There is a really good section on guidance and explanations to help researchers fill out a DMP and to assure that all relevant aspects of research data management are covered.
This guide is divided into three parts:
Core Requirements for Data Management Plans: six aspects that every DMP should cover, with detailed guiding questions.
Criteria for the Selection of Trustworthy Repositories: four topics detailing criteria that every trusted repository should meet.
Guidance: more detailed information and examples to support the implementation of the requirements and criteria into an organisation’s policies.
I am a data scientist, software engineer and architecture consultant passionate in solving big data analytics problem with distributed and parallel computing, Machine learning and Data mining, SaaS and Cloud computing.
Web provides cost-effective prices for data and process models, data mining process, data conversion process risk, data quality process at outsource data processing
Privacy is a micro concern, i.e. it refers to individual database records, while data mining tools want to learn macro rules that hold for a large fraction of the database. Techniques that publish data while preserving the right balance between individual
Web search engines have changed our lives - enabling instant access to information about subjects that are both deeply important to us, as well as passing whims. The search engines that provide answers to our search queries also log those queries, in order to improve their algorithms. Academic research on search queries has shown that they can provide valuable information on diverse topics including word and phrase similarity, topical seasonality and may even have potential for sociology, as well as providing a barometer of the popularity of many subjects. At the same time, individuals are rightly concerned about what the consequences of accidental leaking or deliberate sharing of this information may mean for their privacy. In this talk I will cover the applications which have benefited from mining query logs, the risks that privacy can be breached by sharing query logs, and current algorithms for mining logs in a way to prevent privacy breaches.