Journal of Memory

Journal of Memory

Journal of Memory – Data Archiving Permissions

Open Access & Peer-Reviewed

Submit Manuscript
DATA TRANSPARENCY

Data Archiving Permissions

JM encourages responsible data sharing to improve verification, reuse, and cumulative discovery in memory research.

Authors should describe access conditions clearly and protect participant confidentiality.

OA
DOI
Peer
Fast
Data
Global
What To Archive

Recommended data and materials

1

Primary datasets

Behavioral data, survey responses, or experimental measures.

2

Processed datasets

Cleaned datasets used for analysis and modeling.

3

Code and scripts

Analysis code, preprocessing scripts, or modeling files.

4

Protocols

Task protocols, stimuli, and procedure descriptions.

5

Data dictionaries

Variable definitions and coding guidance.

6

Supplementary outputs

Extended tables, sensitivity analyses, or validation results.

7

Stimulus sets

Validated stimulus sets or task materials.

8

Questionnaires

Instruments used for memory assessments.

Where To Deposit

Repository selection guidance

1

Discipline repositories

Use repositories aligned with neuroscience or psychology.

2

Institutional repositories

University repositories ensure long term access.

3

General repositories

Trusted general repositories can be used when no field option exists.

4

Clinical data platforms

Use secure platforms for sensitive participant data.

5

Embargo options

Embargoes may be used when justified by approvals.

6

Persistent identifiers

Ensure datasets have stable identifiers for citation.

7

Access statements

Clarify any restrictions or approvals required.

8

Licensing

State reuse terms clearly for datasets and code.

Best Practices

Signals of responsible sharing

De identificationAccess controlsData dictionariesVersioningRepository DOICode documentationEthics approvalsParticipant consentData use agreementsData citation
Privacy

Protect participant confidentiality

Remove direct identifiers and assess re identification risk before sharing datasets.

Access

Controlled access options

If data use agreements restrict sharing, describe the process for requesting access clearly.

Statements

Data availability summaries

Provide a data availability statement that names the repository or explains controlled access conditions.

Clear repository metadata improves reuse and reduces reviewer questions about data access.

Sensitive Data

Controlled access workflows

When data include sensitive health or neuropsychological information, describe how qualified researchers can request access and what documentation is required. Controlled access still supports transparency while protecting participants.

Documentation

Create reusable packages

Include a data dictionary, codebook, and readme file that explain variables, scoring, and preprocessing steps. Well documented datasets are easier to reuse and cite.

Quality Checks

Validate before deposit

Run checks for missing values, outliers, and internal consistency before archiving. Clear validation steps reduce reviewer queries and improve confidence in reuse.

Citation Practice

Make datasets citable

Include dataset DOIs in the manuscript and reference list so others can cite and track data reuse.

Consent Language

Plan for data reuse

Whenever possible, include consent language that permits controlled reuse while protecting participants.

Access Timelines

Set expectations

If access requires approval, describe typical response times so potential users understand the process.

File Formats

Use open formats

Prefer non proprietary formats such as CSV, TXT, or standard imaging formats to improve reuse.

Versioning

Label datasets clearly

Use version numbers that align with the analyses reported in the manuscript.

Responsible Sharing

Balance reuse and privacy

Memory research often involves sensitive cognitive or clinical data. Describe de identification steps, consent limits, and any access restrictions in a clear data availability statement. When data cannot be shared openly, provide a controlled access pathway so qualified researchers can request access. Responsible sharing improves trust, supports replication, and meets funder expectations while protecting participants.

Reuse

Enable future studies

Well documented datasets allow other researchers to verify findings, extend analyses, or include data in meta analyses. Clear documentation increases the value of your work.

Code Access

Share analysis scripts

When possible, include analysis scripts or notebooks with clear comments so others can reproduce key findings. If code cannot be shared, explain the restriction and provide enough detail to support verification.

Repository Notes

Clarify access rules

If access is restricted, include a brief description of required documentation and expected review time for requests.

Reuse Guidance

Describe limits

If secondary use is restricted, state the limits clearly and explain the approval process for qualified researchers.

Documentation

Add a readme file

A short readme helps others interpret datasets correctly.

Access

Describe approvals

State who approves data access requests and the expected response time.

Note

Cite repositories

Include repository identifiers in the references list.

Need Support From JM?

For policy, submission, or editorial questions, contact [email protected].