Skip to main content

Data Sharing: Disclosure, Confidentiality, and Security

  • Chapter
Quality Research in Literacy and Science Education

A primary mission of educational research is to champion excellence in education. Through the design of research that is generalizable and replicable and also through the successful implementation of research results, higher levels of learning, achievement, and performance for students can be obtained. Given this mission, data and information become essential resources to the success of such research. Data come in many forms—numeric, text, images, audio, and video—and are essential for the translation of research into knowledge, products, and procedures to improve education. Recognizing the costs, both monetary and time, of collecting and maintaining rich data, the concept of data sharing is often promoted with educational research. The sharing of data encourages diversity of analyses and perspectives, promotes new research, and makes possible the testing of new or alternative approaches and methods. Sieber (2006) supported the sharing of data and emphasized the value to secondary users who “can verify, refute, or refine original results, building upon those existing data, develop and test new theories, generalize or extend tentative findings and answer new empirical questions” (p. 48).

Yore and Boscolo (see Chap. 2) indicate that the US National Research Council (NRC) taskforce report Advancing Scientific Research in Education (US NRC, 2004) focused on ways to improve the quality of, and substantive foundation for, education research, which in part involved professional development of researchers and funding evaluation panels, and the ethics, structures and procedures for sharing data. Data sharing also promotes the extension and expansion of previous research and helps to facilitate the work of new researchers. The sharing of data permits the creation of new datasets when data from multiple sources can be combined to create an even richer dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • American Educational Research Association. (2000). Ethical standards of the American Educational Research Association. Retrieved July 9, 2008, from http://www.aera.net/ AboutAERA/Default.aspx?menu_id = 90&id = 222

  • American Educational Research Association. (2006). Standards for reporting on empirical social science research in AERA publications. Retrieved June 23, 2008, from https://www.aera.net/ uploadedFiles/Opportunities/StandardsforReportingEmpiricalSocialScience_PDF.pdf

  • American Psychological Association. (2002). Ethical principles of psychologists and code of conduct. Retrieved May 31, 2008, from http://www.apa.org/ethics/code2002.html

  • Associated Press. (2006a, June 21). Hacker breaks into USDA computer system; Personal data on 26,000 workers may be at risk. Retrieved July 9, 2008, from http://www.msnbc.msn.com/id/13470744/

  • Associated Press. (2006b, July 1). Red Cross laptop with donor information stolen; Social Security numbers on computer, but officials say data is encrypted. Retrieved July 9, 2008, from http://www.msnbc.msn.com/id/13657607/

  • Barrett, D. J., Byrnes, R. G.,&Silverman, R. E. (2005). SSH, the secure shell (2nd edn.). Sebastopol, CA: O'Reilly&Associates, Inc.

    Google Scholar 

  • Criteria for IRB approval of research, 45 CFR Part 46, § 46.111. (2007). Family educational rights and privacy act regulations, 34 CFR Part 99, § 1232g. (2006).

    Google Scholar 

  • Greenemeier, L. (2008, March 25). Security breach: Feds lose laptop containing sensitive data — again, Scientific American. Retrieved from http://www.sciam.com/article.cfm?id = security-breach-lost-laptop.

  • Joint Committee on Standards for Educational and Psychological Testing of the American Educational Research Association, American Psychological Association, and the National Council on Measurement in Education. (1999). Standards for educational and psychological testing (2nd edn.). Washington, DC: American Educational Research Association.O'

    Google Scholar 

  • Rourke, J. M., Roehrig, S., Heeringa, S. G., Reed, B. G., Birdsall, W. C., Overcashier, M., et al. (2006). Solving problems of disclosure risk while retaining key analytic uses of publicly released microdata. Journal of Empirical Research on Human Research Ethics, 1(3), 63––84.

    Article  Google Scholar 

  • Protection of human subjects, 45 CFR 46. (2005).

    Google Scholar 

  • Rescorla, E. (2000). SSL and TLS: Designing and building secure systems. Harlow, UK: Addison-Wesley Professional.

    Google Scholar 

  • Rodgers, W.,&Nolte, M. (2006). Solving problems of disclosure risk in an academic setting: Using a combination of restricted data and restricted access methods. Journal of Empirical Research on Human Research Ethics, 1(3), 85–98.

    Article  Google Scholar 

  • Rubin, D. B. (1987). Multiple imputation for nonresponse in surveys. New York: Wiley.

    Google Scholar 

  • Schafer, J. L. (1997). Analysis of incomplete multivariate data. London: Chapman&Hall.

    Google Scholar 

  • Sieber, J. E. (2006). Introduction: Data sharing and disclosure limitation techniques. Journal of Empirical Research on Human Research Ethics, 1(3), 47–50.

    Article  Google Scholar 

  • Sullivan, B. (2006, May 22). All veterans at risk of ID theft after data heist; Burglar reportedly took Veterans Affairs disk containing personal info. Retrieved July 9, 2008, from http://www. msnbc.msn.com/id/12916803/

  • Tyson, A. S.,&Lee, C. (2006, June 7). Data theft affected most in military: National security concerns raised. The Washington Post, p. A01. Retrieved July 8, 2008, from http://www.washingtonpost. com/wp-dyn/content/article/2006/06/06/AR2006060601332.html

  • United States Department of Education. (n.d.). Family educational rights and privacy act (FERPA). Retrieved July 21, 2008, from http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html

  • United States National Institutes of Health. (2008, March 24). Statement from Elizabeth G. Nabel, M.D., director of the National Heart, Lung, and Blood Institute (NHLBI), on a stolen NHLBI laptop computer [Press release]. Retrieved from http://public.nhlbi.nih.gov/newsroom/home/ GetPressRelease.aspx?id = 2559

  • United States National Institutes of Health. (n.d.-a). Health Insurance Portability and Accountability Act (HIPAA) privacy rule: Information for researchers. Retrieved July 9, 2008, from http:// privacyruleandresearch.nih.gov/

  • United States National Institutes of Health. (n.d.-b). NIH data sharing policy. Retrieved July 9, 2008, from http://grants2.nih.gov/grants/policy/data_sharing/

  • United States National Research Council. (2004). Advancing scientific research in education. Committee on Research in Education. L. Towne, L. L. Wise,&T. M. Winters (Eds.). Center for Education, Division of Behavioral and Social Sciences and Education. Washington, DC: The National Academies Press.

    Google Scholar 

  • Yen, H. (2006, June 22). Feds hit by rash of data breaches; FTC said Thursday that it had lost laptops containing sensitive data. Retrieved July 8, 2008, from http://www.msnbc.msn.com/id/13492060/

  • Zarate, A. O.,&Zayatz, L. (2006). Essentials of the disclosure review process: A federal perspective. Journal of Empirical Research on Human Research Ethics, 1(3), 51–62.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to David J. Dude , Michelle A. Mengeling or Catherine J. Welch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science + Business Media B.V

About this chapter

Cite this chapter

Dude, D.J., Mengeling, M.A., Welch, C.J. (2009). Data Sharing: Disclosure, Confidentiality, and Security. In: Shelley, M.C., Yore, L.D., Hand, B. (eds) Quality Research in Literacy and Science Education. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8427-0_25

Download citation

Publish with us

Policies and ethics