Making data look like it has come from a different source is called __________.

What does each and every research project need to get results? Data – or information – to help answer questions, understand a specific issue or test a hypothesis.

Researchers in the health and social sciences can obtain their data by getting it directly from the subjects they’re interested in. This data they collect is called primary data. Another type of data that may help researchers is the data that has already been gathered by someone else. This is called secondary data.

What are the advantages of using these two types of data? Which tends to take longer to process and which is more expensive? This column will help to explain the differences between primary and secondary data.

Primary data

An advantage of using primary data is that researchers are collecting information for the specific purposes of their study. In essence, the questions the researchers ask are tailored to elicit the data that will help them with their study. Researchers collect the data themselves, using surveys, interviews and direct observations.

In the field of workplace health research, for example, direct observations may involve a researcher watching people at work. The researcher could count and code the number of times she sees practices or behaviours relevant to her interest; e.g. instances of improper lifting posture or the number of hostile or disrespectful interactions workers engage in with clients and customers over a period of time.

To take another example, let’s say a research team wants to find out about workers’ experiences in return to work after a work-related injury. Part of the research may involve interviewing workers by telephone about how long they were off work and about their experiences with the return-to-work process. The workers’ answers–considered primary data–will provide the researchers with specific information about the return-to-work process; e.g. they may learn about the frequency of work accommodation offers, and the reasons some workers refused such offers.

Secondary data

There are several types of secondary data. They can include information from the national population census and other government information collected by Statistics Canada. One type of secondary data that’s used increasingly is administrative data. This term refers to data that is collected routinely as part of the day-to-day operations of an organization, institution or agency. There are any number of examples: motor vehicle registrations, hospital intake and discharge records, workers’ compensation claims records, and more.

Compared to primary data, secondary data tends to be readily available and inexpensive to obtain. In addition, administrative data tends to have large samples, because the data collection is comprehensive and routine. What’s more, administrative data (and many types of secondary data) are collected over a long period. That allows researchers to detect change over time.

Going back to the return-to-work study mentioned above, the researchers could also examine secondary data in addition to the information provided by their primary data (i.e. survey results). They could look at workers’ compensation lost-time claims data to determine the amount of time workers were receiving wage replacement benefits. With a combination of these two data sources, the researchers may be able to determine which factors predict a shorter work absence among injured workers. This information could then help improve return to work for other injured workers.

The type of data researchers choose can depend on many things including the research question, their budget, their skills and available resources. Based on these and other factors, they may choose to use primary data, secondary data–or both.

Source: At Work, Issue 82, Fall 2015: Institute for Work & Health, Toronto [This column updates a previous column describing the same term, originally published in 2008.]

A primary source is a first-hand or contemporary account of an event or topic. They are the most direct evidence of a time or event because they were created by people or things that were there at the time or event. These sources have not been modified by interpretation and offer original thought or new information. Primary sources are original materials, regardless of format.

Letters, diaries, minutes, photographs, artifacts, interviews, and sound or video recordings are examples of primary sources created as a time or event is occurring. Oral histories, newspaper or journal articles, and memoirs or autobiographies are examples of primary sources created after the event or time in question but offering first-hand accounts.

Making data look like it has come from a different source is called __________.

Primary sources may be transformed from their original format into a newer one, such as when materials are published or digitized, but the contents are still primary. There are many primary sources available online today, but many more are still available in their original format, in archives, museums, libraries, historical sites, and elsewhere.

Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address?

Spoofing Definition Spoofing is a technique through which a cybercriminal disguises themselves as a known or trusted source. Spoofing can take many forms, such as spoofed emails, IP spoofing, DNS Spoofing, GPS spoofing, website spoofing, and spoofed calls.

What is the term for malware that changes the way the operating system functions to avoid detection?

A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer's hardware and firmware.

What is software that records and reports activities of the user typically without their knowledge called?

Spyware is one type of malicious software (malware) that collects information from a computing system without your consent. Spyware can capture keystrokes, screenshots, authentication credentials, personal email addresses, web form data, internet usage habits, and other personal information.

Which term refers to a type of an attack where an attacker spoofs addresses and imposes their packets in the middle of an existing connection?

Which term refers to a type of an attack where an attacker spoofs addresses and imposes their packets in the middle of an existing connection? Man-in-the-middle attack.