{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T19:50:37Z","timestamp":1778442637008,"version":"3.51.4"},"reference-count":28,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T00:00:00Z","timestamp":1456272000000},"content-version":"vor","delay-in-days":419,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Researchers in the social and health sciences are used to dealing with confidential data, and repositories in these areas have developed mechanisms to prevent unethical or illegal disclosure of this data. However, other scientific communities also collect data whose disclosure may cause harm to communities, cultures, or the environment. This paper presents results from 62 interviews and observations with archaeologists and zoologists. It focuses on how researchers\u2019 perceptions of potential harm influence attitudes about data confidentiality, and how these, in turn, influence opinions about who should be responsible for managing access to data. This is particularly problematic in archaeology when harm is not to a living individual but is targeted at a community or culture that may or may not have living representatives, and in zoology when an environment or a species may be at risk. We find that while both archaeologists and zoologists view location information as highly important and valuable in facilitating use and reuse of data, they also acknowledge that location should at times be considered confidential information since it can be used to facilitate the destruction of cultural property through looting or decimation of endangered species through poaching. While researchers in both disciplines understand the potential dangers of allowing disclosure of this information, they disagree about who should take responsibility for access decisions and conditions.<\/jats:p>","DOI":"10.1002\/pra2.2015.145052010037","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:56:50Z","timestamp":1456552610000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists &amp; zoologists"],"prefix":"10.1002","volume":"52","author":[{"given":"Rebecca D.","family":"Frank","sequence":"first","affiliation":[{"name":"University of Michigan, School of Information  105 S. State St Ann Arbor MI 48109"}]},{"given":"Adam","family":"Kriesberg","sequence":"additional","affiliation":[{"name":"University of Maryland, College of Information  Studies Room 405, Hornbake Building South College Park MD 20742"}]},{"given":"Elizabeth","family":"Yakel","sequence":"additional","affiliation":[{"name":"University of Michigan, School of Information  105 S. State St Ann Arbor MI 48109"}]},{"given":"Ixchel M.","family":"Faniel","sequence":"additional","affiliation":[{"name":"OCLC Research  6565 Kilgour Pl Dublin OH 43017"}]}],"member":"311","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"e_1_2_8_2_1","unstructured":"About Open Context: Publishing. (2015). Retrieved April 29 2015 fromhttp:\/\/opencontext.org\/about\/publishing"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.2481\/dsj.3.135"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22634"},{"key":"e_1_2_8_5_1","first-page":"27","volume-title":"Guide to Best Practices for Generalising Primary Species\u2010Occurrence Data","author":"Chapman A. D.","year":"2008"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-12-S15-S2"},{"key":"e_1_2_8_7_1","article-title":"Confidentiality and informed consent: Issues for consideration in the preservation of and provision of access to qualitative data archives","volume":"1","author":"Corti L.","year":"2000","journal-title":"Forum Qualitative Sozialforschung\/Forum: Qualitative Social Research"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/13614576.2014.883936"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2001"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.11646\/zootaxa.2393.1.5"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1001634"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0341-8_2"},{"key":"e_1_2_8_13_1","unstructured":"Inter\u2010university Consortium for Political and Social Research (ICPSR). (2015).About ICPSR. Retrieved April 19 2015 fromhttp:\/\/www.icpsr.umich.edu\/icpsrweb\/content\/membership\/about.html"},{"key":"e_1_2_8_14_1","unstructured":"Jahnke L. M. &Asher A.(2013).Dilemmas of Digital Stewardship: Research Ethics and the Problems of Data Sharing.Research Data Management 80."},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-006-9023-2"},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"Kersel M. M. &Chesson M. S.(2013).Looting Matters. Early Bronze Age Cemeteries of Jordan's southeast Dead Sea Plain in the Past and Present. Retrieved fromhttp:\/\/works.bepress.com\/cgi\/viewcontent.cgi?article=1059&context=morag_kersel","DOI":"10.1093\/oxfordhb\/9780199569069.013.0038"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10677-014-9497-9"},{"issue":"3","key":"e_1_2_8_18_1","first-page":"12","article-title":"Methodological and ethical dilemmas of archiving qualitative data","volume":"34","author":"Kuula A.","year":"2010","journal-title":"IASSIST Quarter.y"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v8i1.259"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.2014.1720400514"},{"key":"e_1_2_8_21_1","doi-asserted-by":"crossref","unstructured":"Lynott M. J.(1997).Ethical principles and archaeological practice: development of an ethics policy.American Antiquity 589\u2013599.","DOI":"10.2307\/281879"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthpol.2013.06.006"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038504039366"},{"key":"e_1_2_8_24_1","unstructured":"Protection of Human Subjects(2009). Retrieved fromhttp:\/\/www.hhs.gov\/ohrp\/humansubjects\/guidance\/45cfr46.html"},{"key":"e_1_2_8_25_1","unstructured":"Society for American Archaeology. (1996).Principles of Archaeological Ethics. Retrieved fromhttp:\/\/www.saa.org\/AbouttheSociety\/PrinciplesofArchaeologicalEthics\/tabid\/203\/Default.aspx"},{"key":"e_1_2_8_26_1","unstructured":"Sweeney L. (1997).Guaranteeing anonymity when sharing medical data the Datafly system.Proceedings Journal of the American Medical Informatics Association. (AMIA). Retrieved fromhttp:\/\/dataprivacylab.org\/datafly\/paper4.pdf"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0067332"},{"issue":"2","key":"e_1_2_8_28_1","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1162\/posc_a_00502","article-title":"Ethical dilemmas in archaeological practice: Looting, repatriation, stewardship, and the (trans) formation of disciplinary identity","volume":"4","author":"Wylie A.","year":"1996","journal-title":"Perspectives on Science: Historical Philosophical, Social"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243907306704"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010037","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010037","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2015.145052010037","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:07:06Z","timestamp":1761070026000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2015.145052010037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1002\/pra2.2015.145052010037"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2015.145052010037","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"2016-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}