570 search results for “data” in the Staff website
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
s.van.der.hof@law.leidenuniv.nl | +31 71 527 8838
-
Researcher develops Google for archaeologists
An incredible quantity of archaeological reports are stored in digital archives. If you want to search for information in them, you have to do this manually. And that is a real chore. Archaeologist Alex Brandsen has now used deep learning, a form of artificial intelligence, to develop a search engine…
-
Storage and sharing
Estimate the amount of data you have created and what will be added?
-
What to archive?
Start thinking in advance about the selection for long-term preservation.
-
Open Science and archiving
Slowly but surely Open Science is becoming a standard in scholarly research, making it more open, collaborative, transparent, and after all FAIR, from its planning stages to publishing and re-use of data.
-
Informed consent
If you handle personal data, there are a number of legal grounds on which this can be done. One example involves obtaining consent from the person in question, also known as 'informed consent'. This informed consent must adhere to several requirements.
-
Directory structure and file naming
Think of a clear and consistent directory structure.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Tooling
Standard software is provided through the Software Centre.
-
ICT and research
ICT plays an important role in scientific research. With the help of ICT it is easier to collect, manage, analyse and share complex research data.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Metadata
Keep in mind a fellow researcher: someone who knows your area of expertise, but not necessarily as well as you do. Are your files understandable as they are, or do they need cleaning enhancement? Keep the right balance: make sure the metadata is sufficient for reuse, but do not get carried away and…
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Project Management
Create an inventory of all the people/roles (potentially) involved in the research project, including their roles and responsibilities (concerning the research data), as well as how they relate to the university.
-
Privacy Service Point
The Privacy Service Point is responsible for the application of and compliance with privacy legislation.
-
Qualtrics
Qualtrics survey software allows you to create online questionnaires for your research. It provides various question types, branch logic and the possibility to export results to statistical software, such as SPSS.
-
Open Access and access rights
Complete open access may not be possible because of various reasons: research ethics, privacy legislation, intellectual property, continuing research. The Easy archive at KNAW/DANS provides various access levels to deal with these issues.
-
SAILS Lunch Time Seminar
Lecture
-
Information Security
Taking care of storing your data and making timely backups is a crucial step of good research data management practices because it is not possible to archive something that has been lost.
-
Policies, codes of conduct, and laws
There are regulatory policies and recommendations in place, which you should comply with and take into consideration during your research.
-
Research Ethics
The Ethics Committee gives binding advice on ethical issues in research. This may be the case when you handle sensitive data. But also in other cases, like handling human remains, the Ethics Committee may require you to take steps to protect your data, which will implicate Research Data Management.
-
Reporting incidents
Information security is essential for Leiden University. This means not only that we deal with (sensitive) information in a secure and conscious manner, but also that incidents are reported as soon as possible. You can read below how to report incidents.
-
Creating web forms
If you need to create online forms, you can do this using Formdesk. This tool can be used for registrations for events and for asking for feedback.
- Vacancies
-
Use safe tools
Using secure tools ensures that information and personal data are well protected. ‘Tools’ refers to software that can help you perform your work efficiently, such as email software or a file-sharing system. To quickly see whether a specific tool is permitted, check the tool picker!
-
Programming in Python
Training
-
Quantitative Empirical Research Methods in Law
-
October is Cybersecurity Awareness Month: tips for working privacy and security smart
Security
-
File formats
For people to reuse your data, the file formats you publish them in must be “open” as well.
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…
-
Academic integrity
The integrity and reliability of academic research are of fundamental importance to the University. All parties, both within and outside the University, must be able to have confidence that our research is conducted in a scrupulous, fair, verifiable, impartial and independent manner.
-
Mobile telephony
If you need a mobile telephone or a mobile subscription or data-only subscription, can apply for it via the helpdesk portal. You can also contact the helpdesk portal if you need to change or cancel a mobile or data-only subscription.
-
Camera surveillance
Whether you’re a student, staff member or external service provider, it’s important that you feel safe at Leiden University. A range of measures are in place to assure safety and security in all the university’s buildings and grounds.
-
Registration and contract
As you are a new Leiden University staff member, a number of things must happen before we can draw up your contract and activate your ULCN account. This is also the case if you are affiliated with the university as external staff, for example if you were hired as a freelancer.
-
Application forms
Did you forget your password and do you want to request a new one? Do you want to modify storage for a workgroup, including access rights? Or do you want to submit another request for our ICT services or products? Please use the forms below.
-
Teaching academic integrity
Within all bachelor’s and master’s programmes, depending on the type of programme, attention is paid to ensuring that academic research is carried out scrupulously. For each programme, this is done in a way that is appropriate for the discipline in question.
-
Version Management
Determine how you keep track of the final version and intermediate versions.
-
Check it: work privacy and security smart
We can all do our bit to keep our information and personal data safe. It’s easier than you think and is often about the small things. Working privacy and security smart means protecting your own data and that of your colleagues. Want to know how best to go about that? Check it out here!
-
Workshops and training courses
Why do I have to keep entering a code to log in? How can I be sure that I am keeping my workplace safe? How can I identify phishing emails? And how do I know if something is a data breach?
-
Education Dashboard
Leiden University’s Education Dashboard contains key data for all the university’s degree programmes. Please note that at present the dashboard is only available in Dutch. For more information see the Dutch staff website or send an email to cijfers@bb.leidenuninv.nl.
-
Lock your screen
Locking your screen before leaving your desk: it’s so easy to do but we often forget. This quick action protects both you and the university. Do you always lock your screen when you leave to get a coffee, walk to the printer or chat with a colleague in the corridor?
-
Cybersecurity: how can you reduce the risk of reputational damage to the University?
ICT
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Report incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
Activating and managing your account
You can activate and manage your account via Account Services. To make the best use of Account Services, it is important that you set your account properly the first time you use it.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.
-
ORCID iD and DOI
An ORCID iD is a unique code that identifies you as a scientist in a reliable and consistent way, much like the social security number in a passport. DOI does the same but for a scientific publication instead of a person. DOI and ORCID iD are examples of persistent identifiers.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Cybersecurity: How to avoid falling victim to social engineering?
ICT