TY - CHAP
T1 - DATA MANAGEMENT PLANS
T2 - A Risk-Informed Approach
AU - Bolland, Keith
AU - Smyth, Bruce M.
AU - Nurmikko-Fuller, Terhi
N1 - Publisher Copyright:
© 2025 selection and editorial matter, Bruce M. Smyth, Michael A. Martin, and Mandy Downing; individual chapters, the contributors.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - Data are central to human research, and the integrity, security, and handling of data are each critical to the integrity, transparency, and reproducibility of research. They demand careful custodianship and care, and these matters must not be left to chance. But how should data be properly managed? What are data management plans (DMPs) and why are they important—if at all? Should an existing template be used or is it best to develop a bespoke DMP from scratch? What are the essential elements of these plans? What is the best way to develop a DMP? We address these questions by drawing on both the DMP and risk assessment literature. Our central argument is that while a multitude of templates and tools exist, a one-size-fits-all approach works against DMPs that are practical, useful, and user-friendly—and most importantly, not onerous. We propose an approach for mapping research designs onto DMPs that draws on ‘threat modelling’ as practised by information security professionals.
AB - Data are central to human research, and the integrity, security, and handling of data are each critical to the integrity, transparency, and reproducibility of research. They demand careful custodianship and care, and these matters must not be left to chance. But how should data be properly managed? What are data management plans (DMPs) and why are they important—if at all? Should an existing template be used or is it best to develop a bespoke DMP from scratch? What are the essential elements of these plans? What is the best way to develop a DMP? We address these questions by drawing on both the DMP and risk assessment literature. Our central argument is that while a multitude of templates and tools exist, a one-size-fits-all approach works against DMPs that are practical, useful, and user-friendly—and most importantly, not onerous. We propose an approach for mapping research designs onto DMPs that draws on ‘threat modelling’ as practised by information security professionals.
UR - http://www.scopus.com/inward/record.url?scp=85210701797&partnerID=8YFLogxK
U2 - 10.4324/9781003319733-39
DO - 10.4324/9781003319733-39
M3 - Chapter
AN - SCOPUS:85210701797
SN - 9781003319733
SP - 386
EP - 398
BT - The Routledge Handbook of Human Research Ethics and Integrity in Australia
PB - Taylor and Francis
ER -