Transcript
Page 1: Keep your Research Secure and address Open Access obligations

Keep your research secureand

address Open Access obligations

This work is licensed under aCreative Commons Attribution 2.0 UK:

England & Wales License

Gateways to Research Seminar23 September 2013

Page 2: Keep your Research Secure and address Open Access obligations

Research requirements

Subject

domain

Best Practi

ce

Institutional Requirements

Geographic legislation and

regulations

Sponsor / fund

er requirements Research

process

Requirements & obligations originated from many sources

Requirements change over timeNew needs are established

Additional risks are recognisedNeed a method to recognise, prioritise & implement requirements

Page 3: Keep your Research Secure and address Open Access obligations

Research Project LifecycleProposal

development

Generate research idea

Write abstract

Allocate resources

Write draft proposal

Gain ethics & finance

approval

Finalise & submit

Funding review

Address questions &

requirements

Negotiation

Project start-up

Produce Project Plan

Allocate resources

Monitor objectives

Perform Research

Experiment / Observe / simulate

Store

Process

Analyse

Record research findings

Finalise Project

Produce reports

Publish articles

Page 4: Keep your Research Secure and address Open Access obligations

Improvement methods:SWOT Analysis

Strengths:Characteristics that project

performs well

Weaknesses:Issues that limit project team’s work. E.g. to make maximum use of data

Opportunities:Elements that the project could exploit to its advantage

Threats:Elements in the environment that could cause trouble for the project(risk factors)

Develop action plan by identifying positives & negatives

http://en.wikipedia.org/wiki/File:SWOT_en.svg

Page 5: Keep your Research Secure and address Open Access obligations

Improvement methods:Gap Analysis

1. Identify objectives to be achieved, e.g. ISO27001 compliance

2. Record current action taken to meet each objectiveE.g. Risk management, new need

3. Evaluate status e.g. Full comply/partial compliance/do not comply)

4. Identify barriers / reasons that compliance cannot be achieved

5. Specify remedial action

Define objectives for future performance& identify current compliance

Page 6: Keep your Research Secure and address Open Access obligations

ImplementingProject Change

1. Analyse requirements using SWOT/Gap analysis and identify issues to address

2. Seek advice from LSHTM staff and others with expertise

3. Plan approach to address requirements

4. Seek advice on proposed plan

5. Implement and monitor plan

6. Repeat at regular intervals

Page 7: Keep your Research Secure and address Open Access obligations

Research Project LifecycleProposal

development

Generate research idea

Write abstract

Allocate resources

Write draft proposal

Gain ethics & finance

approval

Finalise & submit

Funding review

Address questions &

requirements

Negotiation

Project start-up

Produce Project Plan

Allocate resources

Monitor objectives

Perform Research

Finalise Project

Experiment / Observe /

simulate

Store Securely

Process

Anonymise

Organise & label

Analyse

Document

Record research findings

Produce reports

Upload data to repository

Cite data in OA article

Produce Data Plan &

consult with others

Page 8: Keep your Research Secure and address Open Access obligations

Thank You for your attention!

Gareth Knight.RDM Support Service Project Manager

Email: [email protected]

Questions


Recommended