Data Management Plan: Nuclear Energy Sector Risk Management ENEC

Verified

Added on  2023/06/13

|8
|1494
|155
Report
AI Summary
This document presents a comprehensive data management plan focusing on risk management within the nuclear energy sector, specifically referencing the Emirates Nuclear Energy Corporation (ENEC). It details the purpose of data collection, project objectives, data types and formats, data origin, expected data size, and data utility. The plan emphasizes Findable, Accessible, Interoperable, and Re-usable (FAIR) data principles, covering file naming conventions, metadata creation, data accessibility, and data licensing. It also addresses data storage and security measures, including secure data transfer and ethical aspects related to data sharing. The plan outlines data quality assurance processes and references relevant technical aspects for data sharing, highlighting the importance of data encryption and controlled access to sensitive information.
Document Page
Running head: DATA MANAGEMENT PLAN
Data Management Plan
Name of student
Name of University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DATA MANAGEMENT PLAN
Table of Contents
1. Data Summary.................................................................................................................................2
2. Findable, Accessible, Interoperable and Re-usable (FAIR) Data....................................................3
3. Data Storage and Security...............................................................................................................5
4. Ethical Aspects................................................................................................................................6
References....................................................................................................................................................7
Document Page
2DATA MANAGEMENT PLAN
1. Data Summary
a. Purpose of data collection or generation
Collection of data is essential to make a decision that require facts and evidence about the
particular topic under which the study has done. The data that has collected for the particular
study is for the case of the government risk management of the Nuclear Energy Sector. It provide
information for the state operation and communicate with the potential elements and providing
threats to the organization where they have compromise on the stockholder health and safety.
b. Project objective
The main objective of the study will comprise the information related to the risk in the
project
c. Type and formats of data generated or collected
The format that has to be generated for the data will be of risk management of the
government, name of the Nuclear Energy Sector, YYYY-MM-DD example: RM_NES_2018-04-
09.doc (Ukdataservice.ac.uk, 2018).
d. Origin of the data
It has been identified from the case that the risk assessment that has been conducted in
the past has provided in the annual report. Through this evidence the data has been collected. The
data provide insight about present condition of the organization in different department. The risk
factor has been analyzed in the report. All the fund that has allocated for different departments
will be identified from the Organization’s budget. Therefore, during the process of risk
management the requirement of the fund will be identify.
Document Page
3DATA MANAGEMENT PLAN
e. Expected size of the data
While estimating through the spreadsheet, the cumulative data that will be collected for
this particular data may be around 1 MB to 2 MB. However, it should not exceed 2 MB.
f. Outline utility of data
The data that has created contain some significant insight with similar circumstances
under the same organization. There are other project in which this process can help in identifying
the risk.
2. Findable, Accessible, Interoperable and Re-usable (FAIR) Data
a. Data findable
File naming or versioning convention or structure that will be used. The data will be store
in accordance with the associated department. Based on the investigation the data will be
chronologically arranged. For word document the file name has to use in the
sectorname_filename_YYYY-MM-DD.dox format. In this case it can be named as
RM_NES_2018-04-09.doc or RM_NES_2018-04-09.xlxs for excel spreadsheet. If it contains a
version than the format of the data should be filename_versionnumber. Example:
RiskManage_v1 (Ukdataservice.ac.uk, 2018).
b. Openly making data accessible
i. Specifying data openly accessible
The organization private data cannot be access with admin permission as it contain useful
information about sector of Nuclear Energy. The risk could be high if the data is shared.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DATA MANAGEMENT PLAN
Therefore, the private data has to be safeguard to get the interest in holding the
organization.
ii. Specifying the software tools or method to access the data
The software tools to access the data will be PGP Zip (Shelton 2015). To create PGP Zip, it
is require to click on Open PSP Desktop>File>New>PGP Zip. Then need to select the
encryption type. If selected encryption is PassPhrase then no key is require and if selected
encryption need public key then the user need to click +, public key of the team member
wish to encrypt to need to be selected and then click Ok. To add files or folder user has to
click +, browse desired file or folder and Click on Add.
iii. Specifying data, documentation and code deposited and know whether external
repository will be used
If the public key has to be encrypted the recipients has to specify it. If the user need any
external repository than they data has to be store on GIT repository privately and only
allow team member to secretly open the data.
c. Data re-use
i. Specifying ways to license the data
Data has to License so that other user can access, use and share the organization data
(Pfenninger et al. 2017). Data licensing will have one or more IP rights to protect it.
Prohibits other member to use the secure data until authorized by the admin
Specifying which data can be encrypted and which cannot
Requires promises from the user who encrypts the data that should not be used in any
other inappropriate manner.
ii. Specifying data reuse availability
Document Page
5DATA MANAGEMENT PLAN
In order to make the data available for reuse, proper planning and publication is require
from the start. Appropriate citation, data licening approach are required. In metadata
standard vocabularies should be used to enable reuse. Ethical permission need for sharing
resulted data
iii. Data quality assurance processes
The data quality assurance has five key processes with high quality attributes (Vetrò et al.
2016):
- Validity: In face validity, data must be a true indicator with a valid result. The
attribution of the indicator if change then it has to be associated with the USAID
interventions. It has two types of measurement error namely sampling error and
non-sampling error.
- Reliability: for a reliable data, the method of collecting and analyzing should
remain stable.
- Precise: Precise data present actual picture of what is happening with sufficient
details.
- Integrity: data integrity reduce possible bias that are protected by the system.
- Timeliness: the user has to check for availability of data are enough for making
decisions of program management and check whether data reported are practically
available.
3. Data Storage and Security
a. Data recovery, secure storage of data, transferring of sensitive data (DropBox)
The storage of data has to be secure as it contains some confidential information about
the organization. Therefore, DropBox can be one option to store the data and later recover it
Document Page
6DATA MANAGEMENT PLAN
anytime whenever needed. In this case, DropBox has been use with the premium package of 1
TB. This will enable the user to store data and share the information with different members of
the team. Cloud storage ensure the data security and hence allow sharing of data to the team
member confidentially with easy use. For encryption of the file the user has to download the
PGP Zip software to open the file and ask for the password from the concern department.
4. Ethical Aspects
a. References and technical aspects related to data sharing within consent forms
The concept of provisioning data sharing within the consent form should be inside the
organization asset not outside the organization. The data that are created on another application
relies on the project team. The team has to find, extract the file, encrypt and deliver the data on
the system that can support as per the need of the team members. Each member of the team build
their own code to retrieve the data from the source system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7DATA MANAGEMENT PLAN
References
Pfenninger, S., DeCarolis, J., Hirth, L., Quoilin, S. and Staffell, I., 2017. The importance of open
data and software: Is energy research lagging behind?. Energy Policy, 101, pp.211-215.
Shelton, M.L., 2015. The Role of Corporate and Government Surveillance in Shifting
Journalistic Information Security Practices. University of California, Irvine.
Ukdataservice.ac.uk. (2018). UK Data Service » Organising data. [Online] Available at:
https://www.ukdataservice.ac.uk/manage-data/format/organising [Accessed 9 Apr. 2018].
Ukdataservice.ac.uk. (2018). UK Data Service » Versioning. [Online] Available at:
https://www.ukdataservice.ac.uk/manage-data/format/versioning [Accessed 9 Apr. 2018].
Vetrò, A., Canova, L., Torchiano, M., Minotas, C.O., Iemma, R. and Morando, F., 2016. Open
data quality measurement framework: Definition and application to Open Government Data.
Government Information Quarterly, 33(2), pp.325-337.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]