Introduction to Research Data Management Services, January 2013 Research Data Management Infrastructure Identifying Implementation Options.

Slides:



Advertisements
Similar presentations
Leading Continuous Improvement in the School Day 3.
Advertisements

Joint Information Systems Committee Supporting Higher and Further Education Information Security: Policy and Culture Introduction and Background Annette.
Process Reform at Brit Insurance Mike Smith – Head of Technical Underwriting Services Hugh Maltby – Group Services Director.
Internet Librarian 2007 Project management workshop 28 th October 2007 Mary Auckland Project management workshop 28 th October.
Copyright © The Beyond Intractability Project Beyond Intractability is a Registered Trademark of the University of Colorado PowerPoint Summary.
Introduction to Research Data Management Services, January 2013 Library Data Services Functions and activities.
The Prime Ministers Chief Science Advisor Sir Peter Gluckman Waikato Management School Friday 10 May 2013 Briefing for scientific community National Science.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Networking Academy Advanced Technology Update June 19, 2008.
1 The Antecedents of Internal Auditors Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context Ray Henrickson CAIT, CACISA.
Introduction to the Network AHRC Interdisciplinary Network on Teaching of Ethics for Neuroscientists.
End-to-End Efficiency (E 3 ) Integrated Project of the EC 7 th Framework Programme E 3 WP5 Objectives E 3 WP5 Structure and Research Challenges
Introduction to Research Data Management Services, January 2013 The Analysis Stage Analyzing the data from the 4 exercises.
Graduate Application Project Design Concept Walkthrough
Collaboration Proposal Proposed Interaction between CSDL and AAI With Narration by Nicholas J. Parks.
Discovery: Implementing a vision for a 'virtuous' flow of metadata across the Web Joy Palmer Mimas, University of Manchester.
Challenges to Building Institutional African Research Collaborations in a Global Knowledge Society: A case of Makerere University Mathias Bwanika Mulumba.
TDL Labs Partnerships for Exploration Luis Francisco-Revilla, Unmil P. Karadkar School of Information The University of Texas at Austin.
Rare’s CampaignTracker A brief overview of its design and function and what we have learned so far.
e-Framework Components and Responsibilities.
1 Applied CyberInfrastructure Concepts ISTA 420/520 Fall Nirav Merchant Bio Computing & iPlant Collaborative Eric Lyons.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Information Security Policies and Standards
Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM (0) {mkamel, benzekri, barrere, nasser}
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
2/7/2001 Presentation at the University of Kansas Digital Libraries – Meeting the Challenges Beth Forrest Warner.
NHPRC ELECTRONIC RECORDS RESEARCH FELLOWSHIP SYMPOSIUM Nov. 19, 2004 Rebecca Schulte University of Kansas Project Title: Testing Boundaries—An Exploration.
Cornell Institute for Digital Collections DIGITIZATION AND THE DIGITAL: THE IMPACT ON ACADEMIC LIBRARIES Peter B. Hirtle Cornell Institute for Digital.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Analyzing the Business Case
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN si.umich.edu Infrastructural heuristics: toward a (policy) science of cyberinfrastructure Steven Jackson,
Eric Hamilton, Assistant Principal of Curriculum & Instruction Paul Wakefield, Network Engineer Alice Schmitz, Instructional Technologist S.T.A.R. = Name.
BIS310: Structured Analysis and Design Introduction and Systems Planning Week 1.
Information Technology Master Plan
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
Eric Hamilton, Assistant Principal of Curriculum & Instruction Paul Wakefield, Network Engineer Alice Schmitz, Instructional Technologist S.T.A.R. = Name.
1 Chapter 15 Methodology Conceptual Databases Design Transparencies Last Updated: April 2011 By M. Arief
Event Management & ITIL V3
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Assessing The Development Needs of the Statistical System NSDS Workshop, Trinidad and Tobago, July 27-29, 2009 Presented by Barbados.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
How to pre-register for Keeping the Promise Alive and sign your electronic background check in your active VIRTUS account.
1-2 Training of Process Facilitators 3-1. Training of Process Facilitators 1- Provide an overview of the role and skills of a Communities That Care Process.
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
UNFCCC WORKSHOP ON METHODOLOGIES ON CLIMATE CHANGE IMPACT AND ADAPTATION back-to-back with UNDP-GEF WORKSHOP FOR DEVELOPING AN ADAPTATION POLICY FRAMEWORK.
Innovation Forum: some conclusions Sarah Porter Head of Innovation, JISC.
Federated Identity in Texas Paul Caskey The University of Texas System HEAnet National Conference Kilkenny, Ireland 13 November 2008.
Welcome To Implementation Science 8 Part Webinar Series Kathleen Ryan Jackson Erin Chaparro, Ph.D University of Oregon.
National & State Libraries Australasia — NSLA is the organisation where the 10 National, State and Territory Libraries of Australia and New Zealand work.
How to become a Horizon 2020 Evaluator.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Challenges in the implementation of SIMSTAT Introduction Nordic meeting 16 September 2014 Jennie Bergman.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
Challenges in the Research Data Ecosystem Implications for DDI Chuck Humphrey University of Alberta October 2012.
© 2010 Randall B. Dunham Organizational Change in Action.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
A. D. SMITH – SEPTEMBER 28, 2011 DATA CURATION PROFILE.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Managing Enterprise Architecture
IT Service Management – main terms and definitions
Bring the WLCG federation Home
Connected Vehicle Technology
IS4550 Security Policies and Implementation
Information and Communications Technology, Knowledge Management & Enterprise Data and Records Management.
Question Banks, Reusability, and DDI 3.2 (Use Parameters)
(System Development Life Cycle)
Created for Sloan-C Conference, Fall 2006
Working with Technical Team Members
Baseline Expectations for Trust in Federation
Crossing Organizational Boundaries to Achieve Mutual Security
Presentation transcript:

Introduction to Research Data Management Services, January 2013 Research Data Management Infrastructure Identifying Implementation Options

Introduction to Research Data Management Services, January 2013 Understanding infrastructure The background blog describes Research Data Management Infrastructure as the mix of technology, services, and expertise organized locally or globally to support research data activities across the research lifecycle. Key concepts in this definition: o Technology, services, and expertise o Organized locally or globally o Research data activities across the research lifecycle

Introduction to Research Data Management Services, January 2013 Understanding infrastructure Understanding Infrastructure: Dynamics, Tensions, and Design. Edwards, Paul N., Jackson, Steven J., Bowker, Geoffrey C., and Knobel, Cory P [C]yberinfrastructure is the set of organizational practices, technical infrastructure and social norms that collectively provide for the smooth operation of scientific work at a distance (p6).

Introduction to Research Data Management Services, January 2013 Understanding Infrastructure

Introduction to Research Data Management Services, January 2013 Eduroam Example Infrastructure supporting academic guest use of local wireless services. Bryn Mawr University o First day that I arrived o A person would issue an ID and password for each wireless device that you had. o Had to sign a form listing all of the conditions o Needed to know from who to obtain the form

Introduction to Research Data Management Services, January 2013 Eduroam Example Bryn Mawr University o The second day o Checked the list of wireless services available. o Located and selected eduroam and was authenticated. The new procedure moved from primarily a social method relying on the local setting of providing guest access to wireless services to a technical method built on an automated, global infrastructure. New functionality was also achieved through this new approach.

Introduction to Research Data Management Services, January 2013 Implementation options In which of the quadrants of the Millerand model does one identify an option to implement a RDMI activity? o Social-Local quadrant o Technical-Local quadrant o Social-Global quadrant o Technical-Global quadrant

Local- Social Global- Social Local- Technical Global- Technical Implementation options Local- Social Global- Social Local- Technical Global- Technical Local- Social Global- Social Local- Technical Global- Technical Local- Social Global- Social Local- Technical Global- Technical Collection Services User Services Access Services Preservation Services

Introduction to Research Data Management Services, January 2013 Constraints on possibilities Your local environment sets boundaries around the implementation options that are possible. How your institution manages IT resources has a large impact on the options you can consider. The willingness of your institution to collaborate with other institutions also has a large impact on options. What other institutional factors constraint options?

Introduction to Research Data Management Services, January 2013 Exercise Lets explore the identification of options for implementation further through Exercise E5. Skip to the instructions under the heading: (1) Next Steps: Identifying Implementation Approaches (aka, options)