Monday, November 13, 2017

The Impact of Incentives to Recruit and Retain Teachers in “Hard-to-Staff” Subjects | JPAM Featured Article

Public school teachers are typically paid according to their education level and years of experience, with no differentiation by subject. Given resistance among teachers and unions to explicit pay differentials, states and school districts have frequently sought to mitigate subject-specific shortages by enhancing non-salary compensation, such as educational subsidies. This study estimates the causal impact of loan forgiveness and bonuses on retention of teachers in Florida public schools.

PRINT PAGE

Session Recap: How to Protect Sensitive Data: Tools for Researchers and Programs

November 7, 2014 10:00 AM

By Liu Yi, Harvard University

With the fast development of information technology, we have become used to having access to different kinds of data. However, it becomes more and more important for people who are dealing with data in their daily life to pay more attention to data protection.

This session, led by Teresa Doksum and Sean Owen from Abt Associates, Inc., targeted how to protect sensitive data tools for researchers. The session was a workshop conducted in four parts.

Since it becomes easier to lose data (e.g. stolen/ lost laptop, audio recorder, external hard drive, thumb drive, etc.), researchers should use different kinds of technologies to protect their data. This is especially important because oftentimes, researchers collect personal information with the consent of interviewees. As such, it is essential for researchers and data collectors to make a data security plan.

Prior to this procedure, researchers should be familiar with all the common regulations related to this topic, keeping key points in mind when dealing with different parts of a project. The main components of this plan should include descriptions of data, lists of team members, descriptions of requirements per regulations, data use agreements, contracts, and data flow throughout the lifecycle. Meanwhile this plan should be updated and refined as needed.

Apart from the regulations on data protections, Doksum and Owens also gave several useful tips regarding tools for transfer and storage. They also compared different tools for both qualitative and quantitative research that gave participants a vivid map of how to select the best tool for a specific research.

Throughout the workshop, the audience posed several questions ranging from how to fully delete data to regulations instructions when facing different stakeholders in a research project.

Download the Data Plan Security Guide [PDF] and the workshop slidshow [PDF].

 

« Back

 
 
 
Association for Public Policy Analysis and Management (APPAM)
NEW ADDRESS! 1100 Vermont Avenue, NW, Suite 650 Washington, DC 20005
Phone: 202.496.0130 | Fax: 202.496.0134
Twitter Facebook LinkedIn Subscribe to me on YouTube

Home|About APPAM|Membership|Public Policy News|Conference & Events|Publications| Awards|Careers & Education|Members Only

Web site design and web site development by Americaneagle.com

© 2017 Association for Public Policy Analysis & Management. All Rights Reserved.
Site Map | Privacy Policy | Terms of Use | Events | Add Your Event