Sources and further reading

AdditionalReading1000pxv2

Sources

Alexanderlehmann. (2015). Unknackbar aber einfach zu merken! - Passwörter Einfach Erklärt [Video]. Retrieved from https://www.youtube.com/watch?v=jtFc6B5lmIM&feature=youtu.be

Apple Inc. (2017). Use FileVault to encrypt the startup disk on your Mac. Retrieved from https://support.apple.com/en-gb/HT204837

AxCrypt [Computer software]. (n.d.). Retrieved from https://www.axcrypt.net/

BitLocker [Computer software]. (2017). Retrieved from https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview

Checksum Checker [Computer software]. (2014). Retrieved from http://checksumchecker.sourceforge.net/

CESSDA. (2017). Adapt your Data Management Plan. CESSDA. (2017). A list of Data Management Questions based on the Expert Tour Guide to Data Management. Retrieved from https://www.cessda.eu/content/download/3844/35033/file/20171117DMPQuestionsCESSDAExpertTourGuide.pdf

Data Archiving and Networked Services. (2017). DataverseNL. Retrieved from https://dataverse.nl/

EDINA and Data Library, University of Edinburgh. (2017). Research Data MANTRA [online course]. Edinburgh: University of Edinburgh. Retrieved from http://datalib.edina.ac.uk/mantra/

Eraser [Computer software]. (2017). Retrieved from https://eraser.heidi.ie/

EUDAT. (n.d.). B2drop. Retrieved from https://b2drop.eudat.eu/login

GnuPG. (2017). The GNU Privacy Guard. Retrieved from https://www.gnupg.org/

KeePassX [Computer software]. (2017). Retrieved from https://www.keepassx.org/

Lastpass [Computer software]. (2017). Retrieved from https://www.lastpass.com/

LastWeekTonight. (2015). Edward Snowden on Passwords: Last Week Tonight with John Oliver (HBO) [Video]. Retrieved from https://www.youtube.com/watch?v=yzGzB-yYKcc

Locky. (2017). Retrieved November 23, 2017, from Wikipedia: https://en.wikipedia.org/wiki/Locky

LSI Storage. (2009). Simply Storage: Security [Video]. Retrieved from https://www.youtube.com/watch?v=Ylkg7-JOYX8&feature=youtu.be&list=PL2XF5RiVI7GOLsLiInXnvT8L6XHC02byD

MD5summer [Computer software]. (n.d.). Retrieved from http://www.md5summer.org/

Murray-Rust, P. (2011, August 1). Why YOU need a data management plan [Blogpost]. Retrieved from https://blogs.ch.cam.ac.uk/pmr/2011/08/01/why-you-need-a-data-management-plan/

Penson, A. (2017, July 8). [Tweet]. Retrieved from https://twitter.com/ADPenson/status/883637257323896832

Raicea, R. (2017, October 8). How Pretty Good Privacy works, and how you can use it for secure communication [Blogpost]. Retrieved from https://medium.freecodecamp.org/how-does-pretty-good-privacy-work-3f5f75ecea97

RDNL. (n.d.). Essentials 4 Data Support. Retrieved from http://datasupport.researchdata.nl/en/

SafeHouse [Computer software]. (2012). Retrieved from http://www.safehousesoftware.com/

SWITCH. (2017). SWITCHdrive. Retrieved from https://www.switch.ch/drive/

Symantec Corporation. (2017). Symantec. Retrieved from https://www.symantec.com/products/encryption

The University of Edinburgh. (2017). Choosing strong passwords. Retrieved from https://www.ed.ac.uk/infosec/how-to-protect/lock-your-devices/passwords/choosing-strong-passwords

UK Data Service. (2016a). MD5summer - check the integrity of your research files [Video]. Retrieved from https://www.youtube.com/watch?v=VcBfkB6N7-k&feature=youtu.be

UK Data Service. (2016b). Back up your files using Time Machine [Video]. Retrieved from https://www.youtube.com/watch?v=hlsQaVj7WtA

UK Data Service. (2017a). Prepare and manage data. Retrieved from https://www.ukdataservice.ac.uk/manage-data

UK Data Service. (2017b). Data storage. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/storage

UK Data Service. (2017c). Data encryption. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/encryption

UK Data Service. (2017d). Data security. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/security

UK Data Service. (2017e). Data disposal. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/disposal

University of Southampton. (2017). Research Data Management: Retention. Retrieved from http://library.soton.ac.uk/researchdata/retention

VeraCrypt [Computer software]. (n.d.). Retrieved from https://www.veracrypt.fr/en/Home.html

Wadell, K. (2016, February 24). Used Phones Are Full of Previous Owners’ Data. The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2016/02/used-phones-are-full-of-previous-owners-data/470787/

WipeFile [Computer software]. (2014). Retrieved from https://www.gaijin.at/en/dlwipefile.php

Further reading

Packetizer. (2017). AES Crypt. Retrieved from https://www.aescrypt.com/

Qualitative Data Repository. (November 17, 2016). Managing Qualitative Data Safely and Securely [webinar recording]. Retrieved from https://qdr.syr.edu/qdr-blog/webinar-securely-managing-qualitative-data

UK Data Service. (2016). Encryption video tutorials [online video collection]. Retrieved from https://www.youtube.com/watch?v=y4Iosu-Yfsw&list=PLG87Imnep1SmnFGhAjFVHonQSVmMlpHkV