Using pedagogical and psychological insights to train analysts using confidential data
Main Article Content
Abstract
With researchers increasingly gaining access to confidentiality data through restricted environments, interest has grown in the training of those researchers to protect confidentiality and to use the secure facility effectively.
Researcher training, where it exists, often tends to focus on the ‘chalk-and-talk’ approach or its digital equivalent, the aim is to ensure that the researchers are informed of their legal obligations and so take responsibility for their actions. Although popular, there are multiple problems with this approach. First, it is of limited pedagogical effectiveness. Second, it assumes that information delivery is the purpose of the training. Third, it does not take account of attendees’ attitudes when attending the course. Fourth, it creates an ‘us and them’ barrier between trainers and trainees.
An alternative approach to training researchers has been in place in the UK since 2017. It uses good pedagogical practice to increase the effectiveness of training. It uses psychological models of behaviour and attitudes to engage attendees and shape future behaviours. The aim of the course is to build a shared sense of community and trust, rather than information delivery, in line with good data governance practice.
This paper describes the experience of designing and running the course. Multiple organisations and trainers were involved in design and delivery, improving feedback but creating its own problems in terms of trainers’ different preferences. Overall, the approach has been highly successful, and has become the model for other organisations. However, the model does place higher demands on the trainer than the traditional model.
We also briefly touch on how the move to online teaching in the pandemic has learned from the face-to-face experience.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright is retained by the authors. By submitting to this journal, the author(s) license the article under the Creative Commons License – Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0), unless choosing a more lenient license (for instance, public domain). For situations not allowed under CC BY-NC-ND, short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit, including © notice, is given to the source.
Authors of articles published by the journal grant the journal the right to store the articles in its databases for an unlimited period of time and to distribute and reproduce the articles electronically.
References
ADSS (2016) Data access strategy: final report. Australian Department of Social Services. https://uwe-repository.worktribe.com/output/908255
Alvermann, D. E., Smith, L. C., & Readence, J. E. (1985). Prior knowledge activation and the comprehension of compatible and incompatible text. Reading research quarterly, 420-436.
Anderson, J. R., Reder, L. M., & Simon, H. A. (1997). Situative versus cognitive perspectives: Form versus substance. Educational researcher, 26(1), 18-21.
Branch, W. T. (2015). Teaching professional and humanistic values: suggestion for a practical and theoretical model. Patient education and counseling, 98(2), 162-167.
Brandt, M., Franconi, L., Guerke, C., Hundepool, A., Lucarelli, M., Mol, J., Ritchie F., Seri G., and Welpton, R. (2010). Guidelines for the checking of output based on microdata research
Broadbent, D. E. (2013). Perception and communication. Elsevier.
Browning, S.L. (2014). Practitioner application. Journal of Healthcare Management, 59 (4), 303–304.
Canhoto, A. I., & Murphy, J. (2016). Learning from simulation design to develop better experiential learning initiatives: An integrative approach. Journal of Marketing Education, 38(2), 98-106.
Chevreau, F. R., Wybo, J. L., & Cauchois, D. (2006). Organizing learning processes on risks by using the bow-tie representation. Journal of hazardous materials, 130(3), 276-283.
Corti L., van den Eyden V., Bishop L. and Woolard M. (2019) Managing and Sharing Research Data: A Guide to Good Practice (2nd edition) Sage.
Dahl, A. J., Peltier, J. W., & Schibrowsky, J. A. (2018). Critical thinking and reflective learning in the marketing education literature: A historical perspective and future research needs. Journal of Marketing Education, 40(2), 101-116.
Dekker, S. W. (2009). Just culture: who gets to draw the line?. Cognition, Technology & Work, 11(3), 177-185.
Desai T. and Ritchie F. (2009) Effective researcher management. Paper presented at UNECE Worksession on Statistical Data Confidentiality 2009
Diamond, N., Koernig, S. K., & Iqbal, Z. (2008). Uniting active and deep learning to teach problem-solving skills: Strategic tools and the learning spiral. Journal of Marketing Education, 30(2), 116-129.
Drupsteen, L., & Hasle, P. (2014). Why do organizations not learn from incidents? Bottlenecks, causes and conditions for a failure to effectively learn. Accident Analysis & Prevention, 72, 351-358.
Evans, R. D., & Evans, G. E. (1989). Cognitive mechanisms in learning from metaphors. The Journal of experimental education, 58(1), 5-19.
Eysenck, M. W., & Eysenck, M. C. (1979). Processing depth, elaboration of encoding, memory stores, and expended processing capacity. Journal of Experimental Psychology: Human Learning and Memory, 5(5), 472.
Feinstein, A. H., Mann, S., & Corsun, D. L. (2002). Charting the experiential territory: Clarifying definitions and uses of computer simulation, games, and role play. Journal of Management Development.
Fitzpatrick, L., & McConnell, C. (2009). Student reading strategies and textbook use: An inquiry into economics and accounting courses. Research in Higher Education Journal, 3, 1.
French, W. L., & Bell, C. H. (1990). Orga ni za tion devel op ment (3rd ed.). Upper Sad dle River, NJ: Prentice-Hall.
Galavotti, I. (2019). Experience and Learning: Theoretical Perspectives and Effects on Strategic Decision-Making. In Experience and Learning in Corporate Acquisitions (pp. 41-90). Palgrave Macmillan, Cham.
Granitz, N. A. (2001). Active learning and morality: Incorporating greater meaning into marketing education. Marketing Education Review, 11, 25-41
Green, E., Ritchie F., Newman, J., & Parker, T. (2017, September). Lessons learned in training ‘safe users’ of confidential data. Paper presented at UNECE/Eurostat work session on statistical data confidentiality - 2017, Skopje, FYR Macedonia
Green, E., Ritchie, F., Tava, F., Ashford, W., & Ferrer Breda, P. (2021, July). The present and future of confidential microdata access: Post-workshop report. Presented at The Present and Future of Microdata Access
Green, E., & Ritchie, F. (2022) Training analysts in the management of confidential data. DRAGoN working paper no 2022/2. University of the West of England
Green E. Ritchie F. and Tilbrook A. (2022) Teaching researchers about data protection law: a terrible idea. DRAGoN blog.
Greene, L., & Burke, G. (2007). Beyond self-actualization. Journal of Health and Human Services Administration, 116-128.
Greeno, J. G., Collins, A. M., & Resnick, L. B. (1996). Cognition and learning. Handbook of educational psychology, 77, 15-46.
Hafner, H., Lenz, R., Ritchie, F., & Welpton, R. (2015, October). Evidence-based, context-sensitive, user-centred, risk-managed SDC planning: Designing data access solutions for scientific use. Paper presented at UNECE/Eurostat work session on statistical data confidentiality – 2015
Hovden, J., Størseth, F., & Tinmannsvik, R. K. (2011). Multilevel learning from accidents–Case studies in transport. Safety science, 49(1), 98-105.
Islam, M. H. (2015). Thorndike theory and it’s application in learning. At-Ta'lim: Jurnal Pendidikan, 1(1), 37-47.
Karns, G. L. (2006). Learning style differences in the perceived effectiveness of learning activities. Journal of Marketing Education, 28, 56-63.
Kim, T.-Y. & Kim, Y.-K. (2015). Elderly Korean learners’ participation in English learning through lifelong education: Focusing on motivation and demotivation. Educational Gerontology, 41 (2), 120–135.
Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Englewood Cliffs, N.J: Prentice-Hall.
Lewin K. (1951). Field Theory in Social Science. New York: Harper
Lundberg, J., Rollenhagen, C., Hollnagel, E., & Rankin, A. (2012). Strategies for dealing with resistance to recommendations from accident investigations. Accident Analysis & Prevention, 45, 455-467.
McNeill, D.N. (2015). Social freedom and self-actualization: ‘Normative Reconstruction’ as a theory of justice. Critical Horizons, 16 (2), 153–169.
Miner Jr, F. C., Das, H., & Gale, J. (1984). An investigation of the relative effectiveness of three diverse teaching methodologies. Organizational Behavior Teaching Review, 9(2), 49-59.
Mohrman, S. A., Cohen, S. G., & Morhman Jr, A. M. (1995). Designing team-based organizations: New forms for knowledge work. Jossey-Bass.
Oaker, G., & Brown, R. (1986). Intergroup relations in a hospital setting: A further test of social identity theory. Human Relations, 39(8), 767-778.
ONS (2019). Safe researcher training, canonical slide set. Office for National Statistics, September release. Available on request.
Pidgeon, N., & O'Leary, M. (2000). Man-made disasters: why technology and organizations (sometimes) fail. Safety science, 34(1-3), 15-30.
Ritchie F. (2008) Disclosure detection in research environments in practice. Paper presented at UNECE/Eurostat work session on statistical data confidentiality – 2007 pp 399-406
Ritchie F. (2017) The "Five Safes": A framework for planning, designing and evaluating data access solutions. Paper presented at Data for Policy 2017, London, UK
Ritchie F. (2021) Microdata access and privacy: What have we learned over twenty years?. Journal of Privacy and Confidentiality, 11(1), 1-8. https://doi.org/10.29012/jpc.766
Ritchie, F. (2022). 10 is the safest number that there's ever been. Transactions on data privacy, 15(2), 109-140
Ritchie F. and Smith J. (2018) Confidentiality and linked data. In G. Roarson (Ed.), Privacy and Data Confidentiality Methods – a National Statistician’s Quality Review, 1-34. Office for National Statistics
Ritchie F. and Welpton R. (2014) Addressing the human factor in data access: Incentive compatibility, legitimacy and cost-effectiveness in public data resources. UWE Department of Economics Working Paper. https://uwe-repository.worktribe.com/output/807316/
Sadler, D. R. (2010) Beyond Feedback: Developing student capability in complex appraisal. Assessment and Evaluation in Higher Education. 35 (5): pp 535-550.
Schunk, D. H. (1987). Self-efficacy and motivated learning. New directions in educational psychology, 2, 233-251.
Schunk, D. H. (1989). Self-efficacy and achievement behaviors. Educational psychology review, 1(3), 173-208.
Shuell, T. J. (1986). Cognitive conceptions of learning. Review of educational research, 56(4), 411-436.
Singer, S., & Diab, D. (2020). Ethics education: the impact of ethics training engagement on unethical decision-making in the workplace. International Journal of Ethics Education, 1-16.
Skinner, B.F. (1953). Science and human nature. NewYork: Macmillan.
Strickler, J. (2006). What really motivates people?. The Journal for Quality and Participation, 29(1), 26.
Tajfel, H. (1970). Experiments in intergroup discrimination. Scientific American 223, no. 2: 96–102.
Tajfel, H. and J.C. Turner. (1979). An integrative theory of intergroup conflict. In The social psychology of intergroup relations, ed. S. Worchel and W.G. Austin, 33–47. Chicago: Nelson-Hall.
Thagard, P. (1996). Cognitive science.
Thorndike, E. L. (1932). The fundamentals of learning.
Trewin D. (2007) Managing Statistical Confidentiality & Microdata Access; Principles and Guidelines of Good Practice. United Nations, Geneva. ISBN 13: 987-92-1-116959-1.
Turner, J. C., & Reynolds, K. J. (2010). The story of social identity. In Rediscovering social identity: Key readings. Psychology Press, Taylor & Francis.
Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., & Wetherell, M. S. (1987). Rediscovering the social group: A self-categorization theory. Basil Blackwell.
Wolfgang, C.H. (2001). Behavioural analysis. Solving discipline and classroom management problems, 5th Ed. P.21-49. Wiley/Jossey. Bass Education.
Yilmaz, K. (2011). The cognitive perspective on learning: Its theoretical underpinnings and implications for classroom practices. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 84(5), 204-212.
Zimmerman, B. J. (1995). Self-efficacy and educational development. Self-efficacy in changing societies, 1(1), 202-231.
Ziv, A. (1988). Teaching and learning with humor: Experiment and replication. The Journal of Experimental Education, 57(1), 4-15.