Data Archiving Permissions
JM encourages responsible data sharing to improve verification, reuse, and cumulative discovery in memory research.
Authors should describe access conditions clearly and protect participant confidentiality.
Recommended data and materials
Primary datasets
Behavioral data, survey responses, or experimental measures.
Processed datasets
Cleaned datasets used for analysis and modeling.
Code and scripts
Analysis code, preprocessing scripts, or modeling files.
Protocols
Task protocols, stimuli, and procedure descriptions.
Data dictionaries
Variable definitions and coding guidance.
Supplementary outputs
Extended tables, sensitivity analyses, or validation results.
Stimulus sets
Validated stimulus sets or task materials.
Questionnaires
Instruments used for memory assessments.
Repository selection guidance
Discipline repositories
Use repositories aligned with neuroscience or psychology.
Institutional repositories
University repositories ensure long term access.
General repositories
Trusted general repositories can be used when no field option exists.
Clinical data platforms
Use secure platforms for sensitive participant data.
Embargo options
Embargoes may be used when justified by approvals.
Persistent identifiers
Ensure datasets have stable identifiers for citation.
Access statements
Clarify any restrictions or approvals required.
Licensing
State reuse terms clearly for datasets and code.
Signals of responsible sharing
Protect participant confidentiality
Remove direct identifiers and assess re identification risk before sharing datasets.
Controlled access options
If data use agreements restrict sharing, describe the process for requesting access clearly.
Data availability summaries
Provide a data availability statement that names the repository or explains controlled access conditions.
Clear repository metadata improves reuse and reduces reviewer questions about data access.
Controlled access workflows
When data include sensitive health or neuropsychological information, describe how qualified researchers can request access and what documentation is required. Controlled access still supports transparency while protecting participants.
Create reusable packages
Include a data dictionary, codebook, and readme file that explain variables, scoring, and preprocessing steps. Well documented datasets are easier to reuse and cite.
Validate before deposit
Run checks for missing values, outliers, and internal consistency before archiving. Clear validation steps reduce reviewer queries and improve confidence in reuse.
Make datasets citable
Include dataset DOIs in the manuscript and reference list so others can cite and track data reuse.
Plan for data reuse
Whenever possible, include consent language that permits controlled reuse while protecting participants.
Set expectations
If access requires approval, describe typical response times so potential users understand the process.
Use open formats
Prefer non proprietary formats such as CSV, TXT, or standard imaging formats to improve reuse.
Label datasets clearly
Use version numbers that align with the analyses reported in the manuscript.
Balance reuse and privacy
Memory research often involves sensitive cognitive or clinical data. Describe de identification steps, consent limits, and any access restrictions in a clear data availability statement. When data cannot be shared openly, provide a controlled access pathway so qualified researchers can request access. Responsible sharing improves trust, supports replication, and meets funder expectations while protecting participants.
Enable future studies
Well documented datasets allow other researchers to verify findings, extend analyses, or include data in meta analyses. Clear documentation increases the value of your work.
Share analysis scripts
When possible, include analysis scripts or notebooks with clear comments so others can reproduce key findings. If code cannot be shared, explain the restriction and provide enough detail to support verification.
Clarify access rules
If access is restricted, include a brief description of required documentation and expected review time for requests.
Describe limits
If secondary use is restricted, state the limits clearly and explain the approval process for qualified researchers.
Add a readme file
A short readme helps others interpret datasets correctly.
Describe approvals
State who approves data access requests and the expected response time.
Cite repositories
Include repository identifiers in the references list.
Need Support From JM?
For policy, submission, or editorial questions, contact [email protected].