Metadata integrity in bioinformatics: Bridging the gap between data and knowledge

被引:2
|
作者
Caliskan, Aylin [1 ]
Dangwal, Seema [2 ]
Dandekar, Thomas [1 ]
机构
[1] Univ Wurzburg, Dept Bioinformat, Bioctr, D-97074 Wurzburg, Germany
[2] Stanford Univ, Stanford Cardiovasc Inst, Dept Med, Sch Med, Stanford, CA 94305 USA
关键词
Meta-data; Error; Annotation; Error-transfer; Wrong labelling; Patient data; Control group; Tools overview; CONTROLLED VOCABULARIES; GENE-EXPRESSION; CELL; CHALLENGES; ONTOLOGIES;
D O I
10.1016/j.csbj.2023.10.006
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
In the fast-evolving landscape of biomedical research, the emergence of big data has presented researchers with extraordinary opportunities to explore biological complexities. In biomedical research, big data imply also a big responsibility. This is not only due to genomics data being sensitive information but also due to genomics data being shared and re-analysed among the scientific community. This saves valuable resources and can even help to find new insights in silico. To fully use these opportunities, detailed and correct metadata are imperative. This includes not only the availability of metadata but also their correctness. Metadata integrity serves as a fundamental determinant of research credibility, supporting the reliability and reproducibility of data-driven findings. Ensuring metadata availability, curation, and accuracy are therefore essential for bioinformatic research. Not only must metadata be readily available, but they must also be meticulously curated and ideally error-free. Motivated by an accidental discovery of a critical metadata error in patient data published in two high-impact journals, we aim to raise awareness for the need of correct, complete, and curated metadata. We describe how the metadata error was found, addressed, and present examples for metadata-related challenges in omics research, along with supporting measures, including tools for checking metadata and software to facilitate various steps from data analysis to published research.
引用
收藏
页码:4895 / 4913
页数:19
相关论文
共 50 条
  • [1] Bridging the Knowledge Gap between Operational Databases and Data Warehouses
    Jukic, Nenad
    Jukic, Boris
    PROCEEDINGS OF THE ITI 2009 31ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2009, : 403 - +
  • [2] Bridging the knowledge gap between transactional databases and data warehouses
    Jukic N.
    Jukic B.
    Journal of Computing and Information Technology, 2010, 18 (02) : 175 - 181
  • [3] Mind the gap: Bridging the gulf between bioinformatics and cheminformatics.
    Langton, W
    Higgins, M
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2001, 221 : U459 - U459
  • [4] Towards a knowledge driven framework for bridging the gap between software and data engineering
    Solanki, Monika
    Bozic, Bojan
    Dirschl, Christian
    Brennan, Rob
    JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 149 : 476 - 484
  • [5] BRIDGING THE (KNOWLEDGE) GAP BETWEEN PHYSICS AND DYNAMICS
    Gross, Markus
    Malardel, Sylvie
    Jablonowski, Christiane
    Wood, Nigel
    BULLETIN OF THE AMERICAN METEOROLOGICAL SOCIETY, 2016, 97 (01) : 137 - 142
  • [6] Stroke: Bridging the Gap Between Knowledge and Practice
    Wright, Katie M.
    Werstler, Judy
    STROKE, 2011, 42 (03) : E238 - E238
  • [7] Ethics and Integrity in Research: Why Bridging the Gap Between Ethics and Integrity Matters
    Magalhaes, Susana
    JOURNAL OF ACADEMIC ETHICS, 2024, : 137 - 147
  • [8] DISCOS: Bridging the Gap between Discourse Knowledge and Commonsense Knowledge
    Fang, Tianqing
    Zhang, Hongming
    Wang, Weiqi
    Song, Yangqiu
    He, Bin
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 2648 - 2659
  • [9] On Bridging the Gap between Control Flow Integrity and Attestation Schemes
    Ammar, Mahmoud
    Abdelraoof, Ahmed
    Vlasceanu, Silviu
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 6633 - 6650
  • [10] On Bridging the Gap between Control Flow Integrity and Attestation Schemes
    Ammar, Mahmoud
    Abdelraoof, Ahmed
    Vlasceanu, Silviu
    Proceedings of the 33rd USENIX Security Symposium, 2024, : 6633 - 6650