X Close

Open@UCL Blog

Home

Menu

Archive for February, 2025

Announcing: UCL’s first Replication Games

By Kirsty, on 17 February 2025

Registrations are now open for UCL’s first Replication Games, organised by the Office for Open Science & Scholarship and UCL’s UKRN local network chapter. The event will be run by the Institute for Replication (I4R), and it is supported by a Research Culture Seed Grant.

The Replication Games is a one-day event that brings together researchers to collaborate on reproducing and replicating papers published in highly regarded journals. Researchers participating in the Replication Games will join a small team of 3-5 members with similar research interests. Teams verify the reproducibility of a paper using its replication package. They may conduct sensitivity analysis, employing different procedures than the original investigators.  Teams may also recode the study using the raw or intermediate data or implement novel analyses with new data. More information can be found on I4R’s Website.

Teams will be guided in all activities by Derek Mikola, an experienced facilitator from the I4R. After the event, teams are encouraged to document their work in a report that will be published on the website of the I4R. Participants are also eligible to be granted co-authorship in a meta-paper that combines a large number of replications.

This event takes place in person. Lunch and afternoon snacks are provided.

Who are we inviting to register?

Registration is on a ‘first come, first serve’ basis. We invite MRes students, doctoral students and researchers, post-docs, and faculty members at UCL to apply. Although students and scholars from all disciplines can apply, we hope to attract especially those working in the social sciences and humanities.

Participants must be confident using at least one of the following: R, Python, Stata, or Matlab.

Papers available for replication are listed on the I4R website. Prospective participants are asked to review this list to ensure that at least one paper aligns with their research interests.

How to apply?

Please complete this short form: https://forms.office.com/e/WEUUKH2BvA

Timeline and Procedure

  • 15 March 25 – registrations close
  • 31 March 25 – notification of outcomes and teams
  • 7 April 25,  1pm – Mandatory Teams call with the I4R (online)
  • 25 April 25, 9am-5pm – Replication Games (at UCL’s Bloomsbury Campus)

Please note that participants are expected to attend the full day.

Contact

If you have any questions, please contact Sandy Schumann (s.schumann@ucl.ac.uk)

Archiving beyond data at UCL

By Kirsty, on 14 February 2025

Article written by Dr Christiana McMahon, UCL Research Data Management Team

As we discussed in the blog post on Wednesday, there are ways to share and be transparent about your research without compromising ethical or legal requirements. Did you know that the UCL Research Data Repository (RDR) is a great way for staff and research students to archive, preserve, promote and publish these outputs created as part of the research process?

Have you ever been asked to archive other types of research outputs? UCL has RPS for articles, but did you know that you can also archive and share other outputs of research? Be it a whole dataset, or other types of material supporting your research such as photos, models, software, presentation slides, your Data Management Plan, even a poster.

By using the RDR, you can get a permanent identifier for your work in the form of a DOI and add it to your ORCID. Additionally, as you publish items in the UCL Research Data Repository, these are automatically collated together on a data repository webpage just for you.

With over 580,000 downloads globally, we have published over 950 research outputs that have been viewed in over 180 countries, so start publishing today!

Need to write a data management plan?

By Kirsty, on 13 February 2025

Article written by Dr Christiana McMahon, UCL Research Data Management Team

Writing a data management plan can be difficult task to approach at the best of times. There are lots of things to consider, not just going through your project in detail, you may also need to consider external funding agency requirements, UCL’s research data expectations plus the FAIR data principles, well… advice from the Research Data Support Officers might be just what you need!

There is still plenty of time to get registered for one of the upcoming courses on how to write a data management plan! Book your place online today.

Data management plans (DMPs) describe your data management and sharing activities across the research data lifecycle and are a valuable document for you to refer to throughout your research project that can help you structure and protect your data for the long term. A fully completed DMP is usually 1-3 pages in length and can even be published as an output of your research. We recommend that they are written at the start of the research and are regularly reviewed and updated over the course of your research.

For more information on data management planning and how to get in touch with the team, visit our website.

Open research…yes; Open evidence…no?

By Kirsty, on 12 February 2025

Article written by Dr Christiana McMahon, UCL Research Data Management Team

“I want to share my data, but I can’t because…” is something we hear often.

Sometimes, it’s not possible to share evidence openly and that’s okay. Let’s take a closer look at what we can do to promote research findings and foster transparency and confidence in the research process

At UCL, staff and students are actively encouraged to share their research outputs openly with the wider academic and public communities. However, openly sharing the research evidence which underpins published findings might not always be possible as there could be ethical, legal or commercial reasons prohibiting you from doing so. Hence the phrase, “as open as possible, as closed as necessary”.

While you may not be able to share your data as an output, there are many other considerations. Can you be transparent about your processes? Can you tell others how you did the research so that they can replicate your methods? Have you considered ways to anonymise or share derived subsets of your data? What about your publications associated with your research, can they be open?

There are a huge amount of options available to you. Check out the Office for Open Science and Scholarship website for advice and support on engaging with open research principles even when the research evidence cannot be made publicly accessible.

Plus, easily access different teams across UCL helping you to engage with open research:

Whose data is it anyway? The importance of Information Governance in Research

By Kirsty, on 11 February 2025

Guest post by Preeti Matharu, Jack Hindley, Victor Olago, Angharad Green (ARC Research Data Stewards), in celebration of International Love Data Week 2025

Research data is a valuable yet vulnerable asset. Research data is a valuable yet vulnerable asset. Researchers collect and analyse large amounts of personal and sensitive data ranging from health records to survey responses, and this raises an important question – whose data is it anyway?

If data involve human subjects, then participants are the original owners of their personal data. They grant permission to researchers to collect and use their data through informed consent. Therefore, responsibility for managing and protecting their data, in line with legal, regulatory, ethical requirements, and policies lie with researchers and their institution. Hence, maintaining a balance between participant rights and researcher needs.

Under the General Data Protection Regulation (GDPR) in the UK and EU, participants have the right to access, update and request deletion of their data, whilst researchers must comply with the law to ensure research integrity. However, under the Data Protection Act, research data processed in the public interest must be retained irrespective of participant rights, including the rights to erase, access and rectify. UCL must uphold this requirement while ensuring participant confidentiality is not compromised.

Information governance consists of policies, procedures and processes adopted by UCL to ensure research data is managed securely and complies with legal and operational requirements.

Support for information governance in research is now provided by Data Stewards within ARC RDM IG. That’s a long acronym, let’s break it down.

  • ARC: Advanced Research Computing – UCL’s research innovative centre and provides 1. Secure digital infrastructure and 2. Teaching software.
  • RDM: Research Data Management – assist researchers with data management.
  • IG: Information governance – advise researchers on compliance for managing sensitive data.

Data Stewards – we support researchers with data management throughout the research study, provide guidance on data security awareness training, data security requirements for projects, and compliance with legal and regulatory standards, encompassing the Five Safes Framework principles. Additionally, we advise on sensitive data storage options, such as a Trusted Research Environment (TRE) or the Data Safe Haven (DSH).

Furthermore, we emphasise the importance of maintaining up-to-date and relevant documentation and provide guidance on FAIR (Findable, Accessible, Interoperable, Reusable) data principles.

As stated above, data can be vulnerable. UCL must implement strong security controls including encryption, access control and authentication, to protect sensitive data, such as personal health data and intellectual property. Sensitive data refers to data whose unauthorised disclosure could cause potential harm to participants or UCL.

UCL’s Information Security Management System (ISMS) is a systematic approach to managing sensitive research data to ensure confidentiality, integrity, and availability. It is a risk management process involving people, processes and IT systems. The key components include information management policy, identifying and assessing risks, implementing security controls to mitigate identified risks, training users and continuous monitoring. The ISMS is crucial in research:

  1. It protects sensitive data; without stringent security measures, data is at risk of being accessed by unauthorised individuals leading to potential theft.
  2. It ensures legal and regulatory compliance i.e. GDPR and UCL policies. Non-compliance results in hefty fines, legal action and reputational damage.
  3. Research ethics demand participant data is handled with confidentiality. The ISMS ensures data management practices, data anonymisation, and controlled access whilst reinforcing ethical responsibility.
  4. It reduces the risk of phishing attacks and ransomware.
  5. It ensures data integrity and reliability – tampered or corrupted data can lead to invalid research and waste of resources.

UCL practices for Information Governance in research:

In response to the question, whose data is it anyway? Data may be generated by participants, but the overall responsibility to use, process, protect, ethically manage lies upon the researchers and UCL. Additionally, beyond compliance and good information governance, it is about ensuring research integrity and safeguarding the participants who make research possible.

It’s International Love Data Week 2025!

By Kirsty, on 10 February 2025

In true UCL tradition, we kickstart the week with the annual Research Data Management review so take a look at our poster and see what we’ve been doing in the Library!

Ethics of Open Science: Managing dangers to scientists

By Kirsty, on 5 February 2025

Guest post by Ilan Kelman, Professor of Disasters and Health, building on his captivating presentation in Session 2 of the UCL Open Science Conference 2024.

Open Science brings potential dangers to scientists and ways of managing those dangers. In doing so, opportunities emerge to show the world the harm some people face, such as the murder of environmental activists and investigations of child sexual abuse, hopefully leading to positive action to counter these problems.

Yet risks can appear for scientists. Even doing basic climate change science has led to death threats. Two examples in this blog indicate how to manage dangers to scientists.

Disaster diplomacy

Disaster diplomacy research examines how and why disaster-related activities—before, during, and after a disaster—do and do not influence all forms of conflict and cooperation, ranging from open warfare to signing peace deals. So far, no example has been identified in which disaster-related activities, including a major calamity, led to entirely new and lasting conflict or cooperation. An underlying reason to favour enmity or amity is always found, with disaster-related activities being one reason among many to pursue already decided politics.

The 26 December 2004 tsunamis around the Indian Ocean devastated Sri Lanka and Aceh in Indonesia, both of which had been wracked by decades of violent conflict. On the basis of ongoing, secret negotiations which were spurred along by the post-earthquake/tsunami humanitarian effort, a peace deal was reached in Aceh and it held. Simultaneously in Sri Lanka, the disaster relief was deliberately used to continue the conflict which was eventually ended by military means. In both locations, the pre-existing desire for peace and conflict respectively produced the witnessed outcome.

This disaster diplomacy conclusion is the pattern for formal processes, such as politicians, diplomats, celebrities, businesses, non-governmental organisations, or media leading the work. It is less certain for informal approaches: individuals helping one another in times of need or travelling to ‘enemy states’ as tourists or workers—or as scientists.

Openly publishing on disaster diplomacy could influence conflict and cooperation processes by suggesting ideas which decision-makers might not have considered. Or it could spotlight negotiations which detractors seek to scuttle. If a scientist had published on the closed-door Aceh peace talks, the result might have emulated Sri Lanka. The scientist would then have endangered a country as well as themselves by being blamed for perpetuating the violence.

Imagine if South Korea’s President, seeking a back door to reconciliation with North Korea, sends to Pyongyang flood engineers and scientists who regularly update their work online. They make social gaffes, embarrassing South Korea, or are merely arrested and made scapegoats on the whim of North Korea’s leader who is fed up with the world seeing what North Korea lacks. The scientists and engineers are endangered as much as the reconciliation process.

Open Science brings disaster diplomacy opportunities by letting those involved know what has and has not worked. It can lead to situations in which scientists are placed at the peril of politics.

Figure 1: Looking across the Im Jin River into North Korea from South Korea (photo by Ilan Kelman).

Underworlds

Scientists study topics in which people are in danger, such as child soldiers, human trafficking, and political movements or sexualities that are illegal in the country being examined. The scientists can be threatened as much as the people being researched. In 2016, a PhD student based in the UK who was researching trade unions in Cairo was kidnapped, tortured, and murdered.

In 2014, a PhD student based in the UK was one of a group placed on trial in London for ‘place-hacking’ or ‘urban exploring’ (urbex), in which they enter or climb disused or under-construction infrastructure. Aside from potentially trespassing, these places are often closed for safety reasons. The scientist places themselves in danger to research this subculture on-site, in action.

All these risks are manageable and they are managed. Any such research in the UK must go through a rigorous research ethics approval process alongside a detailed risk assessment. This paperwork can take months, to ensure that the dangers have been considered and mitigated, although when conducted improperly, the process itself can be detrimental to research ethics.

Many urbex proponents offer lengthy safety advice and insist that activities be conducted legally. Nor should researchers necessarily shy away from hard subject matter because a government dislikes the work.

Open Science publishing on these topics can remain ethical by ensuring anonymity and confidentiality of sources as well as not publishing when the scientist is in a place where they could be in danger. This task is not always straightforward. Anonymity and confidentiality can protect criminals. Scientists might live and work in the country of research, so they cannot escape the danger. How ethical is it for a scientist to be involved in the illegal activities they are researching?

Figure 2: The Shard in London, a desirable  place for ‘urban exploring’ when it was under construction (photo by Ilan Kelman).

Caution, care, and balance

Balance is important between publishing Open Science on topics involving dangers and not putting scientists or others at unnecessary peril while pursuing the research and publication. Awareness of the potential drawbacks of doing the research and of suitable research ethics, risk assessments, and research monitoring can instil caution and care without compromising the scientific process or Open Science.