DATUM for Health » History » Version 18
Steve Welburn, 2012-11-13 12:50 PM
1 | 3 | Steve Welburn | h1. "DATUM for Health":http://www.northumbria.ac.uk/sd/academic/ceis/re/isrc/themes/rmarea/datum/health/materials/?view=Standard |
---|---|---|---|
2 | 1 | Steve Welburn | |
3 | 17 | Steve Welburn | {{toc}} |
4 | 15 | Steve Welburn | |
5 | 7 | Steve Welburn | Comprises 3 sessions: |
6 | 6 | Steve Welburn | * "Introduction":http://www.northumbria.ac.uk/sd/academic/ceis/re/isrc/themes/rmarea/datum/health/materials/session1/ to research data management |
7 | 6 | Steve Welburn | * Data curation "lifecycle":http://www.northumbria.ac.uk/sd/academic/ceis/re/isrc/themes/rmarea/datum/health/materials/session2/ |
8 | 1 | Steve Welburn | * Problems and practical "strategies and solutions":http://www.northumbria.ac.uk/sd/academic/ceis/re/isrc/themes/rmarea/datum/health/materials/session3/ |
9 | 7 | Steve Welburn | |
10 | 18 | Steve Welburn | * [[DATUM_for_Health#Session 1: Introduction To Data Management|Session 1: Introduction To Data Management]] |
11 | 18 | Steve Welburn | * [[DATUM_for_Health#Session 2: Data Curation Lifecycle|Session 2: Data Curation Lifecycle]] |
12 | 18 | Steve Welburn | * [[DATUM_for_Health#Session 3: Problems and practical strategies and solutions|Session 3: Problems and practical strategies and solutions]] |
13 | 18 | Steve Welburn | |
14 | 7 | Steve Welburn | Plus additional notes for: |
15 | 6 | Steve Welburn | * Data For Life - "Digital Preservation for Health Sciences":http://www.northumbria.ac.uk/sd/academic/ceis/re/isrc/themes/rmarea/datum/health/materials/session4/ |
16 | 8 | Steve Welburn | |
17 | 13 | Steve Welburn | Downloadable from "Jorum":http://dspace.jorum.ac.uk/xmlui/handle/123456789/15904 (CC-BY-NC-SA) |
18 | 12 | Steve Welburn | |
19 | 10 | Steve Welburn | h2. Session 1: Introduction To Data Management |
20 | 8 | Steve Welburn | |
21 | 9 | Steve Welburn | * What is research data ? |
22 | 9 | Steve Welburn | * Where is your research data ? |
23 | 9 | Steve Welburn | * Why manage research data |
24 | 8 | Steve Welburn | ** a requirement |
25 | 8 | Steve Welburn | ** to work effectively & efficiently |
26 | 8 | Steve Welburn | ** to protect it |
27 | 8 | Steve Welburn | ** for use and/or re-use |
28 | 8 | Steve Welburn | ** to share it |
29 | 8 | Steve Welburn | ** for preservation |
30 | 1 | Steve Welburn | ** because it is good research practice |
31 | 9 | Steve Welburn | * How to manage research data |
32 | 9 | Steve Welburn | * The research data lifecycle |
33 | 9 | Steve Welburn | ** Plan / Create / Analyse / Preserve / Share /Use (and repeat...) |
34 | 1 | Steve Welburn | * Creating a DMP |
35 | 10 | Steve Welburn | |
36 | 10 | Steve Welburn | h2. Session 2: Data Curation Lifecycle |
37 | 10 | Steve Welburn | |
38 | 10 | Steve Welburn | * What is data curation ? |
39 | 10 | Steve Welburn | * Why curate ? |
40 | 10 | Steve Welburn | ** Requirements |
41 | 10 | Steve Welburn | ** Rewards |
42 | 10 | Steve Welburn | * DCC Data Curation Lifecycle Model |
43 | 10 | Steve Welburn | ** Conceptualise - planning |
44 | 10 | Steve Welburn | ** Create - collection & analysis |
45 | 10 | Steve Welburn | ** Appraise - selection |
46 | 10 | Steve Welburn | ** Ingest - transferring to a custodian |
47 | 10 | Steve Welburn | ** Preserve - keeping data over time |
48 | 10 | Steve Welburn | ** Store - keeping data safe |
49 | 10 | Steve Welburn | ** Access - finding data |
50 | 10 | Steve Welburn | ** Transform - generating new data |
51 | 10 | Steve Welburn | |
52 | 10 | Steve Welburn | h2. Session 3: Problems and practical strategies and solutions |
53 | 11 | Steve Welburn | |
54 | 11 | Steve Welburn | * What problems are there ? |
55 | 11 | Steve Welburn | ** Conflicting considerations |
56 | 11 | Steve Welburn | ** Resource issues |
57 | 11 | Steve Welburn | ** anything else ? |
58 | 11 | Steve Welburn | * Conflicts |
59 | 11 | Steve Welburn | ** Confidentiality and sharing |
60 | 11 | Steve Welburn | *** personal and sensitive data - anonymisation, consent |
61 | 11 | Steve Welburn | * Data security and storage |
62 | 11 | Steve Welburn | ** File and folder names |
63 | 11 | Steve Welburn | ** Locations |
64 | 11 | Steve Welburn | ** Email is not secure |
65 | 11 | Steve Welburn | ** Physical security - destroy USB sticks, shred documents |
66 | 11 | Steve Welburn | * Metadata |