Feeds

Jisc sees road to data curation

Report sets out data management recommendations

Top 5 reasons to deploy VMware with Tegile

A new report has outlined the next steps in the long-term management of data for the Joint Information Systems Committee and other higher education institutions.

Dealing with data reviews a variety of data, and arrangements for its accumulation, storage and use, across disciplines. It sets out 10 key recommendations and a further 25 of lesser importance.

Written by Dr Liz Lyon, director of the UK Office for Library and Information Networking (UKOLN) and associate director of the Digital Curation Centre (DCC), the report recommends that Jisc develop a data audit framework to enable all universities and colleges to carry out an audit of departmental data collections, awareness, policies and practice for data curation and preservation.

The paper also calls on research-funding organisations to openly publish, implement and enforce a data management, preservation and sharing policy. In addition, says the report, each higher-education institution should implement its own policy, which recommends data deposit in an appropriate open access data repository and/or data centre where these exist.

On sustainability, the review proposes Jisc should work in partnership with the research-funding bodies to jointly commission a cost-benefit study of data curation and preservation infrastructure. It also recommends that the DCC play a role in delivering coordinated training programmes and supporting materials, targeted at researchers in specific disciplines.

Earlier this month Jisc, which supports education and research by promoting the use of technology, announced it had funded the creation of an Open Access repository for academic papers.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Beginner's guide to SSL certificates

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.