Information Technology Reference
In-Depth Information
Onamulti-usermachineornetworkedmachine,makesurethatfilepermissions
are set to prevent unauthorized user access, preventing others from reading or
copying files.
Chapter 8, which covers data storage, has some examples on how to encrypt
files and also on how to set permissions to restrict access.
In online research, as in other research endeavors, choices and decisions are
made that will impact the study and how it will be perceived. It's important that
researchers be honest in their description of their research endeavor, work at
establishing trust, respect the confidentiality of the research participants, and
maintain their promises by only using data as agreed.
In this chapter, our goal was to provide you with a foundation on which to
make some of the necessary and perhaps difficult decisions in designing your
study. In addition, we offered some practical ways in which a researcher can
mitigate the unnecessary risk volunteers are exposed to online by encrypting
and restricting access to files. In the following chapters our focus will be more
specifically on the ways in which various technologies can be employed to
support your online research endeavors.
Search WWH ::




Custom Search