Research Preparation: Difference between revisions
format and categories |
No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
== Plan for Research == | == Plan for Research == | ||
[[Research Template|Research templates]] are available for community members to use and edit. <span id="understanding-the-topic-or-tasks"></span> | |||
<span id="understanding-the-topic-or-tasks"></span> | |||
=== Understanding the Topic or Tasks === | === Understanding the Topic or Tasks === | ||
Line 33: | Line 31: | ||
* '''Methods''': Choose appropriate data collection methods like surveys, web scraping, direct observation, or experiments. | * '''Methods''': Choose appropriate data collection methods like surveys, web scraping, direct observation, or experiments. | ||
* '''Tools''': Identify any software or tools required for collection, such as survey platforms or data logging equipment. | * '''Tools''': Identify any software or tools required for the collection, such as survey platforms or data logging equipment. | ||
* '''Ethical Considerations''': Address ethical implications, especially for human subjects, ensuring consent or ethics board approval if needed. | * '''Ethical Considerations''': Address ethical implications, especially for human subjects, ensuring consent or ethics board approval if needed. | ||
Line 42: | Line 40: | ||
* Alternative Hypothesis: "The content shows significant signs of being AI-generated." | * Alternative Hypothesis: "The content shows significant signs of being AI-generated." | ||
Structured Analytical Techniques (SATs), such as Analysis of Competing Hypotheses (ACH) and Key Assumptions Check (KAC), | Structured Analytical Techniques (SATs), such as Analysis of Competing Hypotheses (ACH) and Key Assumptions Check (KAC), help refine hypotheses. Use the [[Structured Analytic Techniques|SATs wiki page]] to guide planning, brainstorming, data collection, and analysis. | ||
<span id="prepare-for-research"></span> | <span id="prepare-for-research"></span> | ||
Line 56: | Line 54: | ||
=== Ensuring Data Quality === | === Ensuring Data Quality === | ||
* '''Pilot Testing''': Conduct trial runs to ensure reliability and validity of data collection methods. | * '''Pilot Testing''': Conduct trial runs to ensure the reliability and validity of data collection methods. | ||
* '''Training Data Collectors''': Train team members to minimize errors and ensure consistency. | * '''Training Data Collectors''': Train team members to minimize errors and ensure consistency. | ||
* '''Standardizing Data Entry''': Create a standardized format for data entry to streamline processing and analysis. | * '''Standardizing Data Entry''': Create a standardized format for data entry to streamline processing and analysis. | ||
Line 63: | Line 61: | ||
=== Data Management Plan === | === Data Management Plan === | ||
* '''Data Storage''': Establish secure storage solutions | * '''Data Storage''': Establish secure storage solutions accessible for analysis while respecting ethical considerations. | ||
* '''Data Processing Procedures''': Define how data will be cleaned and prepared for analysis, including how to handle missing data. | * '''Data Processing Procedures''': Define how data will be cleaned and prepared for analysis, including how to handle missing data. | ||
* '''Version Control''': Implement a version control system for datasets to manage updates and collaboration. | * '''Version Control''': Implement a version control system for datasets to manage updates and collaboration. | ||
Line 82: | Line 80: | ||
==== Virtual Machine for Research ==== | ==== Virtual Machine for Research ==== | ||
Virtual Machines or containerization improve security and privacy by isolating the research environment from the host system. See [[ | Virtual Machines or containerization improve security and privacy by isolating the research environment from the host system. See [[Virtual Environments|Setting Up a Research Virtual Machine]] for more details. | ||
<span id="vpn-for-research"></span> | <span id="vpn-for-research"></span> | ||
==== Virtual Private Network (VPN) for Research ==== | ==== Virtual Private Network (VPN) for Research ==== | ||
A VPN can protect privacy while | A VPN can protect privacy while researching and help bypass website geographic restrictions. Check the [https://wiki.irregularchat.com/en/community/recommendations/vpn community VPN guide] to choose the right VPN for your research. | ||
<span id="kasm-virtual-environment"></span> | <span id="kasm-virtual-environment"></span> | ||
Line 98: | Line 96: | ||
Run the following checks before browsing to ensure privacy and security: | Run the following checks before browsing to ensure privacy and security: | ||
1. [https://dnsleaktest.com/ DNS / IP Leak Test] - Confirm your location. | 1. [https://dnsleaktest.com/ DNS / IP Leak Test] - Confirm your location. | ||
2. [https://coveryourtracks.eff.org/ Cover Your Tracks EFF] - Browser canvas check. | 2. [https://coveryourtracks.eff.org/ Cover Your Tracks EFF] - Browser canvas check. | ||
3. [https://www.grc.com/cookies/forensics.html Browser Cookie Tester] | 3. [https://www.grc.com/cookies/forensics.html Browser Cookie Tester] | ||
4. [https://inappbrowser.com/ InAppBrowser] | 4. [https://inappbrowser.com/ InAppBrowser] | ||
5. [https://canyoublockit.com/extreme-test/ AdBlock Test] - Ensure ads are blocked. | 5. [https://canyoublockit.com/extreme-test/ AdBlock Test] - Ensure ads are blocked. | ||
See the full [[dfp-guide|Digital Force Protection Guide]] for more detailed guidance. | |||
[[Category:Research]] | [[Category:Research]] |