CCEGA Informatics Working Group Bradley Hemminger School of Information and Library Science.

Slides:



Advertisements
Similar presentations
HSE & Edinburgh University working together to manage Biological Safety Dr Matthew Penrose HSE Biological Agents Unit.
Advertisements

Measuring health outcomes of engagement in the arts: the Arts Health Strategy for the Australia Council.
DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
<<Date>><<SDLC Phase>>
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
COURSE PROPOSAL: METHODS IN CLINICAL CANCER RESEARCH Primary Instructor: Elizabeth Garrett-Mayer, PhD Professor of Biostatistics, Dept. of Public Health.
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
2014 Award for Innovative Public Health Curriculum College of Science and Health Urban Public Health (MPH) Program.
Information Security Policies Larry Conrad September 29, 2009.
CCEGA Informatics Project: Developing Shared Infrastructure and Data Models Project Leader: Brad Hemminger School of Information and Library.
CCEGA InformaticsHemminger CCEGA Informatics Working Group Bradley Hemminger School of Information and Library Science Supported in part by NIH Grant 5P20RR
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Integrating Biological and Medical Knowledge Bradley Hemminger Ph.D. School of Information and Library Science, University of North Carolina, Chapel Hill.
Information Seeking Behavior of Scientists Brad Hemminger School of Information and Library Science University of North Carolina at Chapel.
CCEGA Informatics Project: Developing Shared Infrastructure and Data Models Project Leader: Brad Hemminger School of Information and Library.
Security expenditure should be determined by security risk. What is the financial risk to UNC of undetected modification of bioresearch data? theft and.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Bioinformatics Related Research Brad Hemminger School of Information and Library Science University of North Carolina at Chapel Hill.
Implementation of CCEGA Kirk C. Wilhelmsen Department of Genetics and Neurology.
Copyright 2003 Cuyahoga Community College District Knowledge Management: Making it Fly in Higher Education Presenter: Amy C. Eugene Director, Knowledge.
Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Accreditation and Proficiency Testing. APT Subcommittee MembershipMeeting Activities 21 members, 15 non- Commissioners Representation: Accreditation bodies.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
Development Principles PHIN advances the use of standard vocabularies by working with Standards Development Organizations to ensure that public health.
Content Update Administrative Conference New Curriculum Documents ● Less clicks ● Less documents.
C R E S S T / U C L A Evaluating the Impact of the Interactive Multimedia Exercises (IMMEX) Program: Measuring the Impact of Problem-Solving Assessment.
Lis Nielsen, Ph.D. Division of Behavioral and Social Research (BSR) National Institute on Aging NIA/IPSR Workshop: Advancing Integrative.
European Interoperability Architecture e-SENS Workshop : Document Interoperability Solutions use case 7-8 January 2015.
RSNA Image Sharing Project Bradley J Erickson March, 2009.
Support for MAGE-TAB in caArray 2.0 Overview and feedback MAGE-TAB Workshop January 24, 2008.
Supporting the local research data environment via cross-campus collaboration and leveraging of national expertise Hannah F. Norton, Rolando Garcia Milian,
Science Archives in the 21st Century 25/26 April Towards an International standard for Audit and Certification of Digital Repositories David Giaretta.
Tom Clarke VP, Research & Technology National Center for State Courts.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
Overview June,  Sub-recipients grant applications will go to ADAMHS/ADAS Boards only.  ADAMHS/ADAS Boards will be expected to identify a primary.
Richard MarcianoChien-Yi Hou Caryn Wojcik University of University of State of Michigan North Carolina North Carolina Records Management ServicesSALT DCAPE.
CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald.
Developing and improving data resources for social science research A strategic approach to data development and data sharing in the social sciences Peter.
Developing and improving data resources for social science research A strategic approach to data development and data sharing in the social sciences Peter.
Together.Today.Tomorrow. The BLUES Project Karen C. Fox, PhD Chief Executive Officer.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
Draft – discussion only Advanced Health Models and Meaningful Use Workgroup June 23, 2015 Paul Tang, chair Joe Kimura, co-chair.
CIP Quality System for Genebank ISO 17025
Eliza de Guzman HTM 520 Health Information Exchange.
How OAIS and OA IR you? Developing workflows in publishing, promoting, and preserving faculty grey literature within a university Plato L. Smith II; Digital.
University Libraries/ITS Content Stewardship Program Mairéad Martin, Sr. Director, ITS Digital Library Technologies Presentation to FACAC March 1, 2011.
IQP Advising Strategies, Tips, and Tools Kent Rissmiller and Rick Vaz IQP Advising Workshop February 26, 2004.
S&I Integration with NIEM (DRAFT) Standards Development Support June 8, 2011.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Steps to Creating a Comprehensive Plan  PHASE 1: Where are we? Research & Analysis of Existing Conditions  PHASE 2: Where do we want to be? Creating.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Health Big Data Discussion Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair June 8, 2015.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
2015 Pipeline Safety Trust Conference November 20 th, 2015 | New Orleans, LA API RP 1175 Pipeline Leak Detection Program Management – New RP Highlights.
Knowledge Translation Conference KT Solutions for Overcoming Barriers to Research Use Hosted by SEDL’s Center on Knowledge Translation for Disability and.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
CaBIG Architecture Working Group Face-To-Face Meeting  Best Practices SIG  March 18th, 2005  David Kane and Jim Harrison.
The National Cancer Imaging Archive (NCIA) In Action: An Introduction for Users A Tool Demonstration from caBIG™ Carl Jaffe, MD NCI-Cancer Imaging Program.
GENOMICSGENOMICS Chronic Disease Genomics Project Assessment and Response Genomic Team Meeting January 19, 2005.
The Earth Information Exchange. Portal Structure Portal Functions/Capabilities Portal Content ESIP Portal and Geospatial One-Stop ESIP Portal and NOAA.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Welcome to the caBIG Community! The cancer Biomedical Informatics Grid (caBIG ® ) offers more than 120 open source tools, technologies and infrastructure.
NETWORKS OF EXCELLENCE KEY ISSUES David Fuegi
Privacy and ‘Big Data’: the European perspective Human Subjects’ Protections in the Digital Age: IRB, Privacy and Big Data Peter Elias, University of Warwick.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
Health Ingenuity Exchange - HingX
Scanning the environment: The global perspective on the integration of non-traditional data sources, administrative data and geospatial information Sub-regional.
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Presentation transcript:

CCEGA Informatics Working Group Bradley Hemminger School of Information and Library Science

Participants Roger Akers, Shepp Center Peter DeSaix, Epidemiology Xiaojun Guan, RENCI Kevin Gamiel, RENCI Barrie Hayes, Health Sciences Library Brad Hemminger (chair) School of Information & Library Science Clark Jeffries, RENCI Joel Kingsolver, Biology Lavanya Ramakrishnan, RENCI David Threadgill, Genetics Kirk Wilhelmsen, Genetics Dong Xiang, Lineberger Cancer Center

Aims Universal data model sharable by everyone. Standardized, independent methods, so location can be anywhere. Practical. Adoptable by many disparate groups on campus for new and legacy systems. Utilize existing domain standards, controlled vocabularies (GO, MIAME, caBIG, …) Data repository should be safe and secure, with only controlled and accountable access by appropriate qualified entities.

Areas of Focus Development of common data model Determine ways the common data model can be implemented as a common shared digital repository that allows for the ingest of digital content from many varied sources (both existing projects and new projects), and controlled access by appropriate people and automated agents. Address practical issues of how such a repository could be utilized by different groups with different needs in different contexts. Demonstrate advantages of how usage of the repository would be advantageous to groups, to help encourage them to utilize it. Define security and privacy issues for the repository, and propose and implement methods to support this.

Overview Difference between status quo and what is proposed. How labs, clinics, and analysis would interact with repository. Tie-in to Kirk’s examples.

Timeline First intramural workshop (spring 2005) –Weekly meetings (beginning spring 2005) Analysis of data requirements, and existing infrastructure at UNC. Internal interviews with labs Development of draft common model based on wealth of experience in local labs, and existing standards. –Second intramural workshop (summer/fall 2005) Present draft common model for review and feedback by UNC community.

Timeline continued –Extramural workshop (winter 2005) Bring community of experts to UNC for discussions. Learn in more detail about related work outside of UNC Present our draft model to get feedback and criticism. –Refine model –Implement and test model using data from the three main projects identified in this grant. –Think about and plan for how this model spreads. How to promote its use by groups with existing infrastructure as well as by new groups.

Common Data Model Survey schema/models in use by labs Develop set of general requirements Get ELSI and HIPPA requirements Develop generalized model capable of meeting needs Test against X,Y,Z (from grant)

Initial Examples Kirk’s (from Kirk) Roger’s (from Roger) Brad’s (proteomics) New model….(from Access database)

Security Security will be designed into the CCEGA model and repository implement to provide protection of information, while still allowing researchers timely access to data. Data will be protected via trusted broker methodology. Information is made anonymous by use of randomly chosen keys assigned by the trusted broker. The assignment is made at the clinic-database interface. The coded key will be used to identify experimental data, while providing linkage to the source organism private information in a secure association table.

Accountability Access permissions will determine which entities are allowed access to which data. All access to data is tracked via logs. “Audit-readiness” will be maintained to respond quickly to an outside investigation and challenge with the goal of quick clearance. Regular or random internal security audits will be included in a management strategy. Documents used in audits include 24/7 logs, flowcharts of procedures, training documents, incident reports, etc.

Future Comprehensive survey and publication of different schemas, architectures, controlled vocabularies/ontologies used by different groups. Comparison of similarities and differences. Digital Content Preservation Planning Study of what determines how well such models are adopted in this environment. Make publicly available the resources to locally, or utilize remotely the digital repositories.

End

ELSI Lab Clinical Analysis

mapping Ingest