This is Part III of a workshop presented by ICPSR at IASSIST 2011. This section focuses on data management including data management plans, secure computing environments, and restricted data contract management.
3. Data Management Agenda Data Management Plans Computing & Data Sharing in Secure Environments Managing Restricted Contracts
4. The Statement Heard Round the Research World: The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP). The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics: What data are generated by your research? What is your plan for managing the data?
5. Data Management in Demand ICPSR conducts webinars on data management plans: November 8, 2010: 134 attend January 12, 2011: 535 attend February 17, 2011: 71 attend
9. ICPSR’s DMP Statistics January 2011: 3,984 views January – April 2011: 7,802 views Where are they coming from? 5,527 Direct (bookmarked, etc.) 3,370 from Google search 878 from NSF
10. Improving Data Management Potential increase in demand for data management services as a result of grant/contract requirements Increase in demand for processing, analysis, and distribution of sensitive data Resulted in improvements focused on secure computing and data sharing environments at ICPSR
11. Three Angles of Security Secure Ingest Secure Computing in the Cloud Secure Online Application & Tracking
21. Selected a strategy of investing in storage, and "renting" access and security servicesEMC NS 120 Network Attached Storage device University of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) service University of Michigan "firewall virtualization" product, the Virtual Firewall service
60. Restricted Use Contracting System (RCS) Purpose Enables data processors (internal) to set up contracts with restricted data with terms of use and contract behavior preferences Enables end-users to apply for restricted data online & track progress Enables ICPSR user support to manage contracts and track end-users
63. 50 Years of Research Data Data Exploration Data Sharing Data Management
64. Presenter Contact Information Peter Granda – peterg@umich.edu Linda Detterman – lindamd@umich.edu Sanda Ionescu – sandai@umich.edu Elizabeth Moss – eammoss@umich.edu Steve Burling – srb@umich.edu
The setting: as we’ve seen, increased demand for systems that manage and store sensitive (restricted) data.In January 2011, NSF requires 2-page data management plan as part of proposals.Data management has become a popular topic.
Explore live.Note that recording of DMP webinar is on this page.
22 pages of guidelines and references even including a sample plan available for download.
FAQs consolidated from the webinars and from continuing discussions on DMPs into a blog where researchers and grant writers can read and contribute.
Keywords: data management plan; icpsr; icpsr data management planWhat will all this mean? Some things are clear, some things are unknown. Let’s talk about what’s clear.
Ingest refers to improvements in our internal (staff) computing systems – the VDEComputing in the cloud – our external (data user) computing systems – the SDEDistribution & Application – the RCS
The Restricted Use Contracting System (RCS) is built to serve three audiences:It enables processors to set up contracts for studies/datasets with restricted data, allowing them to enter terms of use into the system and indicate preferences as to contract behavior.It enables end users to apply for data electronically, tracking their paperwork and facilitating a somewhat complex process.It enables user support to manage individual contracts with users: verifying complete paperwork, transmitting data, and sending follow-up reminders.
Let’s take a peek into the RCS Portal – the data (end) user view at least.It’s a good idea to take a look at the FAQs and the application checklist first.