Data Sharing: Disclosure, Confidentiality, and Security

  • David J. DudeEmail author
  • Michelle A. MengelingEmail author
  • Catherine J. WelchEmail author

A primary mission of educational research is to champion excellence in education. Through the design of research that is generalizable and replicable and also through the successful implementation of research results, higher levels of learning, achievement, and performance for students can be obtained. Given this mission, data and information become essential resources to the success of such research. Data come in many forms—numeric, text, images, audio, and video—and are essential for the translation of research into knowledge, products, and procedures to improve education. Recognizing the costs, both monetary and time, of collecting and maintaining rich data, the concept of data sharing is often promoted with educational research. The sharing of data encourages diversity of analyses and perspectives, promotes new research, and makes possible the testing of new or alternative approaches and methods. Sieber (2006) supported the sharing of data and emphasized the value to secondary users who “can verify, refute, or refine original results, building upon those existing data, develop and test new theories, generalize or extend tentative findings and answer new empirical questions” (p. 48).

Yore and Boscolo (see Chap. 2) indicate that the US National Research Council (NRC) taskforce report Advancing Scientific Research in Education (US NRC, 2004) focused on ways to improve the quality of, and substantive foundation for, education research, which in part involved professional development of researchers and funding evaluation panels, and the ethics, structures and procedures for sharing data. Data sharing also promotes the extension and expansion of previous research and helps to facilitate the work of new researchers. The sharing of data permits the creation of new datasets when data from multiple sources can be combined to create an even richer dataset.


Data Sharing Match Rate American Educational Research Association Disclosure Risk File Transfer Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. American Educational Research Association. (2000). Ethical standards of the American Educational Research Association. Retrieved July 9, 2008, from AboutAERA/Default.aspx?menu_id = 90&id = 222
  2. American Educational Research Association. (2006). Standards for reporting on empirical social science research in AERA publications. Retrieved June 23, 2008, from uploadedFiles/Opportunities/StandardsforReportingEmpiricalSocialScience_PDF.pdf
  3. American Psychological Association. (2002). Ethical principles of psychologists and code of conduct. Retrieved May 31, 2008, from
  4. Associated Press. (2006a, June 21). Hacker breaks into USDA computer system; Personal data on 26,000 workers may be at risk. Retrieved July 9, 2008, from
  5. Associated Press. (2006b, July 1). Red Cross laptop with donor information stolen; Social Security numbers on computer, but officials say data is encrypted. Retrieved July 9, 2008, from
  6. Barrett, D. J., Byrnes, R. G.,&Silverman, R. E. (2005). SSH, the secure shell (2nd edn.). Sebastopol, CA: O'Reilly&Associates, Inc.Google Scholar
  7. Criteria for IRB approval of research, 45 CFR Part 46, § 46.111. (2007). Family educational rights and privacy act regulations, 34 CFR Part 99, § 1232g. (2006).Google Scholar
  8. Greenemeier, L. (2008, March 25). Security breach: Feds lose laptop containing sensitive data — again, Scientific American. Retrieved from = security-breach-lost-laptop.
  9. Joint Committee on Standards for Educational and Psychological Testing of the American Educational Research Association, American Psychological Association, and the National Council on Measurement in Education. (1999). Standards for educational and psychological testing (2nd edn.). Washington, DC: American Educational Research Association.O'Google Scholar
  10. Rourke, J. M., Roehrig, S., Heeringa, S. G., Reed, B. G., Birdsall, W. C., Overcashier, M., et al. (2006). Solving problems of disclosure risk while retaining key analytic uses of publicly released microdata. Journal of Empirical Research on Human Research Ethics, 1(3), 63––84.CrossRefGoogle Scholar
  11. Protection of human subjects, 45 CFR 46. (2005).Google Scholar
  12. Rescorla, E. (2000). SSL and TLS: Designing and building secure systems. Harlow, UK: Addison-Wesley Professional.Google Scholar
  13. Rodgers, W.,&Nolte, M. (2006). Solving problems of disclosure risk in an academic setting: Using a combination of restricted data and restricted access methods. Journal of Empirical Research on Human Research Ethics, 1(3), 85–98.CrossRefGoogle Scholar
  14. Rubin, D. B. (1987). Multiple imputation for nonresponse in surveys. New York: Wiley.Google Scholar
  15. Schafer, J. L. (1997). Analysis of incomplete multivariate data. London: Chapman&Hall.Google Scholar
  16. Sieber, J. E. (2006). Introduction: Data sharing and disclosure limitation techniques. Journal of Empirical Research on Human Research Ethics, 1(3), 47–50.CrossRefGoogle Scholar
  17. Sullivan, B. (2006, May 22). All veterans at risk of ID theft after data heist; Burglar reportedly took Veterans Affairs disk containing personal info. Retrieved July 9, 2008, from http://www.
  18. Tyson, A. S.,&Lee, C. (2006, June 7). Data theft affected most in military: National security concerns raised. The Washington Post, p. A01. Retrieved July 8, 2008, from http://www.washingtonpost. com/wp-dyn/content/article/2006/06/06/AR2006060601332.html
  19. United States Department of Education. (n.d.). Family educational rights and privacy act (FERPA). Retrieved July 21, 2008, from
  20. United States National Institutes of Health. (2008, March 24). Statement from Elizabeth G. Nabel, M.D., director of the National Heart, Lung, and Blood Institute (NHLBI), on a stolen NHLBI laptop computer [Press release]. Retrieved from GetPressRelease.aspx?id = 2559
  21. United States National Institutes of Health. (n.d.-a). Health Insurance Portability and Accountability Act (HIPAA) privacy rule: Information for researchers. Retrieved July 9, 2008, from http://
  22. United States National Institutes of Health. (n.d.-b). NIH data sharing policy. Retrieved July 9, 2008, from
  23. United States National Research Council. (2004). Advancing scientific research in education. Committee on Research in Education. L. Towne, L. L. Wise,&T. M. Winters (Eds.). Center for Education, Division of Behavioral and Social Sciences and Education. Washington, DC: The National Academies Press.Google Scholar
  24. Yen, H. (2006, June 22). Feds hit by rash of data breaches; FTC said Thursday that it had lost laptops containing sensitive data. Retrieved July 8, 2008, from
  25. Zarate, A. O.,&Zayatz, L. (2006). Essentials of the disclosure review process: A federal perspective. Journal of Empirical Research on Human Research Ethics, 1(3), 51–62.CrossRefGoogle Scholar

Copyright information

© Springer Science + Business Media B.V 2009

Authors and Affiliations

  1. 1.Iowa Testing ProgramsUniversity of IowaIowa CityUSA

Personalised recommendations