• Register
X
Forgot Password

If you have forgotten your password you can enter your email here and get a temporary password sent to your email.

X

Leaving Community

Are you sure you want to leave this community? Leaving the community will revoke any permissions you have been granted in this community.

No
Yes

A. NIH Policy on Rigor and Reproducibility

Scientific rigor and transparency is key to the successful application of knowledge toward improving health outcomes. The NIH rigor and transparency policy was announced in the fall of 2015 and was applied to most research grants submitted on or after January 25, 2016.


NIH Grants Policy Website: https://grants.nih.gov/reproducibility/index.htm



*Infographc from NIH Rigor and Reproducibility website: courtesy of Ms. Nichole Swan, Dr. Shana Spindler, and Dr. Yvette Pittman of the Eunice Kennedy Shriver National Institute of Child Health and Human Development (NICHD).





B. How can NIDDK grant applicants comply with the NIH Policy on Rigor and Reproducibility?


While writing a grant application, NIDDK grant applicants should include:



dkNET will focus more on assisting the researchers to prepare the documents for the authentication of key biological and/or chemical resources. The detailed meaning of all focus areas and where it should be included in the application can be found in this chart downloaded from the NIH Grants Policy Website: https://grants.nih.gov/grants/RigorandReproducibilityChart508.pdf




C. How can dkNET help?



What constitute key resources?

Recommendation for authenticating your resource

     Manual Path

          Properly identify your resource

              Why is using RRIDs important?

              How to find RRID for key resources?

              What if I can't find RRID for this resource?

          Authentication check list

              Cell Lines

              Antibodies

              Specialty Chemicals

     Automated Path (dkNET future plan, beta version release date: April, 2017)




What constitute key resources?

Key biological and/or chemical resources include (but are not limited to): 

  1. Cell lines 
  2. Antibodies 
  3. Specialty chemicals
  4. Other biologics

Each proposal should include an attachment that briefly describes methods to ensure the identity and validity of key biological and/or chemical resources used in the proposed studies.  


View an example of attachment: Authentication of Key Biological and/or Chemical Resources (PDF) http://libraries.ucsd.edu/services/data-curation/data-management/write-dmp/ExampleAuthenticationKeyBiologicalChemicalResources201609.pdf, prepared by Dr. Anita Bandrowski, University of California San Diego.






Recommendations for authenticating your resources


There are two paths to authenticating a resource: manual path and automated path.



D. Other Resources 


NIH FAQ about authentication of Key Biological and/or Chemical Resources: https://grants.nih.gov/reproducibility/faqs.htm#V




E. Disclaimer 


Researchers should verify the authenticity of their research resources before grant submission or publication. Current NIH guideline (as of November 2016) does not include clear instruction of authentication process. Recommendations of authenticating the resources listed on dknet.org are generated by the suggestions from experts’ opinions and volunteer working groups. Information provided on dknet.org does not represent the NIH policy. Resource identification information, such as problematic cell lines, obtained from dknet.org are ingested from relevant databases in a timely manner and vary by resource center. For most updated information, please check individual resource centers directly. dkNET bears no responsibility for the accuracy and reliability of ingested content.

X

Are you sure you want to delete that component?