<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article article-type="research-article" xml:lang="EN" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">LIBER</journal-id>
<journal-title-group>
<journal-title>LIBER QUARTERLY</journal-title>
</journal-title-group>
<issn pub-type="epub">2213-056X</issn>
<publisher>
<publisher-name>Uopen Journals</publisher-name>
<publisher-loc>Utrecht, The Netherlands</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">lq.10215</article-id>
<article-id pub-id-type="doi">10.18352/lq.10215</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>The Development of a Research Data Policy at Wageningen University &#x0026; Research: Best Practices as a Framework</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">orcid.org/0000-0003-0354-3230</contrib-id>
<name>
<surname>van Zeeland</surname>
<given-names>Hilde</given-names>
</name>
<email>hilde.vanzeeland@wur.nl</email>
<xref ref-type="aff" rid="aff1"/>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">orcid.org/0000-0001-7465-9172</contrib-id>
<name>
<surname>Ringersma</surname>
<given-names>Jacquelijn</given-names>
</name>
<email>jacquelijn.ringersma@wur.nl</email>
<xref ref-type="aff" rid="aff1"/>
</contrib>
<aff id="aff1">Wageningen University and Research</aff>
</contrib-group>
<pub-date pub-type="epub">
<month>9</month>
<year>2017</year>
</pub-date>
<volume>27</volume>
<issue>1</issue>
<fpage>153</fpage>
<lpage>170</lpage>
<permissions>
<copyright-statement>Copyright 2017, The copyright of this article remains with the author</copyright-statement>
<copyright-year>2017</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. See <uri xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</uri>.</license-p>
</license>
</permissions>
<self-uri xlink:href="https://www.liberquarterly.eu/article/10.18352/lq.10215"/>
<abstract>
<p>The current case study describes the development of a Research Data Management policy at Wageningen University &#x0026; Research, the Netherlands. To develop this policy, an analysis was carried out of existing frameworks and principles on data management (such as the FAIR principles), as well as of the data management practices in the organisation. These practices were defined through interviews with research groups. Using criteria drawn from the existing frameworks and principles, certain research groups were identified as &#x2018;best-practices&#x2019;: cases where data management was meeting the most important data management criteria. These best-practices were then used to inform the RDM policy. This approach shows how engagement with researchers can not only provide insight into their data management practices and needs, but directly inform new policy guidelines.</p>
</abstract>
<kwd-group>
<kwd>research data management</kwd>
<kwd>policy</kwd>
<kwd>research data</kwd>
<kwd>data storage</kwd>
<kwd>data archiving</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1. Introduction</title>
<p>Over the last years, there has been a growing recognition that research data are of significant value. The importance of transparency, reuse, and verifiability of research data is often emphasised. Many funders encourage or demand researchers to critically plan their Research Data Management (RDM) at the start of a project, and to retain and possibly publish datasets once the research has been completed (e.g., <xref ref-type="bibr" rid="r10">European Commission, 2016</xref>). Publishers, too, are showing awareness of the value of data, asking or sometimes requiring authors to share the datasets underlying their publications (e.g., <xref ref-type="bibr" rid="r18">PLOS, 2017</xref>). Researchers recognise the value of RDM too, since it brings incentives of various kinds, such as efficiency of research, more societal impact, and increased chances of getting funding (<xref ref-type="bibr" rid="r12">Hoetink, Broekhoven, &#x0026; van den Hoogen, 2016</xref>). Overall, the scholarly landscape reflects a growing concern with making data FAIR: Findable, Accessible, Interoperable, and Reusable (<xref ref-type="bibr" rid="r24">Wilkinson et al., 2016</xref>).</p>
<p>To ensure that they meet the above-discussed requirements, and that their research data assets are safely guarded and fully exploited, more and more universities are implementing research data management policies. While data policies have been most prolific in the UK and Australia (<xref ref-type="bibr" rid="r20">Shearer, 2015</xref>), they have also been found to exist at 44&#x0025; and 41&#x0025; of North American and European universities, respectively (<xref ref-type="bibr" rid="r5">Briney, Goben, &#x0026; Zilinski, 2015</xref>; <xref ref-type="bibr" rid="r21">Tenopir et al., 2017</xref>).<xref ref-type="fn" rid="fn1">1</xref> Where policies are not yet in place, they are often planned or in the process of being established. Overviews of implemented data policies are provided and maintained by the Digital Curation Centre (DCC) for the UK (<xref ref-type="bibr" rid="r13">Horton &#x0026; DCC, 2016</xref>), the Australian National Data Service (ANDS) for Australia (<xref ref-type="bibr" rid="r2">ANDS, 2017a</xref>), and the National Coordination Point Research Data Management (LCRDM) for the Netherlands (<xref ref-type="bibr" rid="r16">LCRDM, 2017</xref>).</p>
<p>Data policy development has often been supported or even led by university libraries. <xref ref-type="bibr" rid="r21">Tenopir et al. (2017)</xref> report that two-thirds of the European libraries they surveyed is involved in the development or planning of policy related to research data. This key role of the library is not surprising, as libraries tend to already provide services on data-areas such as metadata and archiving. Moreover, libraries often have a central role in the organisation, collaborating with other departments such as IT Services, as well as being close to researchers (<xref ref-type="bibr" rid="r9">Erway, 2013</xref>).</p>
<p>Although there are some common themes that most data policies seem to cover (<xref ref-type="bibr" rid="r4">Berchum &#x0026; Grootveld, 2016</xref>; <xref ref-type="bibr" rid="r20">Shearer, 2015</xref>), there is great variation between the policies of different universities, and universities have taken different approaches to defining their policies (<xref ref-type="bibr" rid="r14">Jones, 2011</xref>). To provide policy makers with a starting point, several templates have been developed (<xref ref-type="bibr" rid="r1">ANDS, 2010</xref>; <xref ref-type="bibr" rid="r7">Budroni, S&#x00E1;nchez Sol&#x00ED;s, &#x0026; Traub, 2017</xref>; <xref ref-type="bibr" rid="r11">Hall, Corey, Mann, &#x0026; Wilson, n.d.</xref>). These model policy guidelines cover a set of important research data themes, such as data retention, ownership, and the responsibilities of stakeholders. Institutions can select and adapt these themes to suit their own context.</p>
<p>While such formats can certainly provide a useful basis, a final policy needs to meet the data practices and requirements of an organisation. Context-specific information such as available storage and archiving services need to be taken into account, together with the actual data management needs of researchers. There are tools available to help institutes with such assessments, such as the RDM Readiness Survey (<xref ref-type="bibr" rid="r17">LEARN, 2017</xref>), the RDM Capability Maturity Guide (<xref ref-type="bibr" rid="r3">ANDS, 2017b</xref>), and the Data Asset Framework developed by the University of Glasgow and the DCC (<ext-link ext-link-type="uri" xlink:href="http://www.data-audit.eu/">http://www.data-audit.eu/</ext-link>). These resources help to identify which services are in place and which ones might need further development. While these tools are not developed to inform data management policies per se, they can provide information that is key to RDM policy development, such as the data assets present and the storage/archival practices used.</p>
<p>To get such information first-hand, universities often approach researchers directly. One example is the Monash University in Australia, which engaged their researchers in the framing of an overall RDM strategy, including a policy. This engagement gave the policy makers valuable information about data practices, and simultaneously allowed them to communicate the benefits of good research data management, minimising the sense of risk and compliance that often comes with RDM policies (<xref ref-type="bibr" rid="r15">Jones, 2013</xref>). The University of Leiden in The Netherlands also actively involved research staff in the creation of their policy (<xref ref-type="bibr" rid="r22">Verhaar, Schoots, Sesink, &#x0026; Frederiks, 2017</xref>). They did so not only to ensure that researchers could comment on the policy, but also to create a sense of support amongst them. In the UK, the Universities of Southampton and Surrey have used surveys and interviews with researchers to set up their RDM strategies. As argued by <xref ref-type="bibr" rid="r19">Rans and Jones (2013)</xref>, such engagement offers a complete and accurate view of the data practices and needs in an organisation:</p>
<disp-quote>
<p><italic>&#x201C;It is essential that policies and strategies are developed with reference to the particular institutional context. In order to build up an accurate picture of this context it is necessary to engage in a period of requirements-gathering and analysis. You should be aware of the scale and nature of the data to be managed. By engaging with researchers you can understand the key RDM issues they face and identify any gaps in infrastructure and desired support.&#x201D;</italic> (<xref ref-type="bibr" rid="r19">Rans &#x0026; Jones, 2013</xref>, p. 4)</p>
</disp-quote>
<p>As will be discussed, the RDM policy at Wageningen University &#x0026; Research was also set up with the help of involvement with researchers. This approach was chosen not only to gain understanding of the existing data management practices, but mainly to identify certain &#x2018;best-practices&#x2019; in the organisation: use cases that can be considered exemplary in how they manage their research data. Such best-practices are highly informative in the definition of a RDM policy, for two reasons: (1) they outline how data should be managed, thus providing a basis for policy guidelines, and (2) they relate to the data management workflows of researchers, thereby providing concrete examples of how the established policy guidelines might work in practice. As will be discussed, these best-practices were identified through the assessment with certain criteria, which were set up with the help of existing regulations and frameworks on data management.</p>
</sec>
<sec id="s2">
<title>2. The Development of a New RDM Policy</title>
<sec id="s2a">
<title>2.1. Motivation for the New Policy</title>
<p>Wageningen University &#x0026; Research is an institution that constitutes a University and various National Research Institutes in the domains of natural sciences and life sciences. Wageningen University &#x0026; Research was the first university in the Netherlands to introduce a data policy in 2014. This policy, initially only meant for the University part of the organisation, states that all chair groups and all PhD students should have a Data Management Plan (DMP). The DMP must outline what data researchers collect and how they deal with issues such as storage, version control, archiving, and sharing. The philosophy behind this rather lean policy was the belief that once researchers would be thinking about how to manage their data, they would automatically put this data management in practice. In 2016, Academic Affairs evaluated the policy. They found that although most PhD students and chair groups indeed made a DMP, the actual implementation fell short. It was unclear whether researchers followed the practices they described in their DMPs, and what data management practices they used at all. Moreover, only a limited number of researchers archived their datasets. Academic Affairs realised that more insight and a more binding policy was needed. This was needed in particular with regards to where researchers stored their data during research and if, where and for how long they archived their datasets.</p>
<p>For this reason, Academic Affairs asked the existing Data Management Support unit<xref ref-type="fn" rid="fn2">2</xref> to advise them on guidelines for research data management. They requested an overview of which criteria should be met in terms of safety, accessibility, and findability. These criteria could then be translated into guidelines for an RDM policy. Data Management Support carried out this project between October and December 2016.</p>
<p>In its request for RDM criteria, Academic Affairs emphasised two things:</p>
<list list-type="order">
<list-item>
<p>The criteria should follow existing laws, guidelines and frameworks that apply to research data from Wageningen University &#x0026; Research.</p>
</list-item>
<list-item>
<p>The criteria should reflect the diversity of Wageningen University &#x0026; Research as an organisation, in terms of the characteristics of its research data.</p>
</list-item>
</list>
<p>Regarding the first, the sources identified as relevant were the national Archives Act (&#x2018;Archiefwet&#x2019;), the Netherlands Code of Conduct for Scientific Practice (<xref ref-type="bibr" rid="r23">VSNU, 2014</xref>), and the FAIR principles of data management (<xref ref-type="bibr" rid="r24">Wilkinson et al., 2016</xref>). To achieve the second, several research groups from the organisation were selected (hereafter referred to as &#x2018;use cases&#x2019;). Of these use cases, individual researchers or support staff were interviewed about their research data characteristics and management.</p>
<p>It is important to mention that the current project involved only a subset of data management aspects (data storing, archiving and registration). The final RDM policy will cover more aspects, such as research data ownership, which is a key concern in most institutional data policies (<xref ref-type="bibr" rid="r6">Briney, Goben, &#x0026; Zilinski, 2017</xref>). However, as these policy guidelines were set up in a separate project, the current article focuses only on the areas of data storage, archiving and registration. </p>
</sec>
<sec id="s2b">
<title>2.2. Defining the Criteria for Data Management</title>
<p>The entire project was framed around the two phases <italic>during research</italic> and <italic>after research,</italic> with data storage taking place <italic>during</italic>, and data archiving and registration <italic>after research</italic> (<xref ref-type="table" rid="tb001">Table 1</xref>).</p>
<table-wrap id="tb001">
<label>Table 1:</label>
<caption><p>The phases and practices distinguished in the project, used as a basis to define the criteria and structure the interviews.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Phase</th>
<th valign="top" align="left">Practice</th>
<th valign="top" align="left">Definition</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">During research</td>
<td valign="top" align="left">Data storage</td>
<td valign="top" align="left">The storage of data while the research is being conducted, i.e. while data are being produced or collected (for reuse), analysed and/or processed, and prepared for publication.</td>
</tr>
<tr>
<td valign="top" align="left">After research</td>
<td valign="top" align="left">Data archiving</td>
<td valign="top" align="left">The long-term saving of data after the research has been completed, i.e. the archiving of data in a durable and searchable environment, possibly with access rights.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Data registration</td>
<td valign="top" align="left">The registration of an archived dataset in a Research Information System, and the establishment of links between datasets and the publication(s) they underlie. This allows researchers to showcase their work and facilitates the creation of publication reports.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>We specifically included data registration in the process. Data registration has various benefits for researchers: it allows them to produce evidence of published datasets, to indicate the links between their datasets and published articles or other output, and to make their datasets more findable. In addition, data registration enables chair groups to provide a full overview of their research output, and gives research institutes a means of showing that they take RDM seriously. Data registration is aimed at a future situation in which research data has become an integral part of the total research output.</p>
<p>To define criteria of data storage, it was analysed what criteria were followed by the IT storage systems at WUR and by the data storage system used at the University of Utrecht (received through personal communication). Together, this provided a list of criteria that data storage solutions might or might not meet. <xref ref-type="table" rid="tb002">Table 2</xref> gives examples of three criteria. <xref ref-type="table" rid="tb004">Appendix 1</xref> provides the entire list.</p>
<table-wrap id="tb002">
<label>Table 2:</label>
<caption><p>Examples of criteria defined for the storage, archiving and registration of research data.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Practice</th>
<th valign="top" align="left">Criteria</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Data storage</td>
<td valign="top" align="left">The storage solution allows the encryption of sensitive data files.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">The stored data is protected against physical access and disasters (e.g. fire), and has an emergency power system.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">The storage solution enables the sharing of data files.</td>
</tr>
<tr>
<td valign="top" align="left">Data archiving</td>
<td valign="top" align="left">The archive provides datasets with persistent identifiers.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">The archive provides metadata fields so that datasets can be described and found.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">The archive has a back-up and recovery system in place.</td>
</tr>
<tr>
<td valign="top" align="left">Data registration</td>
<td valign="top" align="left">The registration system allows the establishing of links between articles and datasets.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">It is possible to set up links between the datasets and other organizational records.</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">It is possible to provide URLs to the location of the datasets.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>All these were categorised as Must-have criteria (M). <xref ref-type="table" rid="tb004">Appendix 1</xref> provides the full list of criteria.</p>
</table-wrap-foot>
</table-wrap>
<p>For criteria of data archiving, the above-mentioned laws and frameworks were used. The national Archive Act, the National Code of Scientific Conduct, and the FAIR principles of data management all apply to the retention and findability of datasets, providing a set of criteria regarding the archiving of data. In addition, criteria were extracted of the Data Seal of Approval (<xref ref-type="bibr" rid="r8">DSA, 2017</xref>), a certification for trusted digital repositories. Together, these sources provided an extensive list of criteria that applied to archiving data after research. <xref ref-type="table" rid="tb002">Table 2</xref> again gives three criteria, and <xref ref-type="table" rid="tb004">Appendix 1</xref> provides the complete list.</p>
<p>Criteria also needed to be defined for the registration of datasets. This is a rather new area without established frameworks. To set up criteria, the possibilities offered by the output registration systems at Wageningen University &#x0026; Research and at the University of Amsterdam (personal communication) were used. Based on these, criteria of the registration of datasets were defined (see <xref ref-type="table" rid="tb002">Table 2</xref> and <xref ref-type="table" rid="tb004">Appendix 1</xref>).</p>
<p>Once all criteria were established, the MOSCOW-method was used. This is a technique in which requirements are categorised as Must-have, Should-have, Could-have, or Won&#x2019;t-have. All criteria were categorised as one of these four. The outcome of this was an overview of which criteria were considered crucial to follow in data storage, archiving and registration (Must-haves), and which were not. Criteria were mostly marked as Must-haves when they followed the law or the frameworks used (e.g. a criteria key to making data Findable according to the FAIR principles), although in some cases features were marked as Must-have based on the experience of Data Management Support staff. The Appendix provides an overview of the various criteria categorised using the MOSCOW-method.</p>
<p>This MOSCOW-step was an important one in the forming of the final criteria, because it clarified not only the criteria that might be met, but also their relative importance in this institutional context. The Must-haves and Should-haves in particular could be translated into guidelines for the RDM policy. Moreover, they provided a basis to evaluate the use cases&#x2019; practices, i.e. to explore to what extent these already aligned to the criteria set up (most importantly, the Must-have criteria).</p>
</sec>
<sec id="s2c">
<title>2.3. Comparing the Criteria to use Cases&#x2019; Data Management Practices</title>
<sec id="s2c1">
<title>2.3.1. Selecting use Cases</title>
<p>To ensure that the criteria and guidelines take into account the diverse data practices and needs in the organisation, staff members from various research groups were interviewed. Eight use cases were contacted that varied in terms of research domains, and in data characteristics such as expected dataset sizes and confidentiality levels. <xref ref-type="table" rid="tb003">Table 3</xref> shows an overview of the domains and foci of the use cases. The use cases came from both the university and the research institutes, with the majority (six) from the latter. One interview was conducted with each use case.</p>
<table-wrap id="tb003">
<label>Table 3:</label>
<caption><p>Research domain and type of the eight use cases interviewed.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Research domain</th>
<th valign="top" align="left">Type of research</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Food</td>
<td valign="top" align="left">Microbiology in horticulture</td>
</tr>
<tr>
<td valign="top" align="left">Plant</td>
<td valign="top" align="left">Molecular biology, genetics</td>
</tr>
<tr>
<td valign="top" align="left">Food</td>
<td valign="top" align="left">Consumer Science</td>
</tr>
<tr>
<td valign="top" align="left">Soil</td>
<td valign="top" align="left">Digital Soil Mapping</td>
</tr>
<tr>
<td valign="top" align="left">Animal</td>
<td valign="top" align="left">Genomics</td>
</tr>
<tr>
<td valign="top" align="left">Environmental</td>
<td valign="top" align="left">Risk assessment</td>
</tr>
<tr>
<td valign="top" align="left">Environmental</td>
<td valign="top" align="left">Software code development</td>
</tr>
<tr>
<td valign="top" align="left">Animal Sciences</td>
<td valign="top" align="left">Monitoring movements (high-speed cameras)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To assess if the pool of use cases indeed reflected this diversity, a separate analysis was carried out after completion of the interviews. A Research Data Management classification model was used for this, under development by the LCRDM (personal communication). This model distinguishes nine types of datasets of increasing complexity, based on five dimensions (the data&#x2019;s legal complexity, confidentiality level, lifetime span, value, and the number of disciplines it covers). The interview results indicated that the eight use cases covered eight of the nine categories. This confirms that the use cases work with datasets that vary widely, and that the interview data reflects the diversity of the organisation.</p>
</sec>
<sec id="s2c2">
<title>2.3.2 Preparing and Conducting the Interviews</title>
<p>Twenty-six interview questions were set up, covering aspects of data storage, archiving and registration practices (see <xref ref-type="table" rid="tb005">Appendix 2</xref>). The interview questions were based on the defined criteria, but did not go into technical details. For example, the criteria of whether a storage solution makes back-ups and allows access control, could be covered by the general question: &#x2018;Where do you store your data during the research?&#x2019; The researcher&#x2019;s answer to this question would suffice to asses if his/her data storage practices met the relevant criteria (e.g. if data was stored on the university&#x2019;s shared network drives, this would meet the criteria of back-ups and access control). This structured approach allowed us to mark whether each use case met the MOSCOW-criteria of data storage, archiving and registration.</p>
<p>The interviews lasted approximately one hour each. Most of the individuals interviewed were researchers, and in some cases, they also managed the data of their research group.</p>
</sec>
<sec id="s2c3">
<title>2.3.3. Interview Results</title>
<p>The interviews resulted in an overview of how the various MOSCOW-categorised criteria of storage, archiving and registration were (not) met by the various use cases. This article does not provide the results of individual use cases, as interviewees were not asked permission for this. Instead, this section presents the main findings.</p>
<p>In terms of storage, most of the use cases stored their research data on the institution&#x2019;s shared network drive or on servers at their own research unit (in some cases maintained by IT Services). These storage solutions meet almost all Must-have criteria. Some research groups used external storage solutions (e.g. USBs and hard drives), but most were conscious of the vulnerability of such storage, and therefore in the process of moving their data to other solutions. Some also used cloud storage, mostly to collaborate on data files.</p>
<p>Only two of the eight use cases had an established archiving protocol in place. They archived their datasets in domain-specific repositories that ensured the sustainability and findability of datasets. These repositories thereby followed the FAIR-principles. In all other use cases, researchers archived datasets only where this was explicitly requested by a journal or a financing body. Occasionally, researchers used the institutional network drives for long-term archiving. While this is a safe and durable storage environment, it does not provide data curation, nor does it allow other researchers to find and access the data files.</p>
<p>Only one of the eight use cases registered their datasets in the Research Output System. The researchers in this group realised the importance of making their datasets, and the links between their datasets and publications, visible. The lack of registration activities among the other use cases was often due to them not being familiar with the possibility of data registration. In other cases, researchers were aware of this, but hardly saw the additional value of registering their datasets because data citations are not rewarded like article citations are.</p>
<p>Finally, the interviews indicated that there was a great variation in the types of datasets that researchers worked with, in terms of both size and confidentiality level. While this was not a surprising find, it certainly emphasised that the policy guidelines should be applicable to a wide range of data types and needs.</p>
</sec>
</sec>
<sec id="s2d">
<title>2.4. Combining the Criteria and Interview Results to Inform Policy</title>
<p>As the aim was for the RDM policy guidelines to relate closely to data management practices in the organisation, the interview results were used as a framework wherever possible.<xref ref-type="fn" rid="fn3">3</xref></p>
<p>The guidelines for storage were built around the storage solutions used by the use cases. These were the organisation&#x2019;s network drives, external storage devices, servers managed within the research groups, and cloud storage services. Of these solutions, some (largely) met the Must-have and Should-have criteria, and could be marked as &#x2018;mandatory&#x2019; or &#x2018;allowed&#x2019; in the guidelines. This way, the best-practices directly informed the policy guidelines. Use cases also reported solutions that could not be marked as &#x2018;allowed&#x2019; or &#x2018;not allowed,&#x2019; for it was impossible to predict if individual services would meet the criteria. Cloud services, for example, differ in their safety and functionality. In these cases, the guidelines approve such solutions in case the individual service used meets a set of (Must-have) criteria. This way, the guidelines cover all general storage types mentioned in the interviews, thereby closely relating to researchers&#x2019; data management practices.</p>
<p>As two use cases reported a clear archiving protocol, the guidelines for data archiving were based on these two best-practices and on the pre-defined Must-have criteria for archiving (as listed in <xref ref-type="table" rid="tb004">Appendix 1</xref>). Following the criteria, the policy lists several possible archiving options that ensure that datasets are safely retained, findable and citable. As the two use cases archived their data at domain-specific repositories that met the FAIR-principles, the guidelines stipulate that such freely chosen archiving options are allowed if certain (Must-have) criteria are met.</p>
<p>With Wageningen University &#x0026; Research having a Research Information System in place, the only registration guideline to establish was the requirement to register archived datasets&#x2019; underlying publications. This should increase the findability of datasets (the F of the FAIR principles), and hopefully in the long term also enhance researchers&#x2019; perceived value of registering datasets as research output. The use case that already registered its datasets was a true best-practice, for they registered their datasets consistently, as an integrated part of their research workflow.</p>
<p>As explained, the interviews also uncovered a wide variety of dataset types, both in confidentiality level and in size (from large DNA sequencing files to considerably smaller Excel files with survey results). To address this variety, the policy provides guidelines for eight &#x2018;types&#x2019; of data files. These eight types are based on the four information confidentiality levels used by Wageningen University &#x0026; Research,<xref ref-type="fn" rid="fn4">4</xref> as well as on the distinction between large (&#x003E;2TB) versus small (&#x003C;2TB) datasets. This enables researchers to select storage and archiving solutions that are most appropriate considering the characteristics of their data.</p>
</sec>
</sec>
<sec id="s3">
<title>3. Discussion and Conclusion</title>
<p>While the above section has focused mainly on the factual information extracted during the interviews, the engagement with researchers has proven fruitful in other ways. For one, it has provided some insight into researchers&#x2019; familiarity with the data support services at the institution. This has indicated what aspects of our services are known (e.g. data storage), and which might need a little push in terms of visibility (e.g. data registration). When informing researchers about the policy in the future, the less familiar services might need highlighting. Another valuable experience has been to learn more about the general data management practices in different research groups. Besides the preset questions, various issues were discussed during the interviews, such as file synchronization, version control, and the use of laboratory notebooks. Engaging with researchers about these issues is key to staying up to date on their daily data management practices and, in turn, to provide them with the necessary support.</p>
<p>What truly helped in setting up the guidelines was to consider the diversity of the organisation from the start. Use cases differed in what data they kept in terms of format, size and confidentiality level, and in where they stored and archived their data. This indicated that the guidelines should be sufficiently general. The final guidelines therefore outline which solutions are allowed, while also approving other (group- or domain-specific) solutions if these meet the M-criteria.</p>
<p>Another decision made was to take the institutionally available storage and archiving solutions as a starting point. The use cases indicated that the available solutions largely met their needs: researchers either already managed their data using the available solutions, or they could if they were to transfer their data. The guidelines could therefore be set up quickly, as the infrastructure was in place. Simultaneously, the interviews indicated for which data types the existing solutions were <italic>not</italic> appropriate (secret and very large datasets). A follow-up project explores what solutions might be appropriate for these data types in particular. Once identified and implemented, these solutions will be added to the guidelines.</p>
<p>This article has discussed how use cases have helped us define a policy, but their contribution is certainly also valuable in the follow-up steps. At the moment, the use cases are interviewed again to assess if the established guidelines are achievable. The policy guidelines are compared to their current data management practices, and any gaps encountered are bridged (e.g. datasets are registered to meet the guidelines). This is a highly useful follow-up step. It allows researchers to prepare themselves for the policy at an early stage, while it helps Research Data Management Support to focus and possibly expand our support services where needed. In doing so, the library&#x2019;s central role in the organisation is used to its advantage (<xref ref-type="bibr" rid="r9">Erway, 2013</xref>), working together with other departments such as IT and Legal services to ensure that the necessary support is established. Moreover, continuing the conversation is important for creating support among researchers and for ensuring that the guidelines are credible (<xref ref-type="bibr" rid="r19">Rans &#x0026; Jones, 2013</xref>; <xref ref-type="bibr" rid="r22">Verhaar et al., 2017</xref>). Credibility of the guidelines is likely enhanced due to them being built on best-practices in the organisation. Use cases that store their data on safe solutions, archive their data in trusted repositories following the FAIR principles, and/or consistently register their datasets, show other research groups how the guidelines can be followed in practice. In fact, if these best-practice use cases do not object, their data management practices will be used in communicating the new policy, serving as exemplars to other researchers.</p>
<p>Needless to say, the establishment of RDM policies takes time. It is a lengthy process of which defining the guidelines is only an initial step. Once in place, policies need to be integrated into researchers&#x2019; behaviour, accepted as part of their culture, and continuously reviewed and audited (<xref ref-type="bibr" rid="r3">ANDS, 2017b</xref>). However, as found at various universities (<xref ref-type="bibr" rid="r19">Rans &#x0026; Jones, 2013</xref>; <xref ref-type="bibr" rid="r22">Verhaar et al., 2017</xref>) engagement with researchers is helpful in the further roll-out of a policy. Thanks to having involved use cases in this study, Data Management Support has an established network to engage with, which should be beneficial in the next steps of policy communication, implementation, and support.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="r1"><mixed-citation>ANDS (2010). <italic>Outline of a research data management policy for Australian Universities/Institutions</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.ands.org.au/__data/assets/pdf_file/0004/382072/datamanagementpolicyoutline.pdf">http://www.ands.org.au/__data/assets/pdf_file/0004/382072/datamanagementpolicyoutline.pdf</ext-link>.</mixed-citation></ref>
<ref id="r2"><mixed-citation>ANDS (2017a). <italic>ANDS project registry.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="https://projects.ands.org.au/policy.php">https://projects.ands.org.au/policy.php</ext-link>.</mixed-citation></ref>
<ref id="r3"><mixed-citation>ANDS (2017b). <italic>Creating a data management framework</italic>. Retrieved from www.ands.org.au/guides/creating-a-data-management-framework.</mixed-citation></ref>
<ref id="r4"><mixed-citation>Berchum, M. van, &#x0026; Grootveld, M.J. (2016). Het beheren van onderzoeksdata. In <italic>Handboek Informatiewetenschap</italic>. [IV B 475]. Doetinchem: Vakmedianet.</mixed-citation></ref>
<ref id="r5"><mixed-citation>Briney, K., Goben, A., &#x0026; Zilinski, L. (2015). Do you have an institutional data policy? A review of the current landscape of library data services and institutional data policies. <italic>Journal of Librarianship and Scholarly Communication</italic>, <italic>3</italic>(2), 1&#x2013;25. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7710/2162-3309.1232">https://doi.org/10.7710/2162-3309.1232</ext-link>.</mixed-citation></ref>
<ref id="r6"><mixed-citation>Briney, K., Goben, A., &#x0026; Zilinski, L. (2017). Institutional, funder, and journal data policies. In L.R. Johnston (Ed.), <italic>Curating research data: Practical strategies for your digital repository</italic> (pp. 61&#x2013;78). Chicago: ACLR.</mixed-citation></ref>
<ref id="r7"><mixed-citation>Budroni, P., S&#x00E1;nchez Sol&#x00ED;s, B., &#x0026; Traub, I.D. (2017). Development of a model policy for RDM at Austrian research institutions. In <italic>LEARN toolkit of best practice for research data management</italic> (pp. 14&#x2013;18). <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14324/000.learn.03">https://doi.org/10.14324/000.learn.03</ext-link>.</mixed-citation></ref>
<ref id="r8"><mixed-citation>DSA (2017). <italic>Data seal of approval.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="https://www.datasealofapproval.org/en/">https://www.datasealofapproval.org/en/</ext-link>.</mixed-citation></ref>
<ref id="r9"><mixed-citation>Erway, R. (2013). <italic>Starting the conversation: university-wide research data management policy</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.oclc.org/content/dam/research/publications/library/2013/2013-08.pdf">http://www.oclc.org/content/dam/research/publications/library/2013/2013-08.pdf</ext-link>.</mixed-citation></ref>
<ref id="r10"><mixed-citation>European Commission (2016). <italic>H2020 Programme: Guidelines on FAIR data management in Horizon 2020.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="http://ec.europa.eu/research/participants/data/ref/h2020/grants_manual/hi/oa_pilot/h2020-hi-oa-data-mgt_en.pdf">http://ec.europa.eu/research/participants/data/ref/h2020/grants_manual/hi/oa_pilot/h2020-hi-oa-data-mgt_en.pdf</ext-link>.</mixed-citation></ref>
<ref id="r11"><mixed-citation>Hall, N., Corey, B., Mann, W., &#x0026; Wilson, T. (n.d.). <italic>Model language for research data management policies.</italic> Atlanta: ASERL &#x0026; SURA. Retrieved from <ext-link ext-link-type="uri" xlink:href="https://www.fosteropenscience.eu/content/model-language-research-data-management-policies">https://www.fosteropenscience.eu/content/model-language-research-data-management-policies</ext-link>.</mixed-citation></ref>
<ref id="r12"><mixed-citation>Hoetink, P., Broekhoven, M., &#x0026; van den Hoogen, H. (2016). <italic>Working towards incentives.</italic> [Powerpoint slides]. Retrieved from <ext-link ext-link-type="uri" xlink:href="https://surfdrive.surf.nl/files/index.php/s/StQkBXK2cbO2RFd/download?path&#x003D;&#x0025;2F&#x0026;files&#x003D;Sessie3-1-HenkvdH.pptx">https://surfdrive.surf.nl/files/index.php/s/StQkBXK2cbO2RFd/download?path&#x003D;&#x0025;2F&#x0026;files&#x003D;Sessie3-1-HenkvdH.pptx</ext-link>.</mixed-citation></ref>
<ref id="r13"><mixed-citation>Horton, L., &#x0026; DCC (2016). <italic>Overview of UK institution RDM policies</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.dcc.ac.uk/resources/policy-and-legal/institutional-data-policies">http://www.dcc.ac.uk/resources/policy-and-legal/institutional-data-policies</ext-link>.</mixed-citation></ref>
<ref id="r14"><mixed-citation>Jones, S. (2011). <italic>Research data policy briefing.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.dcc.ac.uk/sites/default/files/documents/resource/policy/DCC_policy_briefing_2011.pdf">http://www.dcc.ac.uk/sites/default/files/documents/resource/policy/DCC_policy_briefing_2011.pdf</ext-link>.</mixed-citation></ref>
<ref id="r15"><mixed-citation>Jones, S. (2013). <italic>Bringing it all together: a case study on the improvement of research data management at Monash University.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.dcc.ac.uk/resources/developing-rdm-services/improving-rdm-monash">http://www.dcc.ac.uk/resources/developing-rdm-services/improving-rdm-monash</ext-link>.</mixed-citation></ref>
<ref id="r16"><mixed-citation>LCRDM (2017). <italic>RDM bij universiteiten.</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="https://www.edugroepen.nl/sites/RDM_platform/RDMbijinstellingenn/RDMbijuniversiteiten.aspx">https://www.edugroepen.nl/sites/RDM_platform/RDMbijinstellingenn/RDMbijuniversiteiten.aspx</ext-link>.</mixed-citation></ref>
<ref id="r17"><mixed-citation>LEARN (2017). <italic>SURVEY: Is your institution ready for managing research data?</italic> Retrieved from <ext-link ext-link-type="uri" xlink:href="http://learn-rdm.eu/wp-content/uploads/LEARNSurvey.pdf">http://learn-rdm.eu/wp-content/uploads/LEARNSurvey.pdf</ext-link>.</mixed-citation></ref>
<ref id="r18"><mixed-citation>PLOS (2017). <italic>Data availability</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://journals.plos.org/plosone/s/data-availability">http://journals.plos.org/plosone/s/data-availability</ext-link>.</mixed-citation></ref>
<ref id="r19"><mixed-citation>Rans, J., &#x0026; Jones, S. (2013). <italic>RDM strategy: Moving from plans to action</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.dcc.ac.uk/resources/developing-rdm-services/rdm-strategy-moving-plans-action">http://www.dcc.ac.uk/resources/developing-rdm-services/rdm-strategy-moving-plans-action</ext-link>.</mixed-citation></ref>
<ref id="r20"><mixed-citation>Shearer, K. (2015). <italic>Comprehensive brief on research data management policies</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="https://portagenetwork.ca/wp-content/uploads/2016/03/Comprehensive-Brief-on-Research-Data-Management-Policies-2015.pdf">https://portagenetwork.ca/wp-content/uploads/2016/03/Comprehensive-Brief-on-Research-Data-Management-Policies-2015.pdf</ext-link>.</mixed-citation></ref>
<ref id="r21"><mixed-citation>Tenopir, C., Talja, S., Horstmann, W., Late, E., Hughes, D., Pollock, D., &#x2026; Allard, S. (2017). Research data services in European academic research libraries. <italic>LIBER Quarterly, 27</italic>(1), 23&#x2013;44. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18352/lq.10180">https://doi.org/10.18352/lq.10180</ext-link>.</mixed-citation></ref>
<ref id="r22"><mixed-citation>Verhaar, P., Schoots, F., Sesink, L., &#x0026; Frederiks, F. (2017). Fostering effective data management practices at Leiden university. <italic>LIBER Quarterly</italic>, <italic>27</italic>(1), 1&#x2013;22. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18352/lq.10185">https://doi.org/10.18352/lq.10185</ext-link>.</mixed-citation></ref>
<ref id="r23"><mixed-citation>VSNU (2014). <italic>The Netherlands code of conduct for scientific practice</italic>. Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.vsnu.nl/files/documenten/Domeinen/Onderzoek/The_Netherlands_Code_of_Conduct_for_Scientific_Practice_2012.pdf">http://www.vsnu.nl/files/documenten/Domeinen/Onderzoek/The_Netherlands_Code_of_Conduct_for_Scientific_Practice_2012.pdf</ext-link>.</mixed-citation></ref>
<ref id="r24"><mixed-citation>Wilkinson, M.D., Dumontier, M., Aalbersberg, I.J., Appleton, G., Axton, M., Baak, A., &#x2026; Mons, B. (2016). The FAIR Guiding Principles for scientific data management and stewardship. <italic>Scientific Data</italic>, <italic>3</italic>, 160018. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1038/sdata.2016.18">https://doi.org/10.1038/sdata.2016.18</ext-link>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn id="fn1"><p>Of the 44&#x0025; found by Briney et al. (2015) two-thirds concerned stand-alone data policies, and one third intellectual property policies mentioning data. Note also that this analysis covered 206 universities from the 2014 Carnegie list of universities with research activity classified as &#x2018;high&#x2019; or &#x2018;very high&#x2019;. Tenopir et al. (2017) surveyed 109 European university libraries (LIBER members) from 22 countries.</p></fn>
<fn id="fn2"><p>Data Management Support is a collaborative effort between the Library, the IT department, Document Management &#x0026; Logistics, and Corporate Governance &#x0026; Legal Services at Wageningen University &#x0026; Research.</p></fn>
<fn id="fn3"><p>At the time of writing, the policy has not been officially approved yet. For this reason, the guidelines provided here are general. Once approved and established, the policy will appear on the website of Wageningen University &#x0026; Research: <ext-link ext-link-type="uri" xlink:href="http://www.wur.nl/en">http://www.wur.nl/en</ext-link>.</p></fn>
<fn id="fn4"><p>These are: open (may be accessed by everybody), internal (may be accessed by students and staff from Wageningen University &#x0026; Research), confidential (may be accessed by a closed group), and secret (may be accessed by a select number of individuals, often data that is sensitive or has commercial value).</p></fn>
</fn-group>
<app-group>
<app>
<title>Appendix</title>
<table-wrap id="tb004">
<label>Appendix 1:</label>
<caption><p>Criteria for data storage, archiving and registration and whether these criteria were considered as Must-have, Should-have, Could-have, or Won&#x2019;t-have (MOSCOW).</p></caption>
<table>
<thead>
<tr>
<th valign="top" align="left">Criteria</th>
<th valign="top" align="left">MOSCOW</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Data storage</td>
<td valign="top" align="left"></td>
</tr>
<tr>
<td valign="top" align="left">No unauthorised access is possible.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">A string password policy is in place.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution allows the encryption of sensitive data files.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution has an access rights system, with user accounts, roles, and authentication.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The stored data is protected against physical access and disasters (e.g. fire), and has an emergency power system.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Data can be found back for one year if it is removed by accident (by a file bin, previous versioning, daily back-up that is kept for a longer period, etc.).</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Data can be recovered in case of a disaster (fire, flood, hardware crash, etc.).</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution allows virus scanning.</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution offers an availability guarantee of >99.5&#x0025;.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution can safely keep data of all four information confidentiality levels: open, internal, confidential, and secret.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution allows the storing of file sizes up to TBs.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The system can group data files visibly into collections (datasets, collections of datasets, etc.), and it must be possible to store a file in more than one collection.</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution enables the sharing of data files.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">It is possible for an administrator to give other individuals certain roles with rights.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Admins can link files to other users.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The storage solution provides a version control system.</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">The data are accessible from any operating system (Windows, Linux, Mac OS).</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The data are accessible from any smart device (Smartphone, Tablet).</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">The data can be accessed at any time.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The data can be accessed from anywhere.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">It is possible to do a full-text search of the content.</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">It is possible to work together on data files simultaneously.</td>
<td valign="top" align="left">W</td>
</tr>
<tr>
<td valign="top" align="left">Data archiving</td>
<td valign="top" align="left"></td>
</tr>
<tr>
<td valign="top" align="left">Preferred formats are: .pdf .txt .sgm(l) .xml .jpg .tif .wav .shp (and otehr ESRI) .csx .tab .nc (and .cdf).</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">File formats are migrated in case of obsoleteness.</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">A Linked Data format can be used.</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">Md5 type checksums are carried out on datafile and on metadatafile level, and replacements are made in case of degradation.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The archive has a back-up and recovery system in place.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The archive provides datasets with persistent identifiers.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">It is possible to establish links between datasets and publications.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Preservation time is at least 10 years.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The archive provides metadata fields so that datasets can be described and found.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Data documentation can be added to the dataset (a description of methods and techniques used to collect and analyse the data).</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Published data are indexed in Google (and in other search engines).</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">The archive provides metadata fields so that datasets can be described and found.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Restricted access to datasets with end user licence is possible.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The archive offers an access rights system, with user accounts, roles, and authentication.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">OAI harvesting of metadata is possible.</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">The archive is accurate, complete, authentic and reliable.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">The archive provides clear guidelines for data citation.</td>
<td valign="top" align="left">S</td>
</tr>
<tr>
<td valign="top" align="left">The archive shows the number of downloads of datasets.</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">The archive shows who downloaded which datasets.</td>
<td valign="top" align="left">C</td>
</tr>
<tr>
<td valign="top" align="left">Quality of data entry, data storage, and data processing is controled for.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Data registration</td>
<td valign="top" align="left"></td>
</tr>
<tr>
<td valign="top" align="left">The registration system allows the establishing of links between articles and datasets.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">It is possible to set up links between the datasets and other organizational records.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">It is possible to provide URLs to the location of the datasets.</td>
<td valign="top" align="left">M</td>
</tr>
<tr>
<td valign="top" align="left">Bibliographical metadata can be added to datasets.</td>
<td valign="top" align="left">M</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="tb005">
<label>Appendix 2:</label>
<caption><p>The interview questions used.</p></caption>
<table>
<thead>
<tr>
<th valign="top" align="left">Category</th>
<th valign="top" align="left">Question</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">General questions</td>
<td valign="top" align="left">What kind of research do you do?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">What kind of data do you work with (raw and analysed)?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">What file formats do you use for these data?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you work with sensitive data? If so, how do you deal with this (e.g. anonymisation)?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you use data of external sources? If so, have you made certain agreements as to how you can use this data?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">What is the confidentiality level of your data (open, internal, confidential, or secret)?</td>
</tr>
<tr>
<td valign="top" align="left">Storage of data</td>
<td valign="top" align="left">Where do you store your data? Is there a difference in the storage solution used for raw data, analysed data, and data of external sources? Do you store all the data that you generate/use?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">How much capacity do you need for storing your data, both during and after the research?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">How often do you make back-ups during the research? How and where do you do this?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">How long to you store data during the research (&#x2018;active data&#x2019;)?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">How long do you keep the data after the research has finished?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you ever destroy data after the research has finished? If so, how?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you also take the value of data into account when you decide on data storage, e.g. more back-ups or safer storage solutions for data that are more difficult to reproduce? If so, how?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Is it possible for other people to access and change the data after the research has finished? If so, how?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you ever check the data during or after the research, to ensure that files are still in good condition? If so, how often and how do you do this?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">What kind of documentation, if any, do you add to your data?</td>
</tr>
<tr>
<td valign="top" align="left">Accessibility of data</td>
<td valign="top" align="left">How many people work on one dataset during the research? Do you also share data externally, or only internally?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">How does this sharing work (e.g. cloud storage, e-mail)?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you use metadata to describe datasets? If so, what kind (discipline-specific or general standards)?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Once the research has finished, do you save the data or metadata somewhere where other people can find them? If so, where? And are the data and/or metadata searchable there?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you want your data and/or metadata to be findable for everybody, or only researchers in your own discipline?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Are you ever asked to share your data with external parties? If so, how do you do this?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Do you use licences or other agreements when you share your data with others?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Who has ownership rights over the data? If you collaborate with other (commercial) organisations and/or countries, how does this influence ownership of the data?</td>
</tr>
<tr>
<td valign="top" align="left">General RDM support questions</td>
<td valign="top" align="left">Are there any data management practices that are going well, or not so well?</td>
</tr>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="left">Are you aware of the available data support provided by Wageningen University &#x0026; Research, i.e. in terms of data storage, archiving and registration? If so, how (if at all) do you use these services?</td>
</tr>
</tbody>
</table>
</table-wrap>
</app>
</app-group>
</back>
</article>