Beyond the Pipeline: Abolitionist Readings on Schooling in the Carceral State

As the movement on the ground gains momentum and many cities and districts demand #PoliceFreeSchools, I’m seeing a lot interest in trying to understanding the so-called School-to-Prison Pipeline (STPP)- the mainstream term for how schools through the use of discipline, policing, and security practices “pushout” students towards incarceration.

STPP is a concise term for capturing this sort of dynamic, but precisely because it is so concise, it is also too narrow and fails to capture the scope and context of the issue. A better conception is to consider schools as an integral part of the broader carceral state. 

Here’s a list of readings by scholars who helped to show me this:


Unequal City: Race, Schools, and Perceptions of Injustice by Carla Shedd

Additional Work by Carla Shedd:

Countering the Carceral Continuum: The Legal of Mass Incarceration


First Strike: Educational Enclosures in Black Los Angeles by Damien M. Sojoyner (currently available online through August!)

Additional work by Damien M. Sojoyner:

Black Radicals Make for Bad Citizens: Undoing the Myth of the School to Prison Pipeline

CHAPTER THREE: Changing the Lens: Moving Away from the School to Prison Pipeline


Transformative Justice Journal has published essays about schooling through an abolitionist lens

Restorative Justice as a Doubled-Edged Sword: Conflating Restoration of Black Youth with Transformation of Schools by Arash Daneshzadeh and George Sirrakos


For the Children? Protecting Innocence in a Carceral State by Erica R. Meiners

Review of Right to Be Hostile: Schools, Prisons, and the Making of Public Enemies by Erica R. Meiners


Grad Student Beginner’s Guide to Restricted-Use Data

I decided to write down some steps for graduate students looking to work with restricted-use data, but not at a university or department offering dedicated secure data space or licenses to tack on to (because institutional memory is important!). My advisor was super helpful in walking me through the process, but this outline quick guide may be helpful to others, especially since this isn’t a topic you learn in any courses in graduate school.
There are two main steps to obtaining restricted-use data, which are:
1.) IRB approval at your university
2.) Restricted-use data application approval from the data source
The first step is to read about the IRB (Institutional Review Board) process and complete a CITI training, so that you understand the process and issues that arise in research ( As a researcher, you will renew this every three years. I actually found the history and ethical issues around Human Subjects Research in the training to be very interesting.
After that, some tips and steps:
1. Identify the research office on campus. Ask “Which office deals with Research Compliance and IRB approval?” Folks in this office can guide you to the necessary steps in getting your research approved and get rolling with your restricted-use data license.
2. Is your research human subjects research? If so, what category? To find this out, you will first file a Human Subjects Determination Form, or similar, with the research office (or equivalent).
3. After determining the category of your human subjects research, then you will begin the IRB approval process. This involves writing a protocol for your institution’s IRB that demonstrates why you need restricted-use data and how you will adhere to security protocols.
3. For your IRB protocol, collect all application materials from the data source and note the steps needed to complete them.
a. Do you need a computer security plan?
b. Do you need notarized signatures? Is a notary available in your department or on campus?
c. Does some portion of the application need to be completed by the Research office of your university?
4. Draft all of the relevant portions of your protocol for your records, and to be reviewed by your advisor. This includes:
a. Computer security plan
b. Outline of project and methods
c. Description of why restricted-use data is necessary for your project. Be clear and succinct in describing your research question, method, supporting literature, and why your project is a contribution in which analyzing the restricted-use data in necessary. This description is important, since reviewers from other fields may be reading your protocol, and you want to clearly communicate your project, especially to those less familiar with your specific research.
5. You will then submit your protocol for approval by the IRB. Once this is complete and approved, you will then complete the data license application from whichever restricted-use data source you are using (for example, the Institute of Education Sciences, Department of Labor, etc.) At this stage, the research office can assist with next steps if needed.
6. General advice: Ask around! Did your advisor or mentor previous use restricted-use data? Or another professor in your department, or another department? Ask for help about how the application process has gone for others.
7. More advice: When in doubt, just keep pestering and asking for help. In my experience, the bottleneck was finding physical space (i.e. a secure office space). But, asking and reminding proved very useful is finding a small, secure office space for using my data.
8. Helpful clarification: Many restricted-use data licenses require the applicant to hold a PhD, so you will need your advisor or professor to assist in your application. They will then specify you are a data user on the license agreement.
As a PhD student at a department without dedicated resources for secure data, it can feel like more “prestigious” programs have a leg up when it comes to accessing certain data. They do, but that should not deter you from a good research idea, and your advisors and professors are there to support you in pursuing that, especially if you are willing to put in the work of going through the license application process. I also look at it as a very good learning experience for when I apply for restricted-use data or similar research methods as an Assistant Professor, where I will once again have to learn the institutional processes and procedures.
Next steps after getting your data: PRINT THE USER MANUAL (if that feels feasible), find tutorials on your data, and look for replication code from others who have published with your data.

More writing about writing

I feel intrigued by this idea of “deep work” and limiting distractions, and the cognitive cost of those distractions. From experience in PhD world, it is certainly true that interruptions and distractions, including those tasks like email, can reduce work quality. But, I have also always found small “shallow work” to be important to start with as it builds momentum in the work process, sometimes. The tricky part though is to build that momentum and actually move into “deep work”:

I found this blog post about writing peer reviewed research to be very useful. The idea of building “deep work” writing into your schedule everyday has been really transformative for me in this dissertation process, and greatly reduced my anxiety around writing. I definitely went from binge writer to everyday writer in the past few years, or as this post puts it binge vs. incremental writing. Some days are just 30 minutes of “low hanging fruit” tasks like citations, writing a summary of a useful paper, etc, while other days are many hours of planning, writing, formatting, or doing metrics work. A research log is crucial- it is where I plan out my work, reflect on my work, log what I have completed, and look ahead. I also really like the advice of one paragraph per subject. It’s easy to get lost in academic writing, and spend several paragraphs just trying to prove you know one small particular thing, but being succinct usually means you actually understand what you are writing and can convey it simply:


Resources I’m reading on doing, presenting, and publishing research

How to publish applied economics papers

Take away points

  • Expect rejection, and rejection is okay!
  • Also expect to wait….
  • Know your journal, its aim and scope, who publishes and what is published
  • Craft not just good analysis, but also a good story
  • Place your research within the literature, filling a gap or expanding on an outstanding question
  • Sell your question, and answer
  • Write with style and flow
  • Dial in the elevator pitch, and turn this into your abstract and introduction
  • Don’t bury the question
  • Make tables and graphs readable, and meaningful
  • Focus on the question and the contribution
  • and look at the following……

The introduction formula

  • A good boiler plate model
  • Hook, question, antecedent, value-added, road-map

The conclusion formula 

  • Summary, limitations, relevance to policy, future research

How to give an applied micro talk 

  • Clear question
  • Preview the findings
  • THEN, go into detail, but spare the boring details about processing data
  • Present a clear and explicit model
  • …”no pauses unless you really want to stress something”
  • Use tables strategically
  • Practice!