[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

DriveGroups: Using Group Perspective for Usable Data Sharing in Research Collaborations

Published: 10 January 2025 Publication History

Abstract

Sharing data with collaborators is a complicated task that is nonetheless fundamental to academic research. We present the results of two studies investigating data sharing within academic scientific collaborations, as well as a system called DriveGroups designed to facilitate data sharing. First, we observed and interviewed 38 academic researchers engaged in collaborative research about their data sharing practices. We found that these researchers struggle to manage access to data, especially when different types of collaborators (e.g., students, co-principal investigators) require different access settings. In response, we built DriveGroups, a Google add-on designed to alleviate participant challenges with access control, and compared its usability to unmodified Google Drive. DriveGroups allows users to manage file access from two separate perspectives: 1) the traditional file perspective and 2) a role-based group perspective, which simplifies the data sharing process. DriveGroups matched or outperformed unmodified Google Drive in terms of usability, access control, and transparency, and will help scientists advance high-impact academic research.

References

[1]
Daniel Atkins. 2003. Revolutionizing Science and Engineering through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure. Technical Report. Natural Science Foundation.
[2]
Carl Auerbach and Louise B Silverstein. 2003. Qualitative Data: An Introduction to Coding and Analysis. Vol. 21. NYU press, New York, NY, USA.
[3]
Hugh Beyer and Karen Holtzblatt. 1998. Contextual Design: Defining Customer-centered Systems. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
[4]
Donna Bonde. 2013. Qualitative Interviews: When Enough Is Enough. Technical Report. Research by Design.
[5]
Christine L Borgman. 2010. Research Data: Who Will Share What, with Whom, When, and Why? Technical Report. RatSWD Working Paper.
[6]
Christine L Borgman. 2012. The Conundrum of Sharing Research Data. Journal of the American Society for Information Science and Technology, Vol. 63, 6 (2012), 1059--1078.
[7]
Christine L Borgman, Milena S Golshan, Ashley E Sands, Jillian C Wallis, Rebekah L Cummings, Peter T Darch, and Bernadette M Randles. 2016. Data Management in the Long Tail: Science, Software, and Service. International Journal of Digital Curation, Vol. 11, 1 (2016), 128--149.
[8]
Christine L Borgman, Jillian C Wallis, and Matthew S Mayernik. 2012. Who's Got the Data? Interdependencies in Science and Technology Collaborations. Computer Supported Cooperative Work (CSCW), Vol. 21, 6 (2012), 485--523.
[9]
John Brooke. 1995. SUS: A Quick and Dirty Usability Scale. Usability Eval. Ind., Vol. 189 (Nov. 1995), 4--7.
[10]
David L Buckeridge, Robin Mason, Ann Robertson, John Frank, Richard Glazier, Lorraine Purdon, Carl G Amrhein, Nita Chaudhuri, Esme Fuller-Thomson, Peter Gozdyra, David Hulchanski, Byron Moldofsky, Maureen Thompson, and Robert Wright. 2002. Making health data maps: a case study of a community/university research collaboration. Social Science & Medicine, Vol. 55, 7 (2002), 1189--1206. https://doi.org/10.1016/S0277--9536(01)00246--5
[11]
Asma Cherif. 2012. Access Control Models for Collaborative Applications. Ph.,D. Dissertation. Université de Lorraine.
[12]
Jean-Paul Chretien, Caitlin M Rivers, and Michael A Johansson. 2016. Make Data Sharing Routine to Prepare for Public Health Emergencies. PLoS medicine, Vol. 13, 8 (2016), e1002109.
[13]
Mick P Couper, Roger Tourangeau, Frederick G Conrad, and Eleanor Singer. 2006. Evaluating the Effectiveness of Visual Analog Scales: A Web Experiment. Social Science Computer Review, Vol. 24, 2 (2006), 227--245.
[14]
Melissa H Cragin, Carole L Palmer, Jacob R Carlson, and Michael Witt. 2010. Data Sharing, Small Science and Institutional Repositories. Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, Vol. 368, 1926 (2010), 4023--4038.
[15]
Robert Darby, Simon Lambert, Brian Matthews, Michael Wilson, Kathrin Gitmans, Suenje Dallmeier-Tiessen, Salvatore Mele, and Jari Suhonen. 2012. Enabling Scientific Data Sharing and Re-Use. In 2012 IEEE 8th International Conference on E-Science. IEEE, Washington, DC, USA, 1--8. https://doi.org/10.1109/eScience.2012.6404476
[16]
Devan Ray Donaldson and Joshua Wolfgang Koepke. 2022. A Focus Groups Study on Data Sharing and Research Data Management. Scientific Data, Vol. 9, 1 (2022), 345.
[17]
Dropbox Inc. 2021. Dropbox.
[18]
Clifford S Duke and John H Porter. 2013. The Ethics of Data Sharing and Reuse in Biology. BioScience, Vol. 63, 6 (2013), 483--489.
[19]
Paul Edwards, Matthew Mayernik, Archer Batcheller, Geoffrey Bowker, and Christine Borgman. 2011. Science Friction: Data, Metadata, and Collaboration. Social studies of science, Vol. 41 (10 2011), 667--90. https://doi.org/10.2307/41301955
[20]
Ixchel M Faniel and Trond E Jacobsen. 2010. Reusing Scientific Data: A Research Framework. Ann Arbor, Vol. 1001 (2010), 48109--1107.
[21]
Benedikt Fecher, Sascha Friesike, and Marcel Hebing. 2015. What Drives Academic Data Sharing? PloS one, Vol. 10, 2 (2015), e0118053.
[22]
Ana Sofia Figueiredo. 2017. Data Sharing: Convert Challenges into Opportunities. Frontiers in public health, Vol. 5 (2017), 327.
[23]
Bobby Lee Houtkoop, Chris Chambers, Malcolm Macleod, Dorothy VM Bishop, Thomas E Nichols, and Eric-Jan Wagenmakers. 2018. Data Sharing in Psychology: A Survey on Barriers and Preconditions. Advances in methods and practices in psychological science, Vol. 1, 1 (2018), 70--85.
[24]
Andreas Hueni, Jens Nieke, Juerg Schopfer, Mathias Kneubühler, and Klaus I Itten. 2009. The Spectral Database SPECCHIO for Improved Long-Term Usability and Data Sharing. Computers & Geosciences, Vol. 35, 3 (2009), 557--565. https://doi.org/10.1016/j.cageo.2008.03.015
[25]
Claudia-Lavinia Ignat. 2021. Large-Scale Trustworthy Distributed Collaboration. Authorization textbackslash `a to Direct Research. University textbackslash 'e of Lorraine.
[26]
Susan Ivey, Sophia Lafferty-Hess, Peace Ossom-Williamson, and Katie Barrick. 2023. Managing, Sharing, and Publishing Data. In Scholarly Communication Librarianship and Open Knowledge. Association of College and Research Libraries, Chicago, Illinois.
[27]
Jing Jin and Gail-Joon Ahn. 2006. Role-Based Access Management for Ad-Hoc Collaborative Sharing. In Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT '06). Association for Computing Machinery, New York, NY, USA, 200--209. https://doi.org/10.1145/1133058.1133086
[28]
Maritza Johnson, Steven Bellovin, Robert Reeder, and Stuart Schechter. 2009. Laissez-Faire File Sharing Access Control Designed for Individuals at the Endpoints. In Proceedings New Security Paradigms Workshop. ACM, Oxford, United Kingdom, 1--10. https://doi.org/10.1145/1719030.1719032
[29]
Stefanie K Johnson, Kenneth Bettenhausen, and Ellie Gibbons. 2009. Realities of Working in Virtual Teams: Affective and Attitudinal Outcomes of Using Computer-Mediated Communication. Small Group Research, Vol. 40, 6 (2009), 623--649.
[30]
Eunice Jun, Blue A. Jo, Nigini Oliveira, and Katharina Reinecke. 2018. Digestif: Promoting Science Communication in Online Experiments. In Proc. of the ACM on Human-Computer Interaction, Vol. 2 (CSCW). ACM, New York, NY, United States, 1--26.
[31]
Youngseek Kim, Benjamin K Addom, and Jeffrey M Stanton. 2011. Education for eScience Professionals: Integrating Data Curation and Cyberinfrastructure. International journal of digital curation, Vol. 6, 1 (2011), 125--138.
[32]
Laura Koesten, Emilia Kacprzak, Jeni Tennison, and Elena Simperl. 2019. Collaborative Practices with Structured Data: Do Tools Support What Users Need?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3290605.3300330
[33]
Ben Langmead and Abhinav Nellore. 2018. Cloud computing for genomic data analysis and collaboration. Nature Reviews Genetics, Vol. 19 (01 2018). https://doi.org/10.1038/nrg.2017.113
[34]
Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2010. Research Methods in Human-Computer Interaction. Wiley Publishing, Hoboken, NJ, United States.
[35]
Rahuman S Malik-Sheriff, Mihai Glont, Tung V N Nguyen, Krishna Tiwari, Matthew G Roberts, Ashley Xavier, Manh T Vu, Jinghao Men, Matthieu Maire, Sarubini Kananathan, Emma L Fairbanks, Johannes P Meyer, Chinmay Arankalle, Thawfeek M Varusai, Vincent Knight-Schrijver, Lu Li, Corina Due nas-Roca, Gaurhari Dass, Sarah M Keating, Young M Park, Nicola Buso, Nicolas Rodriguez, Michael Hucka, and Henning Hermjakob. 2020. BioModels--15 Years of Sharing Computational Models in Life Science. Nucleic Acids Research, Vol. 48, D1 (2020), D407--D415.
[36]
Yaoli Mao, Dakuo Wang, Michael Muller, Kush R. Varshney, Ioana Baldini, Casey Dugan, and Aleksandra Mojsilović. 2019. How Data Scientists Work Together With Domain Experts in Scientific Collaborations: To Find The Right Answer Or To Ask The Right Question? Proc. ACM Hum.-Comput. Interact., Vol. 3, GROUP (Dec. 2019), 237. https://doi.org/10.1145/3361118
[37]
Roy A. Maxion and Robert W. Reeder. 2005. Improving User-Interface Dependability through Mitigation of Human Error. International Journal of human-computer studies, Vol. 63, 1--2 (2005), 25--50.
[38]
William K. Michener. 2015. Ecological Data Sharing. Ecological Informatics, Vol. 29 (2015), 33--44. https://doi.org/10.1016/j.ecoinf.2015.06.010
[39]
Sarah Morrison-Smith, Christina Boucher, Andrea Bunt, and Jaime Ruiz. 2015. Elucidating the Role and Use of Bioinformatics Software in Life Science Research. In Proceedings of the 2015 British HCI Conference. ACM, Lincoln, Lincolnshire, United Kingdom, 230--238.
[40]
Gary M. Olson and Judith S. Olson. 2000. Distance Matters. Human-Computer Interaction, Vol. 15, 2 (Sept. 2000), 139--178. https://doi.org/10.1207/S15327051HCI1523_4
[41]
Judith S Olson and Gary M Olson. 2006. Bridging Distance: Empirical Studies of Distributed Teams. Human-Computer Interaction in Management Information Systems, Vol. 2 (2006), 27--30.
[42]
Reddit.com. 2023. AskScience: Got Questions? Get Answers.
[43]
Diana K Smetters and Nathan Good. 2009. How Users Use Access Control. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, Mountain View, California, USA, 15.
[44]
H. Subramonyam, S.M. Drucker, and E. Adar. 2019. Affinity Lens: Data-Assisted Affinity Diagramming with Augmented Reality. In Proc. of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, United States, 1--13.
[45]
Subrahmaniam Tangirala and Bradley J Alge. 2006. Reactions to Unfair Events in Computer-Mediated Groups: A Test of Uncertainty Management Theory. Organizational behavior and human decision processes, Vol. 100, 1 (2006), 1--20.
[46]
Leho Tedersoo, Rainer Küngas, Ester Oras, Kajar Köster, Helen Eenmaa, Äli Leijen, Margus Pedaste, Marju Raju, Anastasiya Astapova, Heli Lukner, Karin Kogermann, and Tuul Sepp. 2021. Data Sharing Practices and Data Availability upon Request Differ across Scientific Disciplines. Scientific Data, Vol. 8, 1 (July 2021), 192. https://doi.org/10.1038/s41597-021-00981-0
[47]
Anand Tripathi, Tanvir Ahmed, Richa Kumar, and Shremattie Jaman. 2020. A Coordination Model for Secure Collaboration. In Process Coordination and Ubiquitous Computing. CRC Press, Boca Raton, FL, United States, 77--95.
[48]
Anand R Tripathi, Tanvir Ahmed, and Richa Kumar. 2003. Specification of Secure Distributed Collaboration Systems. In The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003. IEEE, New York, NY, United States, 149--156.
[49]
Nancy A Van House, Mark H Butler, and Lisa R Schiff. 1998. Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets. In Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work. ACM, Seattle, Washington, USA, 335--343.
[50]
Theresa Velden. 2013. Explaining Field Differences in Openness and Sharing in Scientific Communities. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, San Antonio, Texas, USA, 445--458.
[51]
Janet Vertesi and Paul Dourish. 2011. The Value of Data: Considering the Context of Production in Data Economies. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW '11). Association for Computing Machinery, New York, NY, USA, 533--542. https://doi.org/10.1145/1958824.1958906
[52]
Jillian C Wallis, Elizabeth Rolando, and Christine L Borgman. 2013. If We Share Data, Will Anyone Use Them? Data Sharing and Reuse in the Long Tail of Science and Technology. PloS one, Vol. 8, 7 (2013), e67332.
[53]
Tara Whalen, Diana Smetters, and Elizabeth F. Churchill. 2006. User Experiences with Sharing and Access Control. In CHI'06 Extended Abstracts on Human Factors in Computing Systems. ACM, Montréal, Canada, 1517--1522.
[54]
Daniel Woodraska, Michael Sanford, and Dianxiang Xu. 2011. Security Mutation Testing of the FileZilla FTP Server. In Proceedings of the 2011 ACM Symposium on Applied Computing (SAC '11). Association for Computing Machinery, New York, NY, USA, 1425--1430. https://doi.org/10.1145/1982185.1982493
[55]
Liu Xia, Feng Chao-sheng, Yuan Ding, and Wang Can. 2010. Design of Secure FTP System. In 2010 International Conference on Communications, Circuits and Systems (ICCCAS). IEEE, New York, NY, United States, 270--273. https://doi.org/10.1109/ICCCAS.2010.5582002
[56]
Tianyin Xu, Han Min Naing, Le Lu, and Yuanyuan Zhou. 2017. How Do System Administrators Resolve Access-Denied Issues in the Real World?. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, Denver, Colorado, USA, 348--361.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 9, Issue 1
GROUP
January 2025
938 pages
EISSN:2573-0142
DOI:10.1145/3712067
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 January 2025
Published in PACMHCI Volume 9, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data sharing
  2. role based access control
  3. systems
  4. usability

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 54
    Total Downloads
  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)54
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media