
Tools
When working with research data that contain personal or sensitive information, it can be helpful to use various tools to manage and protect the data. There are tools to, for example, assist in assessing the risk of re-identification, systematically preparing a dataset for disclosure, or generating synthetic data. On this page, we introduce several types of tools and software that can be useful for managing quantitative and qualitative data, as well as tools for encryption, for generating synthetic data, and for working in secure computing environments.
Tools for quantitative data
There is a variety of tools for statistical disclosure control in quantitative data – that is, tools that help you assess and minimize the risk of re-identification within your dataset. Many of these tools also offer protective measures for reducing this risk, as well as functions to evaluate the usability of data after applying these measures. Below are some of the most common tools for statistical disclosure control.
Tools for qualitative data
There are several digital tools to help manage qualitative data, particularly for assisting in anonymizing and structuring materials such as interview transcripts. QualiAnon is one such tool, designed to help protect personal data while preserving the analytical value of the material.
Tools for encryption
Encryption is a protective measure that adds an extra layer of access control to sensitive data. It can be particularly useful for file transfers, temporary storage in environments with limited security, or as part of a systematic access control strategy within a research project. Below you find some commonly used encryption tools.
Tools for generating synthetic data
Synthetic data are artificially generated data based on statistical models. The data may be generated based on real datasets or created entirely from predefined rules and input values.
Secure computing environments
A secure computing environment is designed to protect sensitive or confidential information and research data from unauthorized access, data leakage, or other security threats. These environments are especially important in research involving personal data or other sensitive information. Many universities offer secure local computing environments for researchers.