Keep your Research Secure and address Open Access obligations

1,188 views

Published on

Presentation explores the legal, funding, institutional, and subject domain requirements that influence a research project and outlines how projects, particularly, those funded for 5+ years can ensure that they recognise and adapt to the changing environment. Presentation given by Gareth Knight on September 24th 2013 at the London School of Hygiene & Tropical Medicine

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,188
On SlideShare
0
From Embeds
0
Number of Embeds
41
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Keep your Research Secure and address Open Access obligations

  1. 1. Keep your research secure and address Open Access obligations This work is licensed under a Creative Commons Attribution 2.0 UK: England & Wales License Gateways to Research Seminar 23 September 2013
  2. 2. Research requirements Subject domain Best Practice Institutional Requirements Geographic legislation and regulations Sponsor / funder requirements Research process Requirements & obligations originated from many sources Requirements change over time New needs are established Additional risks are recognised Need a method to recognise, prioritise & implement requirements
  3. 3. Research Project Lifecycle Proposal development Generate research idea Write abstract Allocate resources Write draft proposal Gain ethics & finance approval Finalise & submit Funding review Address questions & requirements Negotiation Project start- up Produce Project Plan Allocate resources Monitor objectives Perform Research Experiment / Observe / simulate Store Process Analyse Record research findings Finalise Project Produce reports Publish articles
  4. 4. Improvement methods: SWOT Analysis Strengths: Characteristics that project performs well Weaknesses: Issues that limit project team’s work. E.g. to make maximum use of data Opportunities: Elements that the project could exploit to its advantage Threats: Elements in the environment that could cause trouble for the project (risk factors) Develop action plan by identifying positives & negatives http://en.wikipedia.org/wiki/File:SWOT_en.svg
  5. 5. Improvement methods: Gap Analysis 1. Identify objectives to be achieved, e.g. ISO27001 compliance 2. Record current action taken to meet each objective E.g. Risk management, new need 3. Evaluate status e.g. Full comply/partial compliance/do not comply) 4. Identify barriers / reasons that compliance cannot be achieved 5. Specify remedial action Define objectives for future performance & identify current compliance
  6. 6. Implementing Project Change 1. Analyse requirements using SWOT/Gap analysis and identify issues to address 2. Seek advice from LSHTM staff and others with expertise 3. Plan approach to address requirements 4. Seek advice on proposed plan 5. Implement and monitor plan 6. Repeat at regular intervals
  7. 7. Research Project Lifecycle Proposal development Generate research idea Write abstract Allocate resources Write draft proposal Gain ethics & finance approval Finalise & submit Funding review Address questions & requirements Negotiation Project start- up Produce Project Plan Allocate resources Monitor objectives Perform Research Finalise Project Experiment / Observe / simulate Store Securely Process Anonymise Organise & label Analyse Document Record research findings Produce reports Upload data to repository Cite data in OA article Produce Data Plan & consult with others
  8. 8. Thank You for your attention! Gareth Knight. RDM Support Service Project Manager Email: researchdatamanagement@lshtm.ac.uk Questions

×