***** To join INSNA, visit http://www.sfu.ca/~insna/ *****
From: Steve Borgatti <[log in to unmask]>
> Glen, is there some reason why you need to enter names into the network data
> files? Why not use id codes in the ucinet/netdraw files?
> ----- Original Message -----
> From: "Glen Murphy" <[log in to unmask]>
> Subject: Entry of data - common procedure
> >...
> > interview records. If (as I had unthinkingly planned to do) I key in
> > participant names into a matrix (using UCINET) then theoretically that
> > data file is highly vulnerable.
It's only as vulnerable as it gets, in this business. (depending on what other data
your visualization shows, i.e. what the connections represent or other sensitive nodal
attributes).
> > leave a problem with UCINET reports and the raw data file itself. What
> > is the usual procedure ? How do people deal with this issue ? I'm aware
> > that US IRB boards are a little touchy regarding network analysis - has
> > anyone had any stipulation from their IRB about this issue ?
> >
> > So far no-one I've dealt with has twigged to this problem, but I thought
> > I'd be proactive just in case.
If data are sensitive, and IRBs were involved with the study, you can bet
that EVERYBODY has had stipulation from their IRBs regarding non-disclosure
of that sensitive information. Including releasing a graph with names in it.
Especially releasing a graph with people's names in it.
Borgatti's suggestion is the most straightforward and practical way of dealing
with the issue... create a unique actor ID and use that as labels, if desired.
I suggest 1, 2, 3... having dealt with a host of perplexing ID systems in my time.
At very worst, one could use actor initials in the graph - but such a practice
is useful only for the researchers themselves, and may, in combination with
other variables in the graph, lead to disclosure of the actor identities if the
graph is released for general consumption. (and the nature of the graph is
specific enough to permit elucidation of the persons involved).
For a general discussion of issues arising from network research
involving sensitive data:
Woodhouse DE, Potterat JJ, et al. Ethical and legal issues in social
networks research: the real and the ideal.
in Needle RH, Genser SG, Trotter II RT (eds):
Social Networks, Drug Abuse and HIV Transmission.
National Institute of Drug Abuse Monograph No. 151.
(NIH Publication No. 95-3889); 1995: 131-143.
also note, in the same volume, sociograms (pp 169-170) from
Trotter et al.'s piece on HIV Outreach and prevention networks.
(Actor identities are easily suppressed in released materials by
using numeric labels.)
Sociograms of such data with *personal* identifiers in it would obviously
need to be accorded the highest protection possible, and eventually destroyed.
(if there was a long-term need to keep the sensitive pictures, one safeguard is to
keep only some encrypted electronic form of the pictures, where only authorized
personnel has access to the keys.)
--
Quintus-ential Solutions
Stephen Q. Muth -- [log in to unmask] / [log in to unmask]
1013 E Las Animas St. Colo. Spgs., CO 80903-4519
voice -- (719) 471-7025 | FAX -- (719) 473-5474 | cell -- (719)210-3785
_____________________________________________________________________
SOCNET is a service of INSNA, the professional association for social
network researchers (http://www.sfu.ca/~insna/). To unsubscribe, send
an email message to [log in to unmask] containing the line
UNSUBSCRIBE SOCNET in the body of the message.
|