Feeds

Jisc sees road to data curation

Report sets out data management recommendations

The Power of One Infographic

A new report has outlined the next steps in the long-term management of data for the Joint Information Systems Committee and other higher education institutions.

Dealing with data reviews a variety of data, and arrangements for its accumulation, storage and use, across disciplines. It sets out 10 key recommendations and a further 25 of lesser importance.

Written by Dr Liz Lyon, director of the UK Office for Library and Information Networking (UKOLN) and associate director of the Digital Curation Centre (DCC), the report recommends that Jisc develop a data audit framework to enable all universities and colleges to carry out an audit of departmental data collections, awareness, policies and practice for data curation and preservation.

The paper also calls on research-funding organisations to openly publish, implement and enforce a data management, preservation and sharing policy. In addition, says the report, each higher-education institution should implement its own policy, which recommends data deposit in an appropriate open access data repository and/or data centre where these exist.

On sustainability, the review proposes Jisc should work in partnership with the research-funding bodies to jointly commission a cost-benefit study of data curation and preservation infrastructure. It also recommends that the DCC play a role in delivering coordinated training programmes and supporting materials, targeted at researchers in specific disciplines.

Earlier this month Jisc, which supports education and research by promoting the use of technology, announced it had funded the creation of an Open Access repository for academic papers.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.