Forskning

Before the project starts

Research planning, approval, and fundraising steps (and expected timeline)

Step 1: Project description

All research projects with a CED employee as principal investigator start with the template below.

Fill in the items in the Word document and send it to AMM so that we can start the registration processes as necessary.

In total, no more than 5 pages.

Step 2: Data Management Plan

DeiC DMP

The DeiC DMP is a tool for writing data management plans. The DeiC DMP must be filled in and sent to AMM before the start of the project.

It is a good idea to prepare ahead. The DeiC DMP will ask you to fill in the following information:


1. Project details

What research project are you planning? 
(If applying for funding, state the project title exactly as in the proposal)
or
Tick box: Mock project for testing, practice, or educational purposes

Select the primary research organization:
Aarhus University

Select the primary funding organization
or
Tick box: No funder associated with this plan or my funder is not listed

→ Create plan


2. Project details

Project abstract: Briefly summarise your research project to help others understand the purposes for which the data are being collected or created.

Project start: fill in date           Project end: fill in date

ID: A pertinent ID as determined by the funder and/or by the organisation

Funder

Funding status: choose between: planned, funded, denied

Grant number/ URL

→ Save


3. Contributors

Please list the project’s Principal Investigator(s) and those responsible for data management.

Fill in for each contributor: Name, e-mail, ORCID (if relevant), affiliation, role (data manager, principal investigator, project administrator, other – multiple selection is possible)

→ Save and add additional contributors


4. Plan overview

Consider the questions below

  • Data Collection
    What data will you collect or create?
    How will the data be collected or created?
  • Documentation and Metadata
    What documentation and metadata will accompany the data?
  • Ethics and Legal Compliance
    How will you manage any ethical issues?
    How will you manage copyright and Intellectual Property Rights (IPR) issues?
  • Storage and Backup
    How will the data be stored and backed up during the research?
    How will you manage access and security?
  • Selection and Preservation
    Which data are of long-term value and should be retained, shared, and/or preserved?
    What is the long-term preservation plan for the dataset?
  • Data Sharing
    How will you share the data?
    Are any restrictions on data sharing required?
  • Responsibilities and Resources
    Who will be responsible for data management?
    What resources will you require to deliver your plan?

→ Write plan (on the basis of the questions above)


5. Share

Set plan visibility

  • Private: restricted to you and your collaborators.
  • Organisational: all registered DMPonline users from your organisation can view.*
  • Public: anyone can view your plan in the Public DMPs list.*

*Public or organisational visibility is intended for finished plans. You must answer at least 50% of the questions to enable these options.

Manage and invite collaborators
Fill in emails and permissions (co-owner, editor, read only)


6. Download

Choose format and settings (eg. PDF, font etc.)


Liaison librarian

Videos about research data management

Within the framework of the National Forum for Research Data Management, Danish universities have created videos about research data management. There are three videos: Introduction, FAIR principles, and data management plans.

Each video is about 20 minutes.

Instructions for storage and processing of research data

Research data management may be perceived as a troublesome task, but it offers many advantages. For example, good data management can:

  • help your peers and yourself to understand your research project and its data
  • make it easier to collaborate and share data
  • make your research more visible, which in turn can lead to more citations
  • make your research more transparent, reliable and reproducible
  • avoid data loss.

Remember that you must always comply with AU's "Instructions for storage and processing of research data".

Get an overview of how to process data in the various phases of your research: https://medarbejdere.au.dk/en/research-data-management.

Step 3: Potential approvals

Approval from UU

For approval from the Education Committee (UU - Uddannelsesudvalg), contact AMM.

Fortegnelsen (the AU record)

Remember to register processing of personal data to the record:

If you are processing personal data in connection with a research project, a database, or biobank, it must be registered on AU's record before you start.

Here you can find information about the AU record and report your project: https://medarbejdere.au.dk/informationssikkerhed/databeskyttelse/saerligt-om-forskning/anmeld-projekt-til-fortegnelsen

Remove registration of processing of personal data from the record

When you have completed your research project, you must first find out whether it is still necessary to store personal data in accordance with the rules regarding responsible conduct of research or according to the rules in the special legislation.

To remove registration of processing of personal data from the record: https://medarbejdere.au.dk/en/informationsecurity/data-protection/for-scientific-staff/remove-project-from-the-record

Data offboarding

As an employee at the CED, you need to decide what will happen to your research data if your employment at the CED ends (i.e. data offboarding).

You have three choices:

  1. Data must be deleted. Here you need to pay attention to the Danish Code of Conduct for Research Integrity (in Danish: Den danske kodeks for integritet i forskning), which stipulates that data should be kept for at least five years from the date of publication.
  2. Data must be archived at CED. Here you need to appoint a new contact person for your research data.
  3. Data must be passed on to a new institution/place of employment. First, it needs to be assessed whether a transfer is possible and then a transfer agreement must be in place.

AU Research Ethics Committee

When you have gone through all of the above steps, you need to get your studies approved by the Research Ethics Committee:

Fundraising

Finding potentially relevant funds

Getting heads-up about possible upcoming deadlines for funds not supported by the Research Support Office, sign up at the Research Professionals database.

Research Professional is an external funding database with a comprehensive coverage of especially European and other international funding opportunities within all research areas.

at Aarhus University have access to the database, and the search results can be saved, downloaded or shared with colleagues. 

All AU employees with an email address and AUID can access and create an account through IP recognition (on campus or with VPN) or via WAYF.

When signing up, you will continuously be notified of funding opportunities that are relevant to you or your research group.

Preparing and visualising own bibliometrics

For help regarding citations, H-Index, visualisation of personal research flow, and collaborations, contact:

Feedback on application content

Collegial feedback from other CED researchers and international research colleagues is essential for application success.

Therefore, we expect all PI at the CED to seek peer feedback at the CED or from international colleagues before sending their application.

We expect all senior researchers at the CED to give collegial feedback willingly and constructively when asked, either at research group meetings or between them after direct agreement between teams.

Budgeting

Ask Birthe Tillgaard for help. She has dedicated time for research application budgets. She is also the CED internal controller and follows the project in all its phases if fundraising succeeds.

Language feedback and proofreading

Ask Lone Folmer Nielsen for help. She has dedicated time for text commenting and proofreading and a MA in Rhetoric.

Approval

Most foundations expect explicit management approval. Contact AMM.

Guiding principles for the use of external funds

The CED employees are continuously involved in projects and activities that are financed by external funding. We want to actively increase the CED’s external funding so more employees will, hopefully, get to have (parts of) a task financed by grants of various kinds. Therefore, this section outlines the guiding principles for the use of such funds.

First and foremost, please note that whether you have raised the funds yourself or are the project owner, all funds in the CED’s account system are public and belong to the university, not the individual employee. Administration rules must always be followed and the CED’s management must be able to account for how the funds have been used. Therefore, both the management and the CED’s internal finance officer (Birthe Tillgaard) are keeping an eye on your administration of external public funds. The management also has opinions on how funds are spent. We have a duty to have that.

Externally funded research and development projects

The project owner must operate within the budget framework, which is divided into individual budget items, for example, meetings and conferences, student workers, or technical equipment. Expenses exceeding the budgeted amount for an individual budget item must always be approved, even if there are available funds for other budget items within the budget framework. In case of doubt, discuss the matter with your immediate manager. All plans for any hiring (except for the use of student workers) must be explicitly discussed with the immediate manager before being initiated. Quarterly, AMM reviews larger grants.

Other externally funded activities

Activities in this category include for example, income from ordinary FTE-based teaching, courses organised by the graduate schools, or salary reimbursement from projects anchored outside the CED. These activities are seen as part of the employee’s task portfolio. Therefore, the funds go to the CED. Employees can, of course, discuss their wishes for the use of the funds with their immediate manager.

GDPR and cyber security

Data protection (GDPR): Personal data and research

Personal data is any type of information that can be attributed to a specific person, even if the person can only be identified if the data is combined with other information. 

When working with personal data as part of your research, it is important that you comply with relevant legislation. Here you can gain an overview of what you need to know about GDPR. Follow the steps in the link on what to do BEFORE, DURING, and AFTER your project:

E-learning course: Research Integrity at Aarhus University

You can access the e-learning course ‘Research Integrity at Aarhus University’ in Brightspace. The course is only available to academic staff members, for whom it is mandatory.   

Dealing with foreign interference and espionage

In collaboration with the Center for Cyber ​​Security and the Ministry of Higher Education and Science, the national security and intelligence service (PET - Politiets Efterretningstjeneste) has created a handbook with advice for researchers and employees on handling foreign interference and espionage.

They offer 10 security tips:

  1. Beware of the threat
  2. Assess the  value of your research
  3. Know relevant legislation
  4. Know your international partners
  5. Take good care of your employees and colleagues
  6. Focus on IT security
  7. Focus on physical security
  8. Set the framework for visitors
  9. Be careful when travelling
  10. Report what you see

You can read more in the handbook here: