Skip to content

Commit

Permalink
Update dmp.md
Browse files Browse the repository at this point in the history
fix typos
  • Loading branch information
quetzal1234 authored Jan 10, 2024
1 parent 80c35d8 commit ee9f757
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions episodes/dmp.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ The components of a DMP may vary depending on the funding agency. Always check t
The [2013 OSTP Memo](https://obamawhitehouse.archives.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf) defines data as “digital recorded factual material commonly accepted in the scientific community as necessary to validate research findings including data sets used to support scholarly publications, but does not include laboratory notebooks, preliminary analyses, drafts of scientific papers, plans for future research, peer review reports, communications with colleagues, or physical objects, such as laboratory specimens (OMB circular A-110)”. This section of a DMP provides a brief description of what data will be collected as part of the research project and their formats. Information about general files size (MB / GB per file) and estimated total number of files can be helpful. It is not necessary for researchers to describe their experimental process in this section.

#### Example
**From a project examining the link between religion and sexual violence.** This study will generate data primarily through (1) participant observations of support groups for those abused by clergy and (2) in-depth, semi-structured interviews with these individuals. Data will be collected via phone calls and video calls hosted on encrypted and passcode-protected conferencing platforms. Data will be collected in the form of audio recordings (MP3, collected on an external recording device free of any network connections), transcriptions of these recordings, physical notes taken during participant observation sessions, and any documents (e.g., email correspondences, scanned copies of letters or photographs) that respondents voluntarily choose to share with the researchers. All data in this study will be de-identified and associated with an anonymizing alpha-numeric code. The research team anticipates that most of these data will be preserved in DOCX, JPG, MP3, PDF, PNG, TXT, or XLSX format. [Source](https://dmptool.org/plans/48540/export.pdf?export%5Bquestion_headings%5D=true) (slightly modified)
**From a project examining the link between religion and sexual violence:** This study will generate data primarily through (1) participant observations of support groups for those abused by clergy and (2) in-depth, semi-structured interviews with these individuals. Data will be collected via phone calls and video calls hosted on encrypted and passcode-protected conferencing platforms. Data will be collected in the form of audio recordings (MP3, collected on an external recording device free of any network connections), transcriptions of these recordings, physical notes taken during participant observation sessions, and any documents (e.g., email correspondences, scanned copies of letters or photographs) that respondents voluntarily choose to share with the researchers. All data in this study will be de-identified and associated with an anonymizing alpha-numeric code. The research team anticipates that most of these data will be preserved in DOCX, JPG, MP3, PDF, PNG, TXT, or XLSX format. [Source](https://dmptool.org/plans/48540/export.pdf?export%5Bquestion_headings%5D=true) (slightly modified)


### Metadata and Data Standards
Expand All @@ -86,7 +86,7 @@ Metadata is information that describes, explains, locates, classifies, contextua
The data timeline includes information about when data will be backed-up, preserved, and published. Some agencies specify in their policies when the dataset must be shared, such as at the end of the reporting period (the active research phase). In addition to specifying their timelines, this section requires researchers consider what measures they need to take to ensure data security. Raw data may include identifiers such as PII or sensitive information such as location of endangered species that should be protected during collection and processing. Examples of good security practices include using access restrictions such as passwords, encryption, power supply backup, and virus and intruder protections. Active storage location and appropriate software will depend on data sensitivity level. In addition, before sharing any sensitive data with collaborators or depositing into a repository, the dataset should be de-identified or aggregated.

::: callout
Although there are many data de-identification methods, it is beyond the scope of this lesson. For more information, please see the further reading resources in Episode 6.
Although there are many data de-identification methods, it is beyond the scope of this lesson. For more information, please see the further reading resources on the [reference page](https://ucla-imls-open-sci.info/dmp101/reference.html).
:::

#### Example
Expand Down

0 comments on commit ee9f757

Please sign in to comment.