1,313 research outputs found

    Data Management Roles for Librarians

    Get PDF
    In this Chapter:● Looking at data through different lenses● Exploring the range of data use and data support ● Using data as the basis for informed decision making ● Treating data as a legitimate scholarly research produc

    Sustaining Research Data Services

    Get PDF

    Virginia Data Management Bootcamp: A Collaborative Initiative in Data Education

    Get PDF
    Academic research libraries are quickly developing support for research data management, including both new services and infrastructures. In particular, libraries have actively engaged in providing data services through data training and workshops at their own institution and/or within inter-university collaborations. In this collaboration, two research university libraries in Virginia took the lead, and built partnerships, in designing and offering a bootcamp to educate early career researchers about issues and best practices in research data management. The first bootcamp in 2013 was held by University of Virginia and Virginia Tech. By 2015 there were five additional institutions: George Mason University, James Madison University, Old Dominion University, Virginia Commonwealth University, and the College of William & Mary. The bootcamp covers a range of topics, and currently includes: Finding and Reusing Data, Documentation and Metadata, Data Wrangling, Rights and Access, and Database Creation. This collaborative project highlights: 1) the prominent role of the library in data education; 2) the effective application of training to good data management practices; 3) the development of training materials and curriculum that speak to a variety of institutions with different constituents; and, 4) the benefit of a multi-institutional approach for sustaining a program

    Day 2. Don\u27t Let Your Data Management Plan Kill Your Grant

    Get PDF
    The National Science Foundation has rejected grants with bad Data Management Plans (DMPs). And now, most Federal agencies, and some private funders, will require these plans with your grant application. You will also need to provide public aces to you digital data. Learn how to write a competitive plan and share your data so you don’t miss out on an award. This session will focus on writing DMPs for NSF, Department of Defense, Department of Energy, NASA, National Institute of Standards and Technology (NIST), and USDA grant applications

    Compliance: Data Management Plans and Public Access to Data

    Get PDF
    Three years ago, the Office of Science and Technology Policy released the memo “Increasing Public Access to the Results of Federally Funded Research.” So far, 16 agencies have released plans. These new requirements relate to information access so librarians are well placed to help researchers and grants administrators comply. Many librarians have previous experience with NIH Public Access Policy and/or NSF data management plan requirements, so the transition to the new mandates should be easy. This breakout session will help you focus your efforts on the most important aspects of public access and data management plans when helping researchers with compliance. Margaret Henderson is Director of Research Data Services and Hillary Miller is Scholarly Communications Outreach Librarian, Virginia Commonwealth University Libraries

    Cataloging University Research Resources to Create DMPTool Templates and a LibGuide Research Portal

    Get PDF
    Objective Research data management plans require information about the resources used to create, store, and analyze the data. A table of resources in and outside the university was compiled for use when writing DMPTool templates for grants. The table was also used to create a LibGuide to help researchers learn about all the available resources. Methods Initially, resources directly related to data management such as storage availability, sharing options, and database programs available at the university were investigated to find boilerplate language to use in DMPTool data management plan templates. As the data librarian worked on more plans for grant applications, it became apparent that information about research resources related to the creation of data, and resources outside of the university would help provide more comprehensive data management plans, so further resources were investigated. Interviews with researchers had highlighted the lack of a centralized research resource catalogue at the university, so the information collected in spreadsheets by a graduate assistant was used to create a research portal LibGuide for all the documented resources. Plans are also underway to collaborate with the Coordinator for Research Development Services to create a boilerplate library for grants citing university resources

    A Qualitative Exploration of the Use of Contraband Cell Phones in Secured Facilities

    Get PDF
    Offenders accepting contraband cell phones in secured facilities violate state corrections law, and the possession of these cell phones is a form of risk taking behavior. When offenders continue this risky behavior, it affects their decision making in other domains where they are challenging authorities; and may impact the length of their incarceration. This qualitative phenomenological study examined the lived experience of ex-offenders who had contraband cell phones in secured correctional facilities in order to better understand their reasons for taking risks with contraband cell phones. The theoretical foundation for this study was Trimpop\u27s risk-homeostasis and risk-motivation theories that suggest an individual\u27s behaviors adapt to negotiate between perceived risk and desired risk in order to achieve satisfaction. The research question explored beliefs and perceptions of ex-offenders who chose to accept the risk of using contraband cell phones during their time in secured facilities. Data were collected anonymously through recorded telephone interviews with 8 male adult ex-offenders and analyzed using thematic content analysis. Findings indicated participants felt empowered by possession of cell phones in prison, and it was an acceptable risk to stay connected to family out of concern for loved ones. The study contributes to social change by providing those justice system administrators, and prison managers responsible for prison cell phone policies with more detailed information about the motivations and perspectives of offenders in respect to using contraband cell phones while imprisoned in secured facilities

    Assessing the Unpredictable

    Get PDF

    Collaborating to Improve Collaboration: Informationist Team Support for an Interdisciplinary Research Group

    Get PDF
    Objectives Three subject librarians and a data librarian, representing three departments and two libraries at a university, were awarded an NLM Informationist Supplement to support an interdisciplinary research group with an NIH grant. The Informationist Team developed a model to utilize the skills of multiple librarians to support the increasing number of interdisciplinary and interprofessional research groups at the university. Methods A pre-survey was administered to the Research Group to provide a baseline assessment of their use of librarian expertise and library services. The Informationist Team met to identify areas of expertise to support the objectives of the grant. Literature searching, bibliographic citation management and sharing, and data management were the first areas to be considered. Librarians routinely attended lab meetings and shared notes with each other to keep up with researcher needs. When possible, research questions were answered in the lab meetings by librarians. Interviews with Research Group members were used to develop a data management plan. Collaborative tools to facilitate team communication and support research being conducted in multiple buildings on two campuses were investigated. Future work will include publication support, assessing research impact, and appraising the usefulness of the Informationist Team to the Research Group
    corecore