data-governance internet-research reflection-questions
The close of the project includes data archiving and model storage for future access, deployment and development, and for third parties to replicate similar results on other datasets or reuse the dataset (e.g. with permission) on other research questions. Established repositories such as data archives can assist researchers in post-research data governance.*Post-research Data Governance *Systems and research design will never be as robust as intended. To mitigate unforeseen risks, researchers must be prepared and manage the unknown, also after the project has been completed. For example, when a dataset containing sensitive information is disclosed by a third-party unexpectedly, researchers must alert data subjects so they can take precautions.- Are the datasets and models stored securely? - Are some datasets more sensitive than others and do they warrant special security precautions? - Will the data be destroyed at a specific date? How will this data be destroyed? Or will they be anonymized and archived at a specific date? - How might the data and model be accessed through an application process and what potential harm to data subjects and/or society might this future access have? - Is there a containment policy for unexpected breaches or malicious uses and what does it oblige the researcher to do or will this responsibility go to the archival organization? Will researchers contact the data subjects and/or the relevant privacy regulator directly about a breach? - To what extent does this depend on the seriousness of the disclosure or the sensitivity of the data? - How will harmed data subjects or stakeholders be compensated? (franzke, 2020, p.46-47)