Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Theoretical Framework

    • Home
    • Modules
    • Elementary Statistics
    • Using Frequency Analysis and the English Language to Decrypt a File
    • Theoretical Framework

    SOCIOLOGICAL PARADIGM    

    (Section by Dr. Carlene Turner)

    Anonymizing Data:

    The encryption lesson being taught in this module can be paired with the concept of anonymization of data in sociological methodology. While it is believed that with quantitative data it is easier than qualitative data “to collect and record data in ways that make subject identification more difficult” (Babbie, 2011, pg. 496), care still must be taken to protect sensitive personal information. It is during the transmission of data between users that the information can be fall into unintended hands.

    Encryption can be used to conceal a dataset from parties who should not have access to it. There may be some resistance, in using encryption protocols outside of non-computer science and related disciplines. One of the aims of this module is to demonstrate data such as income tax information; medical data; juvenile delinquency records, and others that are utilized by social scientists usually needs an extra layer of protection during transmission. Encryption is an effective mean to privatize social science data.

    While social science researchers have a responsibility to maintain the privacy and confidentiality of their data, there are instances when the law allow researchers to subpoena information about their respondents. For example, law enforcement may require information about vulnerable populations, such as child abuse victims. Researchers’ can find protection by obtaining from the National Institute of Health (NIH) a Certificate of Confidentiality, so they cannot be legally required to share their confidential data (Schutt, 2014). Additionally, the Health Insurance Portability and Accountability Act (HIPPA) offers a layer of protection to practitioners and researchers that collect medical/health data. HIPPA rules states that researchers need to have valid authorization before they can share health information (Schutt, 2011).

    Example of an Encrypted Email from a medical provider

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved