-30
10.5281/zenodo.4056241
https://zenodo.org/communities/trustedci
Creative Commons Attribution 3.0 Unported
In April and May of 2020, the Trustworthy Data Working Group conducted a survey of the scientific community about data security concerns and practices. 111 participants completed the survey from a wide range of positions and roles within their organizations and projects, respectively. The working group analyzed the survey results with an eye for patterns, themes, correlations, and aggregates and produced a report in June 2020 detailing the process, survey methodology, and their analysis.
Several key findings emerged from the report, including:
Data owners, maintainers and users are concerned about the trustworthiness of data throughout the lifecycle of the scientific process, especially with regard to the loss of reputation if data trustworthiness isn’t preserved.
Data owners and maintainers welcome help in securing trustworthy data workflows with encryption, provenance, and regulatory compliance (e.g., FERPA, HIPAA, FISMA).
Trustworthiness is not precisely defined in the scientific community.
This document, a follow-up to the analysis report mentioned above, delves into the key findings identified, explores the concerns reported and provides recommendations of existing solutions to address the survey participants’ concerns regarding trustworthiness of data.