Skip to main content

Table 3 Cyrus - Data transparency framework

From: Automatic transparency evaluation for open knowledge extraction systems

Categories

Dimensions

Attributes

Quality

Provenance

1. An access point to the raw data [45]

2. The context - timeframe of data collection [45, 47]

3. The context - location of data collection [62]

4. The data collection agent (applications, sensors, human users) [62]

5. The number of participants, the eligibility criteria, the follow-up times, if there has been participants [63, 64]

6. Source data transformation/preprocessing [15, 45]

7. Data assumptions [15, 49, 62]

8. An access point to the model and algorithm transparency information, if the data/resource is an output of an automatic/semi-automatic process

9. Intended uses of the data [62, 65]

10. Intended data users [62, 65]

11. Data usage history, including applications that have processed the data and the purpose of the use [62, 65]

12. A contact point [62, 66]

13. Citation details [42]

14. Sources of funding [47]

15. Dataset version history

Understandability

1. Correlations between different dataset properties [47]

2. The stratifications into ordinal, nominal, continuous, and discrete, e.g., least/most entries, min/max, median, mean [47]

Accuracy

1. Sources of errors and noise in the dataset [45]

2. An access point to the erratum, if applicable [45]

Conciseness

1. Sources of redundancies in the dataset [45]

Volatility

1. Dates of planned updates of the dataset [45]

2. Mechanisms for distributing updates [45]

3. Mechanisms to support/host/maintain the older versions of the dataset, if applicable [45]

4. Mechanisms to communicate/distribute the obsolescence of the older versions of the dataset, if applicable [45]

5. Mechanisms to extend/augment/build on/contribute to the dataset [45]

6. Validation/verification procedures for dataset extensions [45]

7. Mechanisms for communicating/distributing dataset extensions [45]

Completeness

1. Data limitations, e.g., missing information [15, 45, 47, 49, 62]

Security and ethics

Security and privacy

1. Existence of personal or confidential data [15, 45, 47, 66]

2. Security and privacy management techniques for the data [15, 45, 66]

3. Information about breaches of data over a period of time [62, 65]

Disclosure and Data Provisioning (for data transmitted across organisations)

1. Contracts and legal agreements concerning the data disclosure [62, 65]

2. Limits on the retention of the data, if applicable [45]

3. Financial agreements [62, 65]

4. Technical mechanisms used for data transmission [62, 65]

Laws and policies [45, 62, 65]

1. Availability of laws, regulations, and organisational policies associated with the data of interest to all subjects

Ethical

1. Ethical review [45, 47, 62]

2. Informed consent for data collection [45, 47, 62, 66]