Approaches to Data Sharing: An Analysis of NSF Data Management Plans from a Large Research University

Bishoff, Carolyn; Johnston, Lisa
April 2015
Journal of Librarianship & Scholarly Communication;2015, Vol. 3 Issue 2, p1
Academic Journal
INTRODUCTION Sharing digital research data is increasingly common, propelled by funding requirements, journal publishers, local campus policies, or community-driven expectations of more collaborative and interdisciplinary research environments. However, it is not well understood how researchers are addressing these expectations and whether they are transitioning from individualized practices to more thoughtful and potentially public approaches to data sharing that will enable reuse of their data. METHODS The University of Minnesota Libraries conducted a local opt-in study of data management plans (DMPs) included in funded National Science Foundation (NSF) grant proposals from January 2011 through June 2014. In order to understand the current data management and sharing practices of campus researchers, we solicited, coded, and analyzed 182 DMPs, accounting for 41% of the total number of plans available. RESULTS DMPs from seven colleges and academic units were included. The College of Science of Engineering accounted for 70% of the plans in our review. While 96% of DMPs mentioned data sharing, we found a variety of approaches for how PIs shared their data, where data was shared, the intended audiences for sharing, and practices for ensuring long-term reuse. CONCLUSION DMPs are useful tools to investigate researchers' current plans and philosophies for how research outputs might be shared. Plans and strategies for data sharing are inconsistent across this sample, and researchers need to better understand what kind of sharing constitutes public access. More intervention is needed to ensure that researchers implement the sharing provisions in their plans to the fullest extent possible. These findings will help academic libraries develop practical, targeted data services for researchers that aim to increase the impact of institutional research.


Related Articles

  • Conference Session Explores Multi-Domain MDM Implementation. Weldon, David // Information-management.com;11/7/2016, p1 

    Master data managemeent improves such data exchange between business functions. Governance with clear data ownership is critical, including well defined terms with business rules.

  • Russian Federation,Spain : SKOLKOVO and ANDALUSIA ink information exchange agreement.  // TendersInfo News;8/5/2014, p1 

    The article reports on an agreement signed by the Skolkovo Innovation Center in Russia and Spain's Parque Tecnologico de Andalucia (PTA) which aims at cooperation on exchanging information.

  • Study: automated, integrated electronic systems speed up justice system.  // East Bernard Express (TX);7/13/2006, Vol. 63 Issue 29, p6 

    Focuses on a study by Texas A&M University's Public Policy Research Institute which concluded that technology and better access to shared information could save Texas counties time and money in managing criminal cases. Focus of the research; Number of individuals detained by sites with greater...

  • Evaluation of Knowledge Management in an Organisation. Armaghan, Negar; Renaud, Jean // Journal of Information & Knowledge Management;Mar2017, Vol. 16 Issue 1, p-1 

    Implementation of Knowledge Management (KM) brings significant changes at various levels of an organisation. Knowledge sharing is one of the aspects that plays a significant role in the success of KM. This paper uses empirical research. It will analyse the applicability of KM as a new change in...

  • Tools For The Intelligence Community. Poletti, Matthew // Military Periscope Special Reports;10/30/2013, p1 

    The article features several products for intelligence analysts, including the GXP WebView from defence, security and aerospace company BAE Systems which is a web-based component of the company's GXP Xplorer geospatial data discovery and management tool, the SIBA information-sharing software...

  • Efficient Cryptographic Access Control Protocol for Sensitive Data Management. Xixi Yan; Tao Geng; Haiyang Ding // Journal of Computers;Jan2014, Vol. 9 Issue 1, p222 

    In view of sensitive data management, an efficient cryptographic access control scheme is proposed. Based on attribute-based encryption, the proposed scheme not only inherits flexibility and fine-grained access control for users, but also realizes cryptographic management for servers. In...

  • File Annotation and Sharing on Low end Devices in PAN. Jadhav, Megha B.; Patil, B. M. // International Journal of Computer Applications;Dec2013, Vol. 83, p28 

    Fast development in low end devices permits so many extra aspects including huge storage capacity, sharing of data, formation of network, etc. User can use these aspects very efficiently. When data size is limited searching a particular file can done easily but difficulty comes when data size...

  • A Knowledge Creation Innovation for Web-Knowledge-Base System Using Knowledge Management, and Data and Knowledge Engineering. Paokanta, Patcharaporn; Harnpornchai, Napat; Cecarelli, Michele // Proceedings of the European Conference on Knowledge Management;2014, Vol. 3, p1255 

    In the inference engine implementation of Knowledge Innovation such as Web-Knowledge-Based System (KBS), Data and Knowledge Engineering Technology (DKET) called Ensemble Learning is widely selected to manage and create the specific knowledge in both Tacit and Explicit knowledge. By the concept...

  • Knowledge Sharing Using web Mining for Categorization and Disambiguation of Structured and Unstructured Data. Ramos da Silva, Leandro; Omar, Nizam // Proceedings of the European Conference on Knowledge Management;2014, Vol. 3, p1265 

    A new battle in the knowledge sharing revolves around technologies for absorption, disambiguation and enrichment of entities from a variety of sources of structured and unstructured data. It is known then that there are for some time several technical approaches for integrating unstructured...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics