2011
DOI: 10.1002/meet.2011.14504801062
|View full text |Cite
|
Sign up to set email alerts
|

The Limits of sharing: Controlled data collections

Abstract: We investigated 24 web-based data repositories with "controlled collections" to determine why and how repositories control access to and use of data. We selected our sample of data repositories from across scholarly and scientific disciplines in order to investigate differences between fields. Using content analysis and surveys, we collected data about current repository policies and practices and underlying motivations for controlling data access and use. Looking across all disciplines, we found no overarchin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…All of these reasons for controlling access to data expressed by the volunteers were also expressed by professional researcher participants in Eschenfelder and Johnson's () study. The importance of intellectual property and ownership are emphasized by Borgman () and Pryor ().…”
Section: Resultsmentioning
confidence: 93%
“…All of these reasons for controlling access to data expressed by the volunteers were also expressed by professional researcher participants in Eschenfelder and Johnson's () study. The importance of intellectual property and ownership are emphasized by Borgman () and Pryor ().…”
Section: Resultsmentioning
confidence: 93%
“…Eschenfelder and Johnson [24] suggest more control for researchers over deposited data (see also [25][26][27][28][29][30][31][32]). According to some scholars, a priority right for publications, for example an embargo on data (e.g., [33]), would enable academic data sharing.…”
Section: Degree Of Controlmentioning
confidence: 99%
“…Furthermore, they were aware that sensitive data (such as the location of rare and endangered species) need protecting, and were not sure how the major repositories would manage this. The problem of possible misuse of data has been recognized in the literature (e.g., by Eschenfelder & Johnson, 2011).…”
Section: Discussionmentioning
confidence: 99%
“…The lack of acknowledgement and attribution of their data, which past contributors believed they had experienced, was also a deterrent to data sharing through large repositories. Issues connected to intellectual capital, ownership and intellectual property, and attribution are also discussed in the literature, in a broader context, (Borgman, 2006; Eschenfelder and Johnson, 2011; Pryor, 2009; Tenopir et al, 2011). A major consideration for sharing volunteer data, e.g., of individual observations or small datasets incorporated into larger ones, is that the individual sharer loses control of how the data are used, and who may use them once they are deposited, even if the individual datum is attributed.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation