Note:
https://thenib.com
Note:
https://www.nature.com/news/polopoly_fs/7.36718.1464174471!/image/reproducibility-graphic-online3.jpg_gen/derivatives/landscape_630/reproducibility-graphic-online3.jpg
A paleontology journal has retracted a recent paper after discovering it had published the uncorrected version of the manuscript.
The mistake occurred after the
prompting the publisher to believe nothing had been changed and publishing the previous version. The journal initially told the authors it planned to publish an erratum that described the mistake as a production error, but then retracted the paper—seemingly without consulting the authors. However, the authors said they were happy with the outcome.
In March, 2013, a graduate student joined the lab of a prominent researcher in Australia...
Reflections by authors who had discovered they had made a mistake: https://dynamicecology.wordpress.com/2016/12/02/on-finding-errors-in-ones-published-analyses/ http://ecoevoevoeco.blogspot.com/2016/12/wrong-lot.html
What if a key person from your lab disappeared one day (family or personal emergency, no longer contactable)?
Could you all continue your work?
Would you know where all your data is stored?
Could you keep running effectively for 1 month?
Let's look at a few tools we can use to protect our research:
- Naming Conventions
- Folder Structures
- Automation
- Version Control
Let's look at a few tools we can use to protect our research:
- Documentation
- Folder Structures
- Automation
- Version Control ---?include=Step2Naming.md
Let's look at a few tools we can use to protect our research:
- Documentation
- Naming Conventions
- Automation
- Version Control
Let's look at a few tools we can use to protect our research:
- Documentation
- Naming Conventions
- Folder Structures
- Version Control
Let's look at a few tools we can use to protect our research:
- Documentation
- Naming Conventions
- Folder Structures
- Automation
Or your office is robbed? Could you continue your work? Is your data backed up? Encrypted?
Let's look at a few tools we can use to protect our research:
- Backing up to the cloud
- Computer Security
- Deidentifying your data
Let's look at a few tools we can use to protect our research:
- Backing up to the cloud
- Deidentifying your data Note: While Computer security isn't really about reproducibility, it is important. Plus I wanted to highlight encrypting hard drives ---?include=Step7CompSecurity.md
Let's look at a few tools we can use to protect our research:
- Backing up to the cloud
- Computer Security
Now let's look at after a project has finished
Someone has published contradicting results to your published paper, and you've been asked to provide your data and methods. Could you?
- Storing our data in the cloud
- Documentation
- Versions of software
New tool
if a research partner organization believes your "sensitive" data has been made available to others (ie a data breach). Could you show that steps were taken to avoid this or show that it couldn't happen?
- Owncloud or Research Space – tracing who you have shared a file (Step 6 Cloud Backups)
- Computer encryption (Step 7 Good Computer Safety)
- General good computer safety – unique passwords and use Multi factor Auth when possible (Step 7 Good Computer Safety)
- Separating identified variables (Step 8- Deidentifying your data)
Thank you for coming!



