SlideShare a Scribd company logo
1 of 21
Emerging Role of Social Media in
 Data Sharing and Management
                      Dr. Sudha Ram
  McClelland Professor of MIS and Computer Science
  Director, INSITE Center for Business Intelligence and
                         Analytics
              Eller College of Management
                   University of Arizona
                     Tucson, AZ 84721
              Email: ram@eller.arizona.edu

                                                          1
Why Share Data
• Requirement from Funding Agency
• Data Hoarding results in wasted
  resources
• Slows down scientific progress




10/24/2012                          2
Barriers to Data Sharing
• Technical, Social, Legal Barriers
• Privacy
• Competitive nature of R&D process
• Fear of getting “Scooped”
• Protect Intellectual property
• Early sharing may lead to
  misunderstanding of results
• Lack of incentives
10/24/2012                              3
How to Enable Data Sharing


                   KEY:
  Provenance Tracking & Management!




10/24/2012                            4
What is Provenance?
   Lineage, Pedigree, Origin (Kings, Dogs, Aliens)
   Enables correct interpretation
   Includes:
        Who created it
        How was it derived
        Ownership
        Assumptions
        …….
   “Provenance” is an overloaded Term
Uses of Provenance
• Data Quality                Evaluate quality of data
                              Measure trust in data

• Audit Trail                 Detect data processing errors
                              Create a usage log

• Replication Recipe          Reproduce a dataset
                              Repeat to verify /compare

• Attribution/Intellectual    Establish the rights and
  Property                    ownership of data



• Informational               Discover and re-use datasets
                              Browse provenance
What exactly is provenance?
- Creator, publisher, contributor.
                                     Who
- Ownership
- Dates (e.g. creation date and modification date)
                                                            When
- The literature reference where data were first reported
- Current location of storage of the data
- How the data has been derived or transformed              Where
- Experimental procedures or computations that transform data How
- The sequence of ideas leading to an experiment
                                                     Why
- Hypotheses an experiment is intended to test
- Instrument settings
                                       Which
- Parameters of software application
- Creation, transformation, derivation, retirement    What
Structure of Provenance
• Object: Data, Software, Document,
  Tweet, Blog….
• Anchor Point: Events in the Object’s Life
  – WHAT
• All other elements of Provenance
  describe the events
Life Events: Birth to Death

                                                                               Secure

                     Review

                                    Approval
                                                                           Archiving
           Storage


                                                Verification
                                                                                        Deletion
Creation                                                        Access



             Information lifecycle for a design document or any other object
W7 Model of Provenance
How do you track and store
           provenance
• Tracking: Ideally at the source
• Some of it can be automated and some of it
  requires manual input
• Store in a database – relational, XML, RDF,
  NoSQL
• Provenance is “BIG DATA”
• Provenance accumulates over time and can be
  1000s of times more than the data itself!
Using Provenance
• Query Interface
• Graph Based Interface
• Playback capabilities
Provenance Graph: RayMat
                    Raytheon Missile Systems
Cycom381/S2
Uni-Glass 111                                                              When:
                                                                             Data
                                    What: Derivation         occurs_at
Tensile Strength:                                                          Jan. 5, 2006
759 Mpa
                           is_involved_in                happens_in
Who:                                                  is_used_in           Where:
                           because_of         leads_to                     Raytheon,
•Name: John Herold
•Role: Creator                                                             Tucson, AZ

                                  How:
Why:                              •Method: Average
                                                           Occurs at Which:
•Project: SM-3                          (exclude outliers)           Granta Design
        Program
                      has_input             has_input


Test Specimen: S1                 Test Specimen: S2
Tensile Strength:                 Tensile Strength:                        What::Creation
 762 Mpa                           756.3 Mpa
                                                                leads_to            is_involved_in

                                   How:                                           Who:
                                   •Test specification: SACMA SRM-4               •Name: AME Material
                                   •Test temperature: 108 F                              Test Lab
                                   •Condition of test specimen: Dry               •Role: Tester
iPlant Provenance Management
    • Provenance can be used
     for estimating the quality
     of the data.
    - E.g., Where the data came
     from is critical for
     understanding the quality of
     data. After a tree file is
     imported, who modified it
     for what purposes (why) is
     of utmost importance to
     determine data quality.

  A tree file “PDAP.tree.nex” was imported Nicole
from TreeBASE. It was then modified by Doug. He
 changed the name of a species to be consistent
 with a naming convention used elsewhere. This
     tree file was then modified by Nicole. She
   reconciled the tree file with its trait data, and
 subsequently removed a species in the tree file.
iPlant Provenance Management
      • Provides a replication
       recipe for data
      • Enables attribution
       of the creator/owner
       of data

Provenance helps understand how the data
was processed and which software tool was
    used to manipulate it. We also need
 mechanisms to query and browse the who
     provenance since attribution of the
  creator/owners of the datasets and the
researchers’ discoveries, on the other hand,
relies primarily on provenance such as who
       created and modified the data.
W7 model parameters




Other controls
Who? – Corresponds
                                          to the person who
                                          created or updated a
                                          page




                       What? –Details of the
                       change made to the
The page
             Tooltip   page
that is                                           When? – Corresponds
created or                                        to the time of creation
updated                                           or update of the page
Lessons from Social Media/Web2.0
 • “Google Analytics” Philosophy for Provenance
   Management
 • Dashboard for extracting, viewing and drilling
   down into provenance for many different
   purposes
 • Establish Institutional Policies and Reward
   Systems
 • Mining through provenance to explore patterns
 • Crowdsourcing via Wikis, Blogs, Dropbox,
   Discussion Forums to enable sharing.
Good Provenance Management can help
               remove barriers
• Data Quality               Evaluate quality of data
                             Measure trust in data

• Audit Trail                Detect data processing errors
                             Create a usage log

• Replication Recipe         Reproduce a dataset
                             Repeat to verify /compare

• Attribution/Intellectual   Establish the rights and
  Property                   ownership of data



• Informational              Discover and re-use datasets
                             Browse provenance
Conclusion


             Free the Data!




10/24/2012                    21

More Related Content

What's hot

Machine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search EngineMachine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search Engine
Salford Systems
 

What's hot (8)

Trust and linked data jmgomez-v1.1
Trust and linked data jmgomez-v1.1Trust and linked data jmgomez-v1.1
Trust and linked data jmgomez-v1.1
 
NISO Forum, Denver, Sept. 24, 2012: Data Equivalence
NISO Forum, Denver, Sept. 24, 2012: Data EquivalenceNISO Forum, Denver, Sept. 24, 2012: Data Equivalence
NISO Forum, Denver, Sept. 24, 2012: Data Equivalence
 
Research Data Sharing LERU
Research Data Sharing LERU Research Data Sharing LERU
Research Data Sharing LERU
 
Preservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesPreservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanities
 
Qiagram
QiagramQiagram
Qiagram
 
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
 
NISO Forum, Denver, Sept. 24, 2012: EZID: Easy dataset identification & manag...
NISO Forum, Denver, Sept. 24, 2012: EZID: Easy dataset identification & manag...NISO Forum, Denver, Sept. 24, 2012: EZID: Easy dataset identification & manag...
NISO Forum, Denver, Sept. 24, 2012: EZID: Easy dataset identification & manag...
 
Machine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search EngineMachine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search Engine
 

Viewers also liked

Social Media and Information Management
Social Media and Information ManagementSocial Media and Information Management
Social Media and Information Management
Omri Bergman
 
Social Media and Information Systems
Social Media and Information SystemsSocial Media and Information Systems
Social Media and Information Systems
joefield21
 

Viewers also liked (10)

LSE Summer School: Turkey 2013 protests
LSE Summer School: Turkey 2013 protestsLSE Summer School: Turkey 2013 protests
LSE Summer School: Turkey 2013 protests
 
Social Media and Information Management
Social Media and Information ManagementSocial Media and Information Management
Social Media and Information Management
 
Social media mktg practice v8
Social media mktg practice v8Social media mktg practice v8
Social media mktg practice v8
 
The Stanislawski Wedding; Wedding Party
The Stanislawski Wedding; Wedding PartyThe Stanislawski Wedding; Wedding Party
The Stanislawski Wedding; Wedding Party
 
Social media into a Learning Management System
Social media into a Learning Management SystemSocial media into a Learning Management System
Social media into a Learning Management System
 
IAF605 week 10 chapter 13 export and import strategies
IAF605 week 10 chapter 13 export and import strategiesIAF605 week 10 chapter 13 export and import strategies
IAF605 week 10 chapter 13 export and import strategies
 
International Media Image Survey (I-MIS) - Highlights
International Media Image Survey (I-MIS) - HighlightsInternational Media Image Survey (I-MIS) - Highlights
International Media Image Survey (I-MIS) - Highlights
 
Beyond dashboards
Beyond dashboardsBeyond dashboards
Beyond dashboards
 
Social Media and Information Systems
Social Media and Information SystemsSocial Media and Information Systems
Social Media and Information Systems
 
Exim po...(1)
Exim po...(1)Exim po...(1)
Exim po...(1)
 

Similar to Provenance Management to Enable Data Sharing

Managing the research life cycle
Managing the research life cycleManaging the research life cycle
Managing the research life cycle
Sherry Lake
 
Research Shared: researchobject.org
Research Shared: researchobject.orgResearch Shared: researchobject.org
Research Shared: researchobject.org
Norman Morrison
 

Similar to Provenance Management to Enable Data Sharing (20)

Introduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsIntroduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate students
 
Managing the research life cycle
Managing the research life cycleManaging the research life cycle
Managing the research life cycle
 
BigData Testing by Shreya Pal
BigData Testing by Shreya PalBigData Testing by Shreya Pal
BigData Testing by Shreya Pal
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Building a Data Discovery Network for Sustainability Science
Building a Data Discovery Network for Sustainability ScienceBuilding a Data Discovery Network for Sustainability Science
Building a Data Discovery Network for Sustainability Science
 
The state of global research data initiatives: observations from a life on th...
The state of global research data initiatives: observations from a life on th...The state of global research data initiatives: observations from a life on th...
The state of global research data initiatives: observations from a life on th...
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate Researchers
 
Supporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data ManagementSupporting Libraries in Leading the Way in Research Data Management
Supporting Libraries in Leading the Way in Research Data Management
 
What is-rdm
What is-rdmWhat is-rdm
What is-rdm
 
Strata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma PresentationStrata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma Presentation
 
Data Management for Librarians: An Introduction
Data Management for Librarians: An IntroductionData Management for Librarians: An Introduction
Data Management for Librarians: An Introduction
 
Cloudera Breakfast Series, Analytics Part 1: Use All Your Data
Cloudera Breakfast Series, Analytics Part 1: Use All Your DataCloudera Breakfast Series, Analytics Part 1: Use All Your Data
Cloudera Breakfast Series, Analytics Part 1: Use All Your Data
 
Research Shared: researchobject.org
Research Shared: researchobject.orgResearch Shared: researchobject.org
Research Shared: researchobject.org
 
Data mining - GDi Techno Solutions
Data mining - GDi Techno SolutionsData mining - GDi Techno Solutions
Data mining - GDi Techno Solutions
 
SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science
 
CNI Fall 2011 Meeting Presentation Margaret Hedstrom & Robert McDonald (Dec. ...
CNI Fall 2011 Meeting Presentation Margaret Hedstrom & Robert McDonald (Dec. ...CNI Fall 2011 Meeting Presentation Margaret Hedstrom & Robert McDonald (Dec. ...
CNI Fall 2011 Meeting Presentation Margaret Hedstrom & Robert McDonald (Dec. ...
 
Data mining
Data miningData mining
Data mining
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Provenance Management to Enable Data Sharing

  • 1. Emerging Role of Social Media in Data Sharing and Management Dr. Sudha Ram McClelland Professor of MIS and Computer Science Director, INSITE Center for Business Intelligence and Analytics Eller College of Management University of Arizona Tucson, AZ 84721 Email: ram@eller.arizona.edu 1
  • 2. Why Share Data • Requirement from Funding Agency • Data Hoarding results in wasted resources • Slows down scientific progress 10/24/2012 2
  • 3. Barriers to Data Sharing • Technical, Social, Legal Barriers • Privacy • Competitive nature of R&D process • Fear of getting “Scooped” • Protect Intellectual property • Early sharing may lead to misunderstanding of results • Lack of incentives 10/24/2012 3
  • 4. How to Enable Data Sharing KEY: Provenance Tracking & Management! 10/24/2012 4
  • 5. What is Provenance?  Lineage, Pedigree, Origin (Kings, Dogs, Aliens)  Enables correct interpretation  Includes: Who created it How was it derived Ownership Assumptions …….  “Provenance” is an overloaded Term
  • 6. Uses of Provenance • Data Quality Evaluate quality of data Measure trust in data • Audit Trail Detect data processing errors Create a usage log • Replication Recipe Reproduce a dataset Repeat to verify /compare • Attribution/Intellectual Establish the rights and Property ownership of data • Informational Discover and re-use datasets Browse provenance
  • 7. What exactly is provenance? - Creator, publisher, contributor. Who - Ownership - Dates (e.g. creation date and modification date) When - The literature reference where data were first reported - Current location of storage of the data - How the data has been derived or transformed Where - Experimental procedures or computations that transform data How - The sequence of ideas leading to an experiment Why - Hypotheses an experiment is intended to test - Instrument settings Which - Parameters of software application - Creation, transformation, derivation, retirement What
  • 8. Structure of Provenance • Object: Data, Software, Document, Tweet, Blog…. • Anchor Point: Events in the Object’s Life – WHAT • All other elements of Provenance describe the events
  • 9. Life Events: Birth to Death Secure Review Approval Archiving Storage Verification Deletion Creation Access Information lifecycle for a design document or any other object
  • 10. W7 Model of Provenance
  • 11. How do you track and store provenance • Tracking: Ideally at the source • Some of it can be automated and some of it requires manual input • Store in a database – relational, XML, RDF, NoSQL • Provenance is “BIG DATA” • Provenance accumulates over time and can be 1000s of times more than the data itself!
  • 12. Using Provenance • Query Interface • Graph Based Interface • Playback capabilities
  • 13. Provenance Graph: RayMat Raytheon Missile Systems Cycom381/S2 Uni-Glass 111 When: Data What: Derivation occurs_at Tensile Strength: Jan. 5, 2006 759 Mpa is_involved_in happens_in Who: is_used_in Where: because_of leads_to Raytheon, •Name: John Herold •Role: Creator Tucson, AZ How: Why: •Method: Average Occurs at Which: •Project: SM-3 (exclude outliers) Granta Design Program has_input has_input Test Specimen: S1 Test Specimen: S2 Tensile Strength: Tensile Strength: What::Creation 762 Mpa 756.3 Mpa leads_to is_involved_in How: Who: •Test specification: SACMA SRM-4 •Name: AME Material •Test temperature: 108 F Test Lab •Condition of test specimen: Dry •Role: Tester
  • 14. iPlant Provenance Management • Provenance can be used for estimating the quality of the data. - E.g., Where the data came from is critical for understanding the quality of data. After a tree file is imported, who modified it for what purposes (why) is of utmost importance to determine data quality. A tree file “PDAP.tree.nex” was imported Nicole from TreeBASE. It was then modified by Doug. He changed the name of a species to be consistent with a naming convention used elsewhere. This tree file was then modified by Nicole. She reconciled the tree file with its trait data, and subsequently removed a species in the tree file.
  • 15. iPlant Provenance Management • Provides a replication recipe for data • Enables attribution of the creator/owner of data Provenance helps understand how the data was processed and which software tool was used to manipulate it. We also need mechanisms to query and browse the who provenance since attribution of the creator/owners of the datasets and the researchers’ discoveries, on the other hand, relies primarily on provenance such as who created and modified the data.
  • 16.
  • 18. Who? – Corresponds to the person who created or updated a page What? –Details of the change made to the The page Tooltip page that is When? – Corresponds created or to the time of creation updated or update of the page
  • 19. Lessons from Social Media/Web2.0 • “Google Analytics” Philosophy for Provenance Management • Dashboard for extracting, viewing and drilling down into provenance for many different purposes • Establish Institutional Policies and Reward Systems • Mining through provenance to explore patterns • Crowdsourcing via Wikis, Blogs, Dropbox, Discussion Forums to enable sharing.
  • 20. Good Provenance Management can help remove barriers • Data Quality Evaluate quality of data Measure trust in data • Audit Trail Detect data processing errors Create a usage log • Replication Recipe Reproduce a dataset Repeat to verify /compare • Attribution/Intellectual Establish the rights and Property ownership of data • Informational Discover and re-use datasets Browse provenance
  • 21. Conclusion Free the Data! 10/24/2012 21