You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Acknowledge the privacy and confidentiality issues in data storage and security of personal data.
Consider issues in data loss, responsibility, and whether the risk from data loss outweighs the research value of collecting it.
Example: ICE and DACA deportation, National Immigration Law Centre, HIV and social stigma … cf “My daughter refused medicine because of stigma”.
CURATION
Recognise responsibilities and mechanisms for securing data-at-rest and data-in-motion.
Data storage requires recognition of responsibilities for securing that data, including encryption and auth ‘n auth. This is true for owners, users, and intermediaries (chain of custody).
Methods for securing and authentication with storage.
ANALYSIS
Apply linear and continuous sampling methods to assess normal distributions.
Linear and continuous probability; normal distribution and standardisation.
Some Bayes.
PRESENTATION
Plot distributions as normal histograms and continuous curves.
Applying previously learned charts, and learning how to present normal distributions.
CASE STUDY
Birthweight should follow a normal distribution; also raises personal data security issues since birth certificates must be secured indefinitely but used continuously.
The text was updated successfully, but these errors were encountered:
ETHICS
Acknowledge the privacy and confidentiality issues in data storage and security of personal data.
Consider issues in data loss, responsibility, and whether the risk from data loss outweighs the research value of collecting it.
Example: ICE and DACA deportation, National Immigration Law Centre, HIV and social stigma … cf “My daughter refused medicine because of stigma”.
CURATION
Recognise responsibilities and mechanisms for securing data-at-rest and data-in-motion.
Data storage requires recognition of responsibilities for securing that data, including encryption and auth ‘n auth. This is true for owners, users, and intermediaries (chain of custody).
Methods for securing and authentication with storage.
ANALYSIS
Apply linear and continuous sampling methods to assess normal distributions.
Linear and continuous probability; normal distribution and standardisation.
Some Bayes.
PRESENTATION
Plot distributions as normal histograms and continuous curves.
Applying previously learned charts, and learning how to present normal distributions.
CASE STUDY
Birthweight should follow a normal distribution; also raises personal data security issues since birth certificates must be secured indefinitely but used continuously.
The text was updated successfully, but these errors were encountered: