SlideShare a Scribd company logo
research 3.0
&
the future of scholarly communications

richard j. bookman




richter library
university of miami
18 july 2012
NIH Purchasing Power – 2003-2013
                       NIH Purchasing Power – 2003-2013
           $32                                                                      $31.0
                                                                            $30.5           $30.7 $30.6 $30.7

           $30                                                    $29.3
                                                  $29.0
                             $27.9     $28.5 $28.5
                     $27.1
           $28                    $26.9 $26.4
Billions




                                                    $25.3
           $26                                                $24.8
                                                                         $23.9 $24.2 $23.9
           $24
                                                                                              $23.0
                                                                                                      $22.4
                                                                                                              $21.9
           $22


           $20


           $18
                     2003    2004      2005     2006      2007      2008    2009    2010    2011   2012    2013
                                        Current                    Constant (BRDPI)                       Senate

 Labor-HHS BA only
Labor-HHS NIHonly
 Sources: BA Budget Office; House and Senate Appropriations Committees
Sources: NIH Budget Office; House and Senate Appropriations Committees
NIH Grant Success Rates
FY 1978-2012
Over the past decade, before pursuing a particular line of research, scientists (including
C.G.B.) in the haematology and oncology department at the biotechnology firm Amgen in
Thousand Oaks, California, tried to confirm published findings related to that work. Fifty-
three papers were deemed 'landmark' studies. It was acknowledged from the outset that
some of the data might not hold up, because papers were deliberately selected that
described something completely new, such as fresh approaches to targeting cancers or
alternative clinical uses for existing therapeutics. Nevertheless, scientific findings were
confirmed in only 6 (11%) cases. Even knowing the limitations of preclinical research, this
was a shocking result.
you may ask yourself…
     …how did we get here?
hypothetical model of the evolution & structure of science




                                                             daniel zeller 2007
research 1.0
who’s doing research?


who’s paying for research?


how is research organized?


how is research communicated?
Morrill Act of 1862

    the endless frontier 1945

             bayh-dole act of 1980
research 2.x
who’s doing research?


who’s paying for research?


how is research organized?


how is research communicated?
unintended consequences…
rewards & incentives matter…
need




    curiosity




    fame




fortune
time for a new version…

   in a rapidly evolving context
big
bang
alan turing 1912-1954
the internet of things


            big bang
every
the internet of things    
                     ^

      big data
http://doi.ieeecomputersociety.org/10.1109/MIS.2009.36
research 3.0
hints of 3.0…..
?
1.0 megapub per year…




         …and that’s just medline.
digital research objects
Producing research objects
                                                          1. Research: Each object in the system has metadata
                                 metadata
                                                          (including provenance) and relations to other data objects
                                            metadata      added to it.
          metadata                                        2. Workflow: All data objects used by or created in the lab are
                                                          captured within a (lab-owned) workflow system.
                                                          3. Authoring: A communication is written in an authoring tool
                                                          which can pull data objects with provenance from the workflow
                                                          tool in the appropriate representation into the document.
                 metadata                                 4. Editing and review: Once the co-authors agree, the paper is
                                                          ‘exposed’ to editors, who in turn expose it to reviewers. Reports
                                               metadata
                                                          are stored in the authoring/editing system, the paper gets
                                                          updated, until it is validated.
                                                          5. Publishing and distribution: When a document is
                                                          published, a collection of validated research objects is
                                                          exposed to the world. Document remains connected to its
   Rats were subjected to two                             related data objects, and their provenance can be traced.
   tests (click on fig 2 to see
   underlying data). These results
                                                          6. (Re-)User applications: distributed applications run
   suggest that the neurological                          (autonomously?) on the set of exposed data objects.
   pain produced by ….

                                                                             Some other publisher
Review
                            Revise
               Edit




 Concept modified from one developed by Anita de Waard, Ed Hovy, Phil Bourne, Gully Burns and Cartic Ramakrishnan
re-useful is the new useful
research 3.0
who’s doing research?


who’s paying for research?


how is research organized?


how is research communicated?
what’s
next?
individuals



interest groups



institutions



nations
put the science first
libraries ?
flip the library
cloudminders
research 3.0
&
the future of scholarly communications
Research 3.0 & the Future of Scholarly Communications

More Related Content

Similar to Research 3.0 & the Future of Scholarly Communications

Mendeley: Recommendation Systems for Academic Literature
Mendeley: Recommendation Systems for Academic LiteratureMendeley: Recommendation Systems for Academic Literature
Mendeley: Recommendation Systems for Academic Literature
Kris Jack
 
Scott Edmunds: Using FAIR principles for more Open & Democratic Science
Scott Edmunds: Using FAIR principles for more Open & Democratic ScienceScott Edmunds: Using FAIR principles for more Open & Democratic Science
Scott Edmunds: Using FAIR principles for more Open & Democratic Science
GigaScience, BGI Hong Kong
 
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data PublishingScott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
GigaScience, BGI Hong Kong
 
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
GigaScience, BGI Hong Kong
 
The Internet, Science, and Transformations of Knowledge
The Internet, Science, and Transformations of KnowledgeThe Internet, Science, and Transformations of Knowledge
The Internet, Science, and Transformations of Knowledge
Eric Meyer
 
The Future of the Journal And Applications in an Open Scientific Ecosystem
The Future of the Journal And Applications in an Open Scientific Ecosystem The Future of the Journal And Applications in an Open Scientific Ecosystem
The Future of the Journal And Applications in an Open Scientific Ecosystem
Anita de Waard
 
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVESSTRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
Nicolaie Constantinescu
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
jeffreylancaster
 
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
GigaScience, BGI Hong Kong
 
Mtsr2015 goble-keynote
Mtsr2015 goble-keynoteMtsr2015 goble-keynote
Mtsr2015 goble-keynote
Carole Goble
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
paperpublications3
 
On community-standards, data curation and scholarly communication - BITS, Ita...
On community-standards, data curation and scholarly communication - BITS, Ita...On community-standards, data curation and scholarly communication - BITS, Ita...
On community-standards, data curation and scholarly communication - BITS, Ita...
Susanna-Assunta Sansone
 
myExperiment and the Rise of Social Machines
myExperiment and the Rise of Social MachinesmyExperiment and the Rise of Social Machines
myExperiment and the Rise of Social Machines
David De Roure
 
Directions in Open Science
Directions in Open ScienceDirections in Open Science
Directions in Open Science
Mike Travers
 
Research Discovery, Social Networks and VIVO
Research Discovery, Social Networks and VIVO Research Discovery, Social Networks and VIVO
Research Discovery, Social Networks and VIVO
Simon Caton
 
CLIR Fellows - Science Data - 14_0730
CLIR Fellows - Science Data - 14_0730CLIR Fellows - Science Data - 14_0730
CLIR Fellows - Science Data - 14_0730
jeffreylancaster
 
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
GigaScience, BGI Hong Kong
 
Towards Responsible Content Mining: A Cambridge perspective
Towards Responsible Content Mining: A Cambridge perspectiveTowards Responsible Content Mining: A Cambridge perspective
Towards Responsible Content Mining: A Cambridge perspective
petermurrayrust
 
Open Research Practices in the Age of a Papermill Pandemic
Open Research Practices in the Age of a Papermill PandemicOpen Research Practices in the Age of a Papermill Pandemic
Open Research Practices in the Age of a Papermill Pandemic
Dorothy Bishop
 
A Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical ResearchA Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical Research
Robert Grossman
 

Similar to Research 3.0 & the Future of Scholarly Communications (20)

Mendeley: Recommendation Systems for Academic Literature
Mendeley: Recommendation Systems for Academic LiteratureMendeley: Recommendation Systems for Academic Literature
Mendeley: Recommendation Systems for Academic Literature
 
Scott Edmunds: Using FAIR principles for more Open & Democratic Science
Scott Edmunds: Using FAIR principles for more Open & Democratic ScienceScott Edmunds: Using FAIR principles for more Open & Democratic Science
Scott Edmunds: Using FAIR principles for more Open & Democratic Science
 
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data PublishingScott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
Scott Edmunds @ Balti & Bioinformatics: New Models in Open Data Publishing
 
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
Scott Edmunds, ReCon 2015: Beyond Dead Trees, Publishing Digital Research Obj...
 
The Internet, Science, and Transformations of Knowledge
The Internet, Science, and Transformations of KnowledgeThe Internet, Science, and Transformations of Knowledge
The Internet, Science, and Transformations of Knowledge
 
The Future of the Journal And Applications in an Open Scientific Ecosystem
The Future of the Journal And Applications in an Open Scientific Ecosystem The Future of the Journal And Applications in an Open Scientific Ecosystem
The Future of the Journal And Applications in an Open Scientific Ecosystem
 
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVESSTRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
STRETCHING THE BOUNDARIES OF PUBLISHING: ALTERNATIVES
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
 
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
Scott Edmunds talk at AIST: Overcoming the Reproducibility Crisis: and why I ...
 
Mtsr2015 goble-keynote
Mtsr2015 goble-keynoteMtsr2015 goble-keynote
Mtsr2015 goble-keynote
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
 
On community-standards, data curation and scholarly communication - BITS, Ita...
On community-standards, data curation and scholarly communication - BITS, Ita...On community-standards, data curation and scholarly communication - BITS, Ita...
On community-standards, data curation and scholarly communication - BITS, Ita...
 
myExperiment and the Rise of Social Machines
myExperiment and the Rise of Social MachinesmyExperiment and the Rise of Social Machines
myExperiment and the Rise of Social Machines
 
Directions in Open Science
Directions in Open ScienceDirections in Open Science
Directions in Open Science
 
Research Discovery, Social Networks and VIVO
Research Discovery, Social Networks and VIVO Research Discovery, Social Networks and VIVO
Research Discovery, Social Networks and VIVO
 
CLIR Fellows - Science Data - 14_0730
CLIR Fellows - Science Data - 14_0730CLIR Fellows - Science Data - 14_0730
CLIR Fellows - Science Data - 14_0730
 
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
Scott Edmunds A*STAR open access workshop: how licensing can change the way w...
 
Towards Responsible Content Mining: A Cambridge perspective
Towards Responsible Content Mining: A Cambridge perspectiveTowards Responsible Content Mining: A Cambridge perspective
Towards Responsible Content Mining: A Cambridge perspective
 
Open Research Practices in the Age of a Papermill Pandemic
Open Research Practices in the Age of a Papermill PandemicOpen Research Practices in the Age of a Papermill Pandemic
Open Research Practices in the Age of a Papermill Pandemic
 
A Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical ResearchA Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical Research
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Research 3.0 & the Future of Scholarly Communications

  • 1. research 3.0 & the future of scholarly communications richard j. bookman richter library university of miami 18 july 2012
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. NIH Purchasing Power – 2003-2013 NIH Purchasing Power – 2003-2013 $32 $31.0 $30.5 $30.7 $30.6 $30.7 $30 $29.3 $29.0 $27.9 $28.5 $28.5 $27.1 $28 $26.9 $26.4 Billions $25.3 $26 $24.8 $23.9 $24.2 $23.9 $24 $23.0 $22.4 $21.9 $22 $20 $18 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Current Constant (BRDPI) Senate Labor-HHS BA only Labor-HHS NIHonly Sources: BA Budget Office; House and Senate Appropriations Committees Sources: NIH Budget Office; House and Senate Appropriations Committees
  • 8. NIH Grant Success Rates FY 1978-2012
  • 9.
  • 10. Over the past decade, before pursuing a particular line of research, scientists (including C.G.B.) in the haematology and oncology department at the biotechnology firm Amgen in Thousand Oaks, California, tried to confirm published findings related to that work. Fifty- three papers were deemed 'landmark' studies. It was acknowledged from the outset that some of the data might not hold up, because papers were deliberately selected that described something completely new, such as fresh approaches to targeting cancers or alternative clinical uses for existing therapeutics. Nevertheless, scientific findings were confirmed in only 6 (11%) cases. Even knowing the limitations of preclinical research, this was a shocking result.
  • 11. you may ask yourself… …how did we get here?
  • 12. hypothetical model of the evolution & structure of science daniel zeller 2007
  • 13. research 1.0 who’s doing research? who’s paying for research? how is research organized? how is research communicated?
  • 14.
  • 15.
  • 16. Morrill Act of 1862 the endless frontier 1945 bayh-dole act of 1980
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. research 2.x who’s doing research? who’s paying for research? how is research organized? how is research communicated?
  • 23. rewards & incentives matter…
  • 24.
  • 25. need curiosity fame fortune
  • 26.
  • 27. time for a new version… in a rapidly evolving context
  • 29.
  • 31.
  • 32.
  • 33. the internet of things big bang
  • 34. every the internet of things ^ big data
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. ?
  • 43. 1.0 megapub per year… …and that’s just medline.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Producing research objects 1. Research: Each object in the system has metadata metadata (including provenance) and relations to other data objects metadata added to it. metadata 2. Workflow: All data objects used by or created in the lab are captured within a (lab-owned) workflow system. 3. Authoring: A communication is written in an authoring tool which can pull data objects with provenance from the workflow tool in the appropriate representation into the document. metadata 4. Editing and review: Once the co-authors agree, the paper is ‘exposed’ to editors, who in turn expose it to reviewers. Reports metadata are stored in the authoring/editing system, the paper gets updated, until it is validated. 5. Publishing and distribution: When a document is published, a collection of validated research objects is exposed to the world. Document remains connected to its Rats were subjected to two related data objects, and their provenance can be traced. tests (click on fig 2 to see underlying data). These results 6. (Re-)User applications: distributed applications run suggest that the neurological (autonomously?) on the set of exposed data objects. pain produced by …. Some other publisher Review Revise Edit Concept modified from one developed by Anita de Waard, Ed Hovy, Phil Bourne, Gully Burns and Cartic Ramakrishnan
  • 50.
  • 51. re-useful is the new useful
  • 52. research 3.0 who’s doing research? who’s paying for research? how is research organized? how is research communicated?
  • 59. research 3.0 & the future of scholarly communications

Editor's Notes

  1. Image is Gerhard Richter painting.http://www.gerhardrichterpainting.com/wp-content/uploads/2012/01/gerhardrichter_photo3.jpgWhat follows are the slides from a talk to the UM library community and other interested folks.The slides are NOT a stand-alone representation of the substance of the talk. Mostly, they illustrate some aspect of a point made in my talk.
  2. http://www.gerhardrichterpainting.com/wp-content/uploads/2012/01/gerhardrichter_photo7.jpgbroad brush strokes…mostly focus on science – natural or social….not so much humanities
  3. sabbatical – a time to step back and reflect…..
  4. http://4.bp.blogspot.com/-flNnHy6l9Nc/T-nt716AI4I/AAAAAAAAGxQ/QWTLtCfUNsE/s1600/alltheyear3.jpg
  5. http://graphics.eiu.com/upload/dna.jpg
  6. Nature 483 531-533 (29 March 2012) doi:10.1038/48351ainteresting comment in May, 2012….can’t disclose which papers bec/ of confidentiality agreements between Amgen and authors of the original papers.
  7. photograph taken of archival print of Zeller ink and acrylic drawing.this Zeller work is part of scimaps.org.http://scimaps.org/maps/map/hypothetical_model_o_51/
  8. research ecosystem: the entire system by which humans create new knowledge, encompassing language, technology, governance, dissemination, etc.many questions we need to explore to describe the evolution of how humans do research, but today’s talk will emphasize 4.
  9. Newton: 1643-1727 – overlaps w/ start of Phil. Trans.Charles Darwin atapprox age of Beagle voyage.
  10. The first issue, 6 March 1665, was edited and published by the society’s first secretary, Henry Oldenburg, only six years after the Royal Society was founded. He published the journal at his own expense and had an agreement with the Royal Society that he kept any profits. He was to be disappointed, however, as the journal performed poorly during Oldenburg’s lifetime.Source: redOrbit (http://s.tt/1aL0Z)Darwin’s paper w/ Wallace:http://www.age-of-the-sage.org/philosophy/linnean_society_darwin_wallace.bmp
  11. 3 forces acting to push from R1.0 to R2.0
  12. http://cnx.org/content/m34582/latest/graphics4.png
  13. Initial sequencing and analysis of the human genomeNature409, 860-921 (15 February 2001) | doi:10.1038/35057062; Received 7 December 2000; Accepted 9 January 2001http://www.nature.com/nature/journal/v409/n6822/full/409860a0.html
  14. ibid.
  15. key change is institutionalization or corporatization of research from R1 to R2.
  16. http://blogs.jwatch.org/hiv-id-observations/wp-content/uploads/2011/05/unintended-consequences.jpgnow the institutions have an interest that is not always aligned with either the scientist or society….let alone the science.
  17. and scientists’ behavior can be shaped…
  18. http://3.bp.blogspot.com/_Uf8aRwoaSJ8/TS0PqvkTw9I/AAAAAAAAANE/c372nzbb-7k/s1600/Church+of+Covenant+-+Tower+Collapse+at+construction+time+%25282%2529.jpgOne of the Washington's greatest losses in historic religious structures was the old National Presbyterian Church, originally called the Church of the Covenant, which used to rise from the southeast corner of Connecticut Avenue and N Street NW. The building, which James M. Goode has called a "dignified masterpiece in gray granite," was completed in 1889 and torn down in 1966, to be replaced by a nondescript office building.Construction of the main church began in 1887 and was nearly complete when the 158-foot Ohio-sandstone tower suddenly collapsed into a heap of rubble early on the morning of August 22, 1888. What caused the collapse? Fingers were pointed in all directions. "It was the fault of the contractor; it was the fault of the architect; it was the fault of the trustees, of the material, of the mortar, of everything and of nothing," the Post reported with exasperation. An official investigation soon concluded that the basic design was sound but that inferior materials and workmanship were to blame for the accident. The mortar, in particular, was found to be "practically worthless." The architect, contractors, and Church congregation agreed to divide the cost of reconstruction equally, and a new and very solid tower was soon standing.
  19. George Dyson has laid out the ideas and the history of the big bang of the digital universe in a number of places including:Darwin Among the Machines (1997)Turing’s Cathedral (2012)and in this Edge Conversation: http://edge.org/conversation/a-universe-of-self-replicating-code/…and a nice video of his talk at The Perimeter Institute:http://www.youtube.com/watch?v=Tg5gJxXBh8s
  20. http://nothingoutofnothing.files.wordpress.com/2010/05/bigbang.jpg
  21. http://www.theremainsoftheweb.com/wp-content/uploads/2012/06/alan.turing.2.jpg“It is possible to invent a single machine which can be used to compute any computable sequence.”
  22. JvN: “I am thinking about something much more important than bombs. I am thinking about computers.”The IAS computer in 1952.Numbers that ‘mean’ things vs. numbers that ‘do’ things. Adjectives versus verbs.Code that can modify code.
  23. overlay graphic: http://www.evolutionoftheweb.com/staticAl Gore invents the internet – image underneath….
  24. http://gowers.wordpress.com/2009/02/01/a-combinatorial-approach-to-density-hales-jewett/
  25. http://www.galaxyzoo.org/Which types of problems can be attacked with Polymath or Galaxy Zoo type approaches?
  26. http://www.patientslikeme.com/about17 July 2012
  27. http://www.kaggle.com/16 July 2012
  28. http://dobby.dyndns.biz/constantamateur/wp-content/uploads/2011/10/Gold-Bars-in-Fort-Knox.jpg
  29. data from pubmed, week of July 16, 2007.Search:# of pubs - Search (”XXXX/1/1"[Date - Publication] : ”XXXX/12/31"[Date - Publication]), where XXXX ranges from 1940 to 2012.# of citations: http://www.nlm.nih.gov/bsd/bsd_key.html
  30. Citation: Lerch JK, Kuo F, Motti D, Morris R, Bixby JL, et al. (2012) Isoform Diversity and Regulation in Peripheral and Central Neurons Revealed through RNA-Seq. PLoS ONE 7(1): e30417. doi:10.1371/journal.pone.0030417
  31. http://altmetrics.org/manifesto/
  32. http://www.plosone.org/article/metrics/info%3Adoi%2F10.1371%2Fjournal.pone.0030417July 15, 2012
  33. http://force11.org/about
  34. http://www.wf4ever-project.org/wiki/display/docs/Research+Object+model
  35. modified fromhttp://www.slideshare.net/anitawaard/whats-wrong-with-research-papers-and-how-can-we-fix-it
  36. http://www.executablepapers.com/
  37. they call it re-search for a reason…
  38. think this through at 4 levels
  39. photo is RJBookman, Quebec, 2008 – RMB Panner trip.CC-BY
  40. http://www.gerhardrichterpainting.com/wp-content/uploads/2012/01/gerhardrichter_photo3.jpg