Table of Contents
Sources and further reading
Sources
Alexanderlehmann. (2015). Unknackbar aber einfach zu merken! - Passwörter Einfach Erklärt [Video]. Retrieved from https://www.youtube.com/watch?v=jtFc6B5lmIM&feature=youtu.be
Apple Inc. (2017). Use FileVault to encrypt the startup disk on your Mac. Retrieved from https://support.apple.com/en-gb/HT204837
AxCrypt [Computer software]. (n.d.). Retrieved from https://www.axcrypt.net/
BitLocker [Computer software]. (2017). Retrieved from https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview
Checksum Checker [Computer software]. (2014). Retrieved from http://checksumchecker.sourceforge.net/
CESSDA. (2019a). Adapt your Data Management Plan. CESSDA. (2019). A list of Data Management Questions based on the Expert Tour Guide to Data Management. Retrieved from https://www.cessda.eu/content/download/4302/48656/file/TTT_DO_DMPExpertGuide_v1.3.pdf
CESSDA. (2019b). Adapt your Data Management Plan. A list of Data Management Questions based on the Expert Tour Guide to Data Management - Editable Form. Retrieved from https://www.cessda.eu/content/download/4304/48666/file/TTT_DO_DMPExpertGuideEditVersion_v1.3.docx
Data Archiving and Networked Services. (2017). DataverseNL. Retrieved from https://dataverse.nl/
Eraser [Computer software]. (2017). Retrieved from https://eraser.heidi.ie/
EUDAT. (n.d.). B2drop. Retrieved from https://b2drop.eudat.eu/login
GnuPG. (2017). The GNU Privacy Guard. Retrieved from https://www.gnupg.org/
KeePassX [Computer software]. (2017). Retrieved from https://www.keepassx.org/
Lastpass [Computer software]. (2017). Retrieved from https://www.lastpass.com/
LastWeekTonight. (2015). Edward Snowden on Passwords: Last Week Tonight with John Oliver (HBO) [Video]. Retrieved from https://www.youtube.com/watch?v=yzGzB-yYKcc
LSI Storage. (2009). Simply Storage: Security [Video]. Retrieved from https://www.youtube.com/watch?v=Ylkg7-JOYX8&feature=youtu.be&list=PL2XF5RiVI7GOLsLiInXnvT8L6XHC02byD
MD5summer [Computer software]. (n.d.). Retrieved from http://www.md5summer.org/
Murray-Rust, P. (2011, August 1). Why YOU need a data management plan [Blogpost]. Retrieved from https://blogs.ch.cam.ac.uk/pmr/2011/08/01/why-you-need-a-data-management-plan/
Penson, A. (2017, July 8). [Tweet]. Retrieved from https://twitter.com/ADPenson/status/883637257323896832
Raicea, R. (2017, October 8). How Pretty Good Privacy works, and how you can use it for secure communication [Blogpost]. Retrieved from https://medium.freecodecamp.org/how-does-pretty-good-privacy-work-3f5f75ecea97
RDNL. (n.d.). Essentials 4 Data Support. Retrieved from http://datasupport.researchdata.nl/en/
Research Data Service, University of Edinburgh. (2022). Research Data MANTRA [online course]. Edinburgh: University of Edinburgh. Retrieved from https://mantra.ed.ac.uk/
SWITCH. (2017). SWITCHdrive. Retrieved from https://www.switch.ch/drive/
Symantec Corporation. (2017). Symantec. Retrieved from https://www.symantec.com/products/encryption
The University of Edinburgh. (2017). Choosing strong passwords. Retrieved from https://www.ed.ac.uk/infosec/how-to-protect/lock-your-devices/passwords/choosing-strong-passwords
UK Data Service. (2016a). MD5summer - check the integrity of your research files [Video]. Retrieved from https://www.youtube.com/watch?v=VcBfkB6N7-k&feature=youtu.be
UK Data Service. (2016b). Back up your files using Time Machine [Video]. Retrieved from https://www.youtube.com/watch?v=hlsQaVj7WtA
UK Data Service. (2017a). Prepare and manage data. Retrieved from https://www.ukdataservice.ac.uk/manage-data
UK Data Service. (2017b). Data storage. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/storage
UK Data Service. (2017c). Data encryption. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/encryption
UK Data Service. (2017d). Data security. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/security
UK Data Service. (2017e). Data disposal. Retrieved from https://www.ukdataservice.ac.uk/manage-data/store/disposal
UK Data Service. (2022). Research data management. Learning hub. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-management/
University of Southampton. (2017). Research Data Management: Retention. Retrieved from http://library.soton.ac.uk/researchdata/retention
VeraCrypt [Computer software]. (n.d.). Retrieved from https://www.veracrypt.fr/en/Home.html
Wadell, K. (2016, February 24). Used Phones Are Full of Previous Owners’ Data. The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2016/02/used-phones-are-full-of-previous-owners-data/470787/
Wikipedia (2017). Locky. Retrieved November 23, 2017, from https://en.wikipedia.org/wiki/Locky
WipeFile [Computer software]. (2014). Retrieved from https://www.gaijin.at/en/dlwipefile.php
Further reading
Lake, J. (2023). Common Encryption Types, Protocols and Algorithms Explained. Retrieved from https://www.comparitech.com/blog/information-security/encryption-types-explained/
Packetizer. (n.d.). AES Crypt. Retrieved from https://www.aescrypt.com/
Qualitative Data Repository. (November 17, 2016). Managing Qualitative Data Safely and Securely [webinar recording]. Retrieved from https://qdr.syr.edu/qdr-blog/webinar-securely-managing-qualitative-data
UK Data Service. (2016). Encryption video tutorials [online video collection]. Retrieved from https://www.youtube.com/watch?v=y4Iosu-Yfsw&list=PLG87Imnep1SmnFGhAjFVHonQSVmMlpHkV