Journal article Open Access
Milliff, Aidan
{ "files": [ { "links": { "self": "https://zenodo.org/api/files/ccf9f17c-f4f0-42a4-9eeb-aacd58ab0a95/Aidan%20Milliff.pdf" }, "checksum": "md5:ffe2dfb76008e331d2545021444fffce", "bucket": "ccf9f17c-f4f0-42a4-9eeb-aacd58ab0a95", "key": "Aidan Milliff.pdf", "type": "pdf", "size": 246285 } ], "owners": [ 335060 ], "doi": "10.5281/zenodo.6448133", "stats": { "version_unique_downloads": 46.0, "unique_views": 77.0, "views": 81.0, "version_views": 81.0, "unique_downloads": 46.0, "version_unique_views": 77.0, "volume": 11821680.0, "version_downloads": 48.0, "downloads": 48.0, "version_volume": 11821680.0 }, "links": { "doi": "https://doi.org/10.5281/zenodo.6448133", "conceptdoi": "https://doi.org/10.5281/zenodo.6448132", "bucket": "https://zenodo.org/api/files/ccf9f17c-f4f0-42a4-9eeb-aacd58ab0a95", "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.6448132.svg", "html": "https://zenodo.org/record/6448133", "latest_html": "https://zenodo.org/record/6448133", "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.6448133.svg", "latest": "https://zenodo.org/api/records/6448133" }, "conceptdoi": "10.5281/zenodo.6448132", "created": "2022-05-25T14:20:41.538106+00:00", "updated": "2022-05-26T01:50:35.333491+00:00", "conceptrecid": "6448132", "revision": 2, "id": 6448133, "metadata": { "access_right_category": "success", "doi": "10.5281/zenodo.6448133", "description": "<p>Political science research in both qualitative and quantitative traditions frequently uses data that contain personal information about research participants. Personal information can enter the research process in different ways; sometimes researchers collect it directly via a survey or an interview, other times they gather it from an aggregator like a government agency or private company or semi-public sources like social media. In many cases, the personal data that political scientists collect is both personally-identifiable3 and sensitive, meaning that disclosure could expose respondents to severe repercussions like legal sanction (McMurtrie 2014) or retribution from non-state actors (Venkatesh 2008), as well as more diffuse harms like the negative impacts on personal life, employment opportunities, or reputation (Ohm 2010).</p>", "language": "eng", "title": "Data security in human subjects research: new tools for qualitative and mixed-methods scholars", "license": { "id": "CC-BY-NC-ND-4.0" }, "journal": { "volume": "19/20", "issue": "2/1", "pages": "31-39", "title": "Qualitative & Multi-Method Research" }, "relations": { "version": [ { "count": 1, "index": 0, "parent": { "pid_type": "recid", "pid_value": "6448132" }, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "6448133" } } ] }, "communities": [ { "id": "qmmr-newsletter" } ], "keywords": [ "Qualitative Methods" ], "publication_date": "2022-04-11", "creators": [ { "affiliation": "Massachusetts Institute of Technology", "name": "Milliff, Aidan" } ], "access_right": "open", "resource_type": { "subtype": "article", "type": "publication", "title": "Journal article" }, "related_identifiers": [ { "scheme": "issn", "identifier": "2153-6767", "relation": "isPartOf" }, { "scheme": "doi", "identifier": "10.5281/zenodo.6448132", "relation": "isVersionOf" } ] } }
All versions | This version | |
---|---|---|
Views | 81 | 81 |
Downloads | 48 | 48 |
Data volume | 11.8 MB | 11.8 MB |
Unique views | 77 | 77 |
Unique downloads | 46 | 46 |