Welcome to Day 5 of the Open Access Week Challenge!
Today’s activity will give you a quick introduction to strategies for managing and sharing research data.
In this part of the Open Access Week Challenge, you should expect to learn the following:
Research data management is the set of small, practical strategies you use to collect, organize, describe, analyze, and report the data for a particular project. The goal of research data management is to make it easier for you (the researcher) to find and use the data to answer your research questions. The good news is that good RDM practices also support research integrity, data sharing, and transparency.
For all research projects, the core practices are:
Good data practices are context-specific. The specific practices and standards for RDM can look very different between research fields (i.e., public health vs. analytical chemistry vs. anthropology). RDM strategies can even change for projects conducted by the same team. Because of those differences, there is not a single list of "best practices" that apply to all research. BUT there are some foundational practices that can be implemented in multiple ways so that they fit into the unique needs and workflows of all projects. To learn more, read the Open Access article:
Briney, K., Coates, H., & Goben, A. (2020). Foundational Practices of Research Data Management. Research Ideas and Outcomes, 6, e56508. https://doi.org/10.3897/rio.6.e56508
According to the Open Definition, “Open data and content can be freely used, modified, and shared by anyone for any purpose”
Most data shared in open access data repositories are mostly open, but are not fully open according to the Open Definition. For example, many data sets are shared with a Creative Commons license that requires the data source be attributed or cited. For now, data citation is essential for measuring the impact of data sharing and to give data creators credit for their contributions.
At the other end of the spectrum is restricted access data or data shared under controlled mechanisms. Usually, controlled access requires potential users to apply to get access to the data. The application can be brief or extensive, but is then reviewed by a group of experts such as a Steering Committee or Repository Curators/Managers. This process also typically involves some sort of agreement, such as a Data Use Agreement or Terms of Use, that describe what users can and cannot do with the data. These agreements are signed by University officials with signatory authority to make sure that all legal obligations can be met.
Finally, there are some data that cannot be shared due to lack of consent, association with classified government projects, etc.
Watch "Data Sharing & Management Snafu in 3 Short Acts"
https://www.youtube.com/watch?v=66oNv_DJuPc
Can you identify three things the dog researcher (not Dr. Benign) could do to improve how he manages and shares his research data next time?
If you are planning your thesis or dissertation project, start drafting a Data Management & Sharing plan and discuss the draft with your supervisor. The IU template for a living DMSP is available at https://datamanagement.iu.edu/governance/policies/rdm-guidance.html or you can try the DMPTool (log in with your IU account).