Matches in Nanopublications for { ?s ?p ?o <https://w3id.org/np/RAFTcnP9fBOBEtsBSmI4zGtMertVyuomkJ_NXfNB3hS18/assertion>. }
Showing items 1 to 20 of
20
with 100 items per page.
- peerj-cs.1038 type Article assertion.
- author-list _1 0000-0001-8004-0464 assertion.
- author-list _2 0000-0002-1267-0234 assertion.
- author-list _3 0000-0001-8772-7904 assertion.
- author-list _4 0000-0002-7748-4715 assertion.
- 0000-0002-1267-0234 name "Tobias Kuhn" assertion.
- 0000-0002-7748-4715 name "Jacco van Ossenbruggen" assertion.
- 0000-0001-8004-0464 name "Margherita Martorana" assertion.
- 0000-0001-8772-7904 name "Ronald Siebes" assertion.
- 008xxew50 name "Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, Netherlands" assertion.
- peerj-cs.1038 title "Aligning restricted access data with FAIR: a systematic review" assertion.
- 2376-5992 title "PeerJ Computer Science" assertion.
- peerj-cs.1038 date "2022-07-20" assertion.
- peerj-cs.1038 isPartOf 2376-5992 assertion.
- peerj-cs.1038 abstract "Understanding the complexity of restricted research data is vitally important in the current new era of Open Science. While the FAIR Guiding Principles have been introduced to help researchers to make data Findable, Accessible, Interoperable and Reusable, it is still unclear how the notions of FAIR and Openness can be applied in the context of restricted data. Many methods have been proposed in support of the implementation of the principles, but there is yet no consensus among the scientific community as to the suitable mechanisms of making restricted data FAIR. We present here a systematic literature review to identify the methods applied by scientists when researching restricted data in a FAIR-compliant manner in the context of the FAIR principles. Through the employment of a descriptive and iterative study design, we aim to answer the following three questions: (1) What methods have been proposed to apply the FAIR principles to restricted data?, (2) How can the relevant aspects of the methods proposed be categorized?, (3) What is the maturity of the methods proposed in applying the FAIR principles to restricted data?. After analysis of the 40 included publications, we noticed that the methods found, reflect the stages of the Data Life Cycle, and can be divided into the following Classes: Data Collection, Metadata Representation, Data Processing, Anonymization, Data Publication, Data Usage and Post Data Usage. We observed that a large number of publications used 'Access Control' and 'Usage and License Terms' methods, while others such as 'Embargo on Data Release' and the use of 'Synthetic Data' were used in fewer instances. In conclusion, we are presenting the first extensive literature review on the methods applied to confidential data in the context of FAIR, providing a comprehensive conceptual framework for future research on restricted access data." assertion.
- 0000-0002-1267-0234 affiliation 008xxew50 assertion.
- 0000-0002-7748-4715 affiliation 008xxew50 assertion.
- 0000-0001-8004-0464 affiliation 008xxew50 assertion.
- 0000-0001-8772-7904 affiliation 008xxew50 assertion.
- peerj-cs.1038 authorList author-list assertion.