Reference & Resources
References
- Australian Bureau of Statistics (2021). Five Safes framework: Data confidentiality guide. https://ukdataservice.ac.uk/help/secure-lab/what-is-the-five-safes-framework/
- Bauzon, J., Murphy, C., Wahi-Gururaj, S. (2021). Using macros in microsoft excel to facilitate cleaning of research data, Journal of Community Hospital Internal Medicine Perspectives, 11:5, 653-657, DOI: 10.1080/20009666.2021.1954282
- Brown, C.J. & Broadley, A. (2017). Fishscape. https://doi.org/10.25904/1912/4017
- Brown, C. J., Broadley, A., Adame, M. F., Branch, T. A., Turschwell, M. P., & Connolly, R. M. (2019). The assessment of fishery status depends on fish habitats. Fish and Fisheries, 20(1), 1-14. https://doi.org/10.1111/faf.12318
- Bryan, J. (2015). Naming things.https://speakerdeck.com/jennybc/how-to-name-files
- CESSDA Training Team (2017 - 2022). File naming and folder conventions, CESSDA Data Management Expert Guide. Bergen, Norway: CESSDA ERIC. Retrieved from https://dmeg.cessda.eu/CESSDA
- Contaxis N, Clark J, Dellureficio A, Gonzales S, Mannheimer S, Oxley PR, et al. (2022) Ten simple rules for improving research data discovery. PLoS Comput Biol 18(2): e1009768. https://doi.org/10.1371/journal.pcbi.1009768
- Dinusha, B., Howell, L., Silbert, M., Daraganova, G. (2021). Ten to Men: The Australian Longitudinal Study on Male Health, Release 3 (Waves 1-3),, ADA Dataverse, V4. (Dataset). doi:10.26193/JDE1TD
- Eddy, M. (2022). The best VPN Services. PC Mag, November 29 2022. https://au.pcmag.com/vpn/138/the-best-vpn-services
- Griffith University. (2021). Australian Historical Criminal Justice Dataverse. Canberra, ADA. https://dataverse.ada.edu.au/dataverse/australian_historical_criminal_justice_data
- Hart EM, Barmby P, LeBauer D, Michonneau F, Mount S, Mulrooney P, et al. (2016) Ten Simple Rules for Digital Data Storage. PLoS Comput Biol 12(10): e1005097. https://doi.org/10.1371/journal.pcbi.1005097
- Hollmann S, Frohme M, Endrullat C, Kremer A, D’Elia D, Regierer B, et al. (2020) Ten simple rules on how to write a standard operating procedure. PLoS Comput Biol 16(9): e1008095. https://doi.org/10.1371/journal.pcbi.1008095
- Honor, L. B., Haselgrove, C., Frazier, J. A., & Kennedy, D. N. (2016). Data citation in neuroimaging: Proposed best practices for data identification and attribution. Frontiers in neuroinformatics, 10, 34. https://doi.org/10.3389/fninf.2016.00034
- IBM. (2022).File naming conventions, IBM Documentation. Accessed 12 December 2022. https://www.ibm.com/docs/en/aix/7.1?topic=files-file-naming-conventions
- Komarek, A., M. (2021). Replication Data for the study on income, consumer preferences, and the future of livestock-derived food demand. Dataverse. (Data Collection). https://doi.org/10.7910/DVN/ZPWQBB
- O’Keefe, C.M., Otorepec, S., Elliot, S., Mackey, S., O’Hara, K. (2017). The De-Identification Decision-Making Framework. CSIRO Reports EP173122 and EP175702. Available at: [https://www.data61.csiro.au/en/Our-Work/Safety-and-Security/Privacy-Preservation/De-identification-Decision-Making-Framework])https://www.data61.csiro.au/en/Our-Work/Safety-and-Security/Privacy-Preservation/De-identification-Decision-Making-Framework)
- Office of the Australian Information Commissioner. (2017). De-identification-and-the-privacy-act. https://www.oaic.gov.au/agencies-and-organisations/guides/de-identification-and-the-privacy-act.
- Office of the Australian Information Commissioner. (2018). Guide to health privacy.https://www.oaic.gov.au/privacy/guidance-and-advice/guide-to-health-privacy
- Office of the Information Commissioner Queensland. (2020). Privacy and De-identified datahttps://www.oic.qld.gov.au/guidelines/for-government/guidelines-privacy-principles/anonymity/privacy-and-de-identification
- Paynter, J., Luskin-Saxby, S., Keen, D., Fordyce, K., Frost, G., Imms, C., Miller, S., Trembath, D., Tucker, M., & Ecker, U.. (2019). Evaluation of a template for countering misinformation—Real-world Autism treatment myth debunking (Version 1). PLOS ONE. https://doi.org/10.1371/journal.pone.0210746
- Piper, A., & Finnane, M. (2017). Access to legal representation by criminal defendants in Victoria, 1861-1961. University of New South Wales Law Journal, 40(2), 638-663. http://hdl.handle.net/10072/340488
- Privacy Act 1988 (Cth). https://www.legislation.gov.au/Details/C2018C00292
- Wickham, H. (2014). Tidy Data. Journal of Statistical Software, 59(10), 1–23. 18637/jss.v059.i10
- Wood-Charlson EM, Crockett Z, Erdmann C, Arkin AP, Robinson CB (2022) Ten simple rules for getting and giving credit for data. PLoS Comput Biol 18(9): e1010476. https://doi.org/10.1371/journal.pcbi.1010476
- University of Edinburgh. (2019). Naming conventions.https://www.ed.ac.uk/records-management/guidance/records/practical-guidance/naming-conventions
- Westgarth, N. (2014). Better management reduces data loss risk. Research Information. April, 2014. https://www.researchinformation.info/analysis-opinion/better-management-reduces-data-loss-risk
Useful resources
- 100 Days of Code - The Complete Python Course by Replit
- ARDC’s Identifiable Data online resource
- ARDC Data & Software Citation Guide
- British Ecology Reproducibility Book
- Docker
- Email compromise check
- Eduroam
- Hello world tutorial
- Griffith University eResearch Services
- Griffith University’s example folder template
- Griffith University Copyright matters
- Griffith University cybersecurity-at-home
- Griffith University Encryption
- Griffith University Library - working with data
- Griffith University password support
- Griffith Research Online (GRO) Data Repository
- How to start Documenting and more by CESSDA ERIC
- Introduction to Data Wrangling with OpenRefine
- MacOS Automator: find out how to automate 10 useful things
- Mac OS Encryption options
- How to creat automated tasks using Win 1- Task scheduler
- Learn Software Carpentry in Git
- Microsoft Power Automate or
- OpenRefine software
- pandas package
- PLoS journals recommended data repositories
- Python
- python package for folder templates
- R
- re3data.org registry of data repositories
- Reproducible research in Git
- Reproducibility in SPSS
- Software Carpentry Git Workshop
- Singularity
- tidyr package
- University of Sydney README template
- Using macros in microsoft excel to facilitate cleaning of research data
- What is git
- Win 10 Encryption
- Win 7 Encryption