Whose Data Is It Anyway? Lessons in Data Management and Sharing from Resurrecting and Repurposing Lidar Data for Archaeology Research in Honduras
- Award ID(s):
- 1830734
- PAR ID:
- 10163190
- Date Published:
- Journal Name:
- Journal of Computer Applications in Archaeology
- Volume:
- 3
- Issue:
- 1
- ISSN:
- 2514-8362
- Page Range / eLocation ID:
- 122 to 134
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
Data preprocessing is an integral step prior to analyzing data in psychological science, with implications for its potentially guiding policy. This article reports how psychological researchers address data preprocessing or quality concerns, with a focus on aberrant responses and missing data in self-report measures. 240 articles were sampled from four journals: Psychological Science, Journal of Personality and Social Psychology, Developmental Psychology, and Abnormal Psychology from 2012 to 2018. Nearly half of the studies did not report any missing data treatment (111/240; 46.25%), and if they did, the most common approach was listwise deletion (71/240; 29.6%). Studies that remove data due to missingness removed, on average, 12% of the sample. Likewise, most studies do not report any aberrant responses (194/240; 80%), but if they did, they classified 4% of the sample as suspect. Most studies are either not transparent enough about their data preprocessing steps or may be leveraging suboptimal procedures. Recommendations can improve transparency and data quality.more » « less
-
Although outsourcing data to cloud storage has become popular, the increasing concerns about data security and privacy in the cloud limits broader cloud adoption. Ensuring data security and privacy, therefore, is crucial for better and broader adoption of the cloud. This tutorial provides a comprehensive analysis of the state-of-the-art in the context of data security and privacy for outsourced data. We aim to cover common security and privacy threats for outsourced data, and relevant novel schemes and techniques with their design choices regarding security, privacy, functionality, and performance. Our explicit focus is on recent schemes from both the database and the cryptography and security communities that enable query processing over encrypted data and access oblivious cloud storage systems.more » « less
-
The democratization of data is transforming our world. Together with the advances in computer and engineering technology, these advancements drive the rapid change in the landscape of jobs and work. There are many reports indicating that industry finds itself constrained by today’s relatively small supply of well-trained data science talent, and hiring demand for data scientists has begun to increase rapidly; some projections forecast that approximately 2.7 million new data science positions will be available by 2020. Unsurprisingly, the data science and engineering (DSE) programs across the nation have grown significantly in the past a few years. DSE education requires both appropriate classwork and hands-on experience with real data and real applications. While significant progress has been made in the former, one key aspect that yet to be addressed is hands-on experience incorporating real-world applications. In this work, we will review the efforts that explore real data and application based data science education.more » « less
An official website of the United States government

