Skip to content

Commit

Permalink
Built site for gh-pages
Browse files Browse the repository at this point in the history
  • Loading branch information
Quarto GHA Workflow Runner committed Sep 3, 2024
1 parent 038fb79 commit 1117caf
Show file tree
Hide file tree
Showing 5 changed files with 34 additions and 40 deletions.
2 changes: 1 addition & 1 deletion .nojekyll
Original file line number Diff line number Diff line change
@@ -1 +1 @@
cae045b4
75e1edfe
40 changes: 17 additions & 23 deletions dmp.html
Original file line number Diff line number Diff line change
Expand Up @@ -376,13 +376,8 @@ <h2 class="anchored" data-anchor-id="general-information">General information</h
</section>
<section id="components-of-a-dmp" class="level2">
<h2 class="anchored" data-anchor-id="components-of-a-dmp">Components of a DMP</h2>
<p>Throughout a project, there are different processing stages regarding data. You can illustrate the process as a life cycle with the following stages<a href="#fn1" class="footnote-ref" id="fnref1" role="doc-noteref"><sup>1</sup></a>:</p>
<div class="quarto-figure quarto-figure-center">
<figure class="figure">
<p><a href="https://www.fdm-bayern.org/forschungsdatenmanagement/#fd-lebenszyklus"><img src="\images\RD-Lifecycle.png" class="img-fluid figure-img" style="width:80.0%" alt="Research data life cycle"></a></p>
<figcaption>Research data life cycle</figcaption>
</figure>
</div>
<p>Throughout a project, there are different processing stages regarding data. You can illustrate the process as a life cycle with the following stages:</p>
<p>[<img src="images/RD-Lifecycle.png" class="img-fluid quarto-figure quarto-figure-left" style="width:80.0%" alt="Research data life cycle by Jürgen Rohrwild">]</p>
<p>A data management plan covers all stages of the research data life cycle by assigning questions to each stage. Addressing the questions relevant to your research project will result in a comprehensive DMP. Exemplary questions include:</p>
<ul>
<li>What data will be collected, and where do they come from?</li>
Expand All @@ -391,7 +386,7 @@ <h2 class="anchored" data-anchor-id="components-of-a-dmp">Components of a DMP</h
<li>What about Open Data? Do you plan to publish the data?</li>
<li>Does your project require personnel resources for data management? Does your project require special infrastructure?</li>
<li>How do you ensure the quality of your data?</li>
<li>Is your research project concerned with personal or sensitive data? What laws apply? Are there ethnic aspects you need to consider?<a href="#fn2" class="footnote-ref" id="fnref2" role="doc-noteref"><sup>2</sup></a></li>
<li>Is your research project concerned with personal or sensitive data? What laws apply? Are there ethnic aspects you need to consider?<a href="#fn1" class="footnote-ref" id="fnref1" role="doc-noteref"><sup>1</sup></a></li>
</ul>
<p>Please note that this list is incomplete, and the questions may vary depending on your discipline and data specifics.</p>
<div class="callout callout-style-default callout-note callout-titled">
Expand Down Expand Up @@ -422,7 +417,7 @@ <h2 class="anchored" data-anchor-id="example-data-storage-and-security">Example:
<p>Regarding data storage and security, the following three “S” encompass the topic: safe - secure - sustainable. Now, we dive into the main principles of each part:</p>
<section id="safe" class="level3">
<h3 class="anchored" data-anchor-id="safe">Safe</h3>
<p>Safety focuses on the protection of data against physical loss.<a href="#fn3" class="footnote-ref" id="fnref3" role="doc-noteref"><sup>3</sup></a> To ensure your data’s safety and recoverability, establish a regular backup routine. This involves creating copies of your data at specified times and storing them separately from the originals, ideally adhering to the 3-2-1 rule (see below). Consider using external hard drives or USB sticks for local backups.<a href="#fn4" class="footnote-ref" id="fnref4" role="doc-noteref"><sup>4</sup></a> Additionally, if your institution offers backup systems like <a href="https://doku.lrz.de/cloud-storage-kurzbeschreibung-11476147.html?showLanguage=en_US">LRZ cloud storage</a> or <a href="https://syncandshare.lrz.de/login">LRZ Sync+Share</a>, you can store your data where they have automated backup mechanisms. Another synched storage is <a href="https://keeper.mpdl.mpg.de/accounts/login/?next=/">Keeper</a>, a service available for all Max Planck employees.</p>
<p>Safety focuses on the protection of data against physical loss.<a href="#fn2" class="footnote-ref" id="fnref2" role="doc-noteref"><sup>2</sup></a> To ensure your data’s safety and recoverability, establish a regular backup routine. This involves creating copies of your data at specified times and storing them separately from the originals, ideally adhering to the 3-2-1 rule (see below). Consider using external hard drives or USB sticks for local backups.<a href="#fn3" class="footnote-ref" id="fnref3" role="doc-noteref"><sup>3</sup></a> Additionally, if your institution offers backup systems like <a href="https://doku.lrz.de/cloud-storage-kurzbeschreibung-11476147.html?showLanguage=en_US">LRZ cloud storage</a> or <a href="https://syncandshare.lrz.de/login">LRZ Sync+Share</a>, you can store your data where they have automated backup mechanisms. Another synched storage is <a href="https://keeper.mpdl.mpg.de/accounts/login/?next=/">Keeper</a>, a service available for all Max Planck employees.</p>
<div class="callout callout-style-default callout-warning callout-titled">
<div class="callout-header d-flex align-content-center">
<div class="callout-icon-container">
Expand All @@ -436,15 +431,15 @@ <h3 class="anchored" data-anchor-id="safe">Safe</h3>
<p>The 3-2-1 backup rule states that you should maintain <strong>three</strong> copies of your data on <strong>two</strong> different storage mediums (e.g.&nbsp;local storage and external hard drive), with <strong>one</strong> copy stored in a remote location. A remote copy can be stored in the cloud.</p>
</div>
</div>
<p>Remember, your backups should encompass your data files and include software applications if necessary. This ensures a comprehensive recovery if needed.<a href="#fn5" class="footnote-ref" id="fnref5" role="doc-noteref"><sup>5</sup></a></p>
<p>Remember, your backups should encompass your data files and include software applications if necessary. This ensures a comprehensive recovery if needed.<a href="#fn4" class="footnote-ref" id="fnref4" role="doc-noteref"><sup>4</sup></a></p>
</section>
<section id="secure" class="level3">
<h3 class="anchored" data-anchor-id="secure">Secure</h3>
<p>Protecting data against unauthorized access and data misuse is one of the main goals of security.<a href="#fn6" class="footnote-ref" id="fnref6" role="doc-noteref"><sup>6</sup></a> We recommend using access control mechanisms and encryption to prevent unauthorized access to data and to protect sensitive information. Confidential data is sensitive information that could cause harm if disclosed, such as details about endangered species, vulnerable archaeological sites, or personal information. Personal data is subject to strict privacy laws (cp.&nbsp;<a href="https://gdpr-info.eu/">General Data Protection Regulations</a>) and requires secure handling. To protect sensitive data, it is crucial to minimize the risk of identification through techniques like pseudonymization (i.e., replace personally identifiable information by a pseudonym) or anonymization (i.e., complete removal of personally identifiable information from the research data). Additionally, strong password protection using reliable password management tools is essential to prevent unauthorized access.<a href="#fn7" class="footnote-ref" id="fnref7" role="doc-noteref"><sup>7</sup></a></p>
<p>Protecting data against unauthorized access and data misuse is one of the main goals of security.<a href="#fn5" class="footnote-ref" id="fnref5" role="doc-noteref"><sup>5</sup></a> We recommend using access control mechanisms and encryption to prevent unauthorized access to data and to protect sensitive information. Confidential data is sensitive information that could cause harm if disclosed, such as details about endangered species, vulnerable archaeological sites, or personal information. Personal data is subject to strict privacy laws (cp.&nbsp;<a href="https://gdpr-info.eu/">General Data Protection Regulations</a>) and requires secure handling. To protect sensitive data, it is crucial to minimize the risk of identification through techniques like pseudonymization (i.e., replace personally identifiable information by a pseudonym) or anonymization (i.e., complete removal of personally identifiable information from the research data). Additionally, strong password protection using reliable password management tools is essential to prevent unauthorized access.<a href="#fn6" class="footnote-ref" id="fnref6" role="doc-noteref"><sup>6</sup></a></p>
</section>
<section id="sustainable" class="level3">
<h3 class="anchored" data-anchor-id="sustainable">Sustainable</h3>
<p>Data sustainability aims at making data persistent across technological and human evolution.<a href="#fn8" class="footnote-ref" id="fnref8" role="doc-noteref"><sup>8</sup></a> Concretely, this means choosing file formats that are unlikely to become obsolete and ensuring the long-term readability and accessibility of your data. For more details on this topic, revisit <a href="./data-organisation.html#file-formats">Part 1: Organization / File formats</a>.</p>
<p>Data sustainability aims at making data persistent across technological and human evolution.<a href="#fn7" class="footnote-ref" id="fnref7" role="doc-noteref"><sup>7</sup></a> Concretely, this means choosing file formats that are unlikely to become obsolete and ensuring the long-term readability and accessibility of your data. For more details on this topic, revisit <a href="./data-organisation.html#file-formats">Part 1: Organization / File formats</a>.</p>
</section>
<section id="example-answers-for-a-dmp" class="level3">
<h3 class="anchored" data-anchor-id="example-answers-for-a-dmp">Example answers for a DMP</h3>
Expand Down Expand Up @@ -634,7 +629,7 @@ <h2 class="anchored" data-anchor-id="why-is-a-dmp-helpful">Why is a DMP helpful?
</div>
</div>
<div class="callout-body-container callout-body">
<p>Many funding agencies ask for information on handling research data. The following table<a href="#fn9" class="footnote-ref" id="fnref9" role="doc-noteref"><sup>9</sup></a> provides an overview of the requirements of German and European funding agencies:</p>
<p>Many funding agencies ask for information on handling research data. The following table<a href="#fn8" class="footnote-ref" id="fnref8" role="doc-noteref"><sup>8</sup></a> provides an overview of the requirements of German and European funding agencies:</p>
<table class="caption-top table">
<caption>Overview of funder requirements</caption>
<thead>
Expand Down Expand Up @@ -716,7 +711,7 @@ <h2 class="anchored" data-anchor-id="dmp-tool-rdmo">DMP tool: RDMO</h2>
</div>
</div>
<div class="callout-body-container callout-body">
<p>In addition to RDMO, a variety of DMP tools exist. The following table<a href="#fn10" class="footnote-ref" id="fnref10" role="doc-noteref"><sup>10</sup></a> provides an overview of discipline-agnostic DMP tools that are freely available online:</p>
<p>In addition to RDMO, a variety of DMP tools exist. The following table<a href="#fn9" class="footnote-ref" id="fnref9" role="doc-noteref"><sup>9</sup></a> provides an overview of discipline-agnostic DMP tools that are freely available online:</p>
<table class="caption-top table">
<caption>Overview of DMP tools</caption>
<thead>
Expand Down Expand Up @@ -809,16 +804,15 @@ <h2 class="anchored" data-anchor-id="dmp-tool-rdmo">DMP tool: RDMO</h2>
<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document" role="doc-endnotes"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>based on: <a href="https://www.fdm-bayern.org/forschungsdatenmanagement/#fd-lebenszyklus">https://www.fdm-bayern.org/forschungsdatenmanagement/#fd-lebenszyklus</a><a href="#fnref1" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn2"><p>Questions based on: <a href="https://www.fdm.uni-hamburg.de/fdm/datenmanagementplan.html">https://www.fdm.uni-hamburg.de/fdm/datenmanagementplan.html</a><a href="#fnref2" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn3"><p>based on: <a href="https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/">https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/</a><a href="#fnref3" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn1"><p>Questions based on: <a href="https://www.fdm.uni-hamburg.de/fdm/datenmanagementplan.html">https://www.fdm.uni-hamburg.de/fdm/datenmanagementplan.html</a><a href="#fnref1" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn2"><p>based on: <a href="https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/">https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/</a><a href="#fnref2" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn3"><p>based on: <a href="https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/">https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/</a><a href="#fnref3" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn4"><p>based on: <a href="https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/">https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/</a><a href="#fnref4" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn5"><p>based on: <a href="https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/">https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/</a><a href="#fnref5" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn6"><p>based on: <a href="https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/">https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/</a><a href="#fnref6" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn7"><p>based on:&nbsp;<a href="https://doi.org/10.17605/OSF.IO/GDQ93">https://doi.org/10.17605/OSF.IO/GDQ93</a> and <a href="https://doi.org/10.17605/OSF.IO/GDQ93">https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/</a><a href="#fnref7" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn8"><p>based on: <a href="https://doi.org/10.1016/j.infoandorg.2023.100449">https://doi.org/10.1016/j.infoandorg.2023.100449</a><a href="#fnref8" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn9"><p>based on: <a href="https://doi.org/10.5281/zenodo.5773203">https://doi.org/10.5281/zenodo.5773203</a><a href="#fnref9" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn10"><p>based on: <a href="https://forschungsdaten.info/themen/informieren-und-planen/datenmanagementplan/">https://forschungsdaten.info/themen/informieren-und-planen/datenmanagementplan/</a>.<a href="#fnref10" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn5"><p>based on: <a href="https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/">https://www.baramundi.com/de-de/blog/artikel/unterschied-safety-security/</a><a href="#fnref5" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn6"><p>based on:&nbsp;<a href="https://doi.org/10.17605/OSF.IO/GDQ93">https://doi.org/10.17605/OSF.IO/GDQ93</a> and <a href="https://doi.org/10.17605/OSF.IO/GDQ93">https://www.forschungsdaten.info/themen/speichern-und-rechnen/datensicherheit-und-backup/</a><a href="#fnref6" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn7"><p>based on: <a href="https://doi.org/10.1016/j.infoandorg.2023.100449">https://doi.org/10.1016/j.infoandorg.2023.100449</a><a href="#fnref7" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn8"><p>based on: <a href="https://doi.org/10.5281/zenodo.5773203">https://doi.org/10.5281/zenodo.5773203</a><a href="#fnref8" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
<li id="fn9"><p>based on: <a href="https://forschungsdaten.info/themen/informieren-und-planen/datenmanagementplan/">https://forschungsdaten.info/themen/informieren-und-planen/datenmanagementplan/</a>.<a href="#fnref9" class="footnote-back" role="doc-backlink">↩︎</a></p></li>
</ol>
</section></div></main> <!-- /main -->
<script id="quarto-html-after-body" type="application/javascript">
Expand Down
Binary file added images/RD-Lifecycle.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading

0 comments on commit 1117caf

Please sign in to comment.