{"tema_id":"2001","string":"Data curation, security and re-use","created":"2021-12-08 13:57:31","code":"RC2","modified":"2022-08-11 19:17:08","notes":[{"@type":"Scope note","@lang":"en-GB","@value":"Assessment of\u00a0 data curation requirements (e.g. retention schedule, storage, accessibility, sharing requirements, etc.)\nand data security requirements (e.g.\nrestricted access, protected drives, etc.) and the actual curation (process of overseeing) of data.\nSources:\nSource: DaLiCo Team (2022). \nChantel Ridsdale, Rothwell, J., Smit, M., Ali-Hassan, H., Bliemel, M., Irvine, D., Kelley, D., Matwin, S., &amp; Wuetherick, B. (2015). Strategies and Best Practices for Data Literacy Education: Knowledge Synthesis Report [Report]. https:\/\/doi.org\/10.13140\/RG.2.1.1922.5044\n\u00a0"},{"@type":"","@lang":"en-GB","@value":"Assessment of\u00a0 data curation requirements (e.g. retention schedule, storage, accessibility, sharing requirements, etc.)\nand data security requirements (e.g.\nrestricted access, protected drives, etc.) and the actual curation (process of overseeing) of data.\nSources:\nSource: DaLiCo Team (2022). \nChantel Ridsdale, Rothwell, J., Smit, M., Ali-Hassan, H., Bliemel, M., Irvine, D., Kelley, D., Matwin, S., &amp; Wuetherick, B. (2015). Strategies and Best Practices for Data Literacy Education: Knowledge Synthesis Report [Report]. https:\/\/doi.org\/10.13140\/RG.2.1.1922.5044\n\u00a0"}]}