Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8kt4b Total loading time: 0 Render date: 2024-07-04T22:07:23.715Z Has data issue: false hasContentIssue false

12 - Practical Data Management

Published online by Cambridge University Press:  21 September 2019

Get access

Summary

Aims

The aim of this chapter is to review the aspects of practical data management that have a bearing on RDM. It will help you think about the day-to-day data management issues researchers face as an important aspect of RDM.

Introduction

The issues dealt with in this chapter can be introduced by the story of the poster that was supposedly once seen in a university computer lab. The poster offered a reward to whoever had stolen a laptop. It did not ask for the return of the laptop or even all the data on it, just the files in a single folder called ‘thesis data’. The poster explained that the folder contained the student's only copy of the data for their PhD, and that if it is not recovered the student cannot complete their doctorate. Quite a large reward was offered, but it was negotiable. The student was willing to pay more for the files. The thief was welcome to keep the laptop. No questions would be asked of whoever claimed the reward. We don't know if anyone did claim the reward. Actually we don't know if the whole story is true. It could be. It reflects that if data is core to some research work, the loss of data is a critical area of risk.

Laptops get stolen or lost all the time. They are notoriously unreliable. Surely people know this and back up their data and document the backups? Actually, no, the evidence seems to be that people are quite bad about managing their ‘stuff’, even critical files: they are not necessarily good at managing risk in an intelligent way. Unexpected eventualities such as fires or natural disasters do happen, which can endanger valuable material such as research data. In a rapidly changing technical environment people can be unclear about the changing nature of the risks they are taking with digital material. For example, cloud storage seems like an easy solution to storing a lot of data. But of course there are security issues. The proliferation of cloud storage platforms itself can lead to losing track of data.

Type
Chapter
Information
Publisher: Facet
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×