Introduction To Trusted Research And Risk Management
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.04 GB | Duration: 0h 43m
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.04 GB | Duration: 0h 43m
Understand the Risks, Responsibilities, and Best Practices for Secure, Ethical Research
What you'll learn
Understand and explain the core principles of Trusted Research, including its relevance to both UK and international research contexts.
Recognise the legal and institutional responsibilities placed on individuals and organisations, and understand their role as risk managers.
Develop practical strategies to manage risks, including protecting knowledge assets and intellectual property.
Identify appropriate support, escalation procedures, and compliance resources to uphold Trusted Research principles in practice.
Requirements
While the course is accessible to anyone with an interest in the subject, having a basic understanding of academic research processes will be beneficial. However, no prior knowledge of Trusted Research is required, as the course provides a comprehensive introduction to the topic.
Description
In today’s global research environment, protecting the integrity, security, and ethical foundations of your work is more important than ever. This short, accessible course introduces the principles of Trusted Research—a practical framework that helps researchers, institutions, and industry partners identify and manage risks in research collaboration, particularly in international contexts.Designed for beginners and busy professionals, this course is ideal for anyone working in or supporting research who needs a clear understanding of the risks, responsibilities, and best practices involved in Trusted Research. Whether you’re an academic, research support officer, or part of a commercial research partnership, you’ll gain essential insights to support secure and responsible research activity.Through bite-sized videos, visual explainers, case studies, and interactive exercises, you’ll explore:What Trusted Research is and why it mattersLegal, ethical and security risks in researchApplying Trusted Research in both domestic and international settingsKey regulations including GDPR, Export Controls and the NSI ActEscalation procedures, resources, and risk mitigation strategiesBy the end of the course, you’ll be able to recognise and respond to research-related risks with confidence. If you want to build on this foundation, our Advanced Trusted Research module offers a deeper dive into practical implementation, complex case studies, and high-risk scenarios.
Overview
Section 1: Introduction
Lecture 1 Welcome
Lecture 2 Introduction
Lecture 3 Definition and Importance of Trusted Research
Lecture 4 Relevance in Domestic and International Collaborations
Lecture 5 Common Myths About Trusted Research, Myth #1
Lecture 6 Common Myths About Trusted Research, Myth #2
Lecture 7 Common Myths About Trusted Research, Myth #3
Lecture 8 Common Myths About Trusted Research, Myth #4
Section 2: Guidelines & Legislation
Lecture 9 Overview of NPSA and UKRI Guidelines
Lecture 10 Introduction to UK Legislation
Lecture 11 Emphasising the Role of Legal Frameworks in Shaping Research Responsibilities
Section 3: Developing Risk Management Strategies
Lecture 12 Understanding Risk in Research
Lecture 13 The Consequences of Ignoring Trusted Research
Lecture 14 What’s at Stake? The Real Risks of Ignoring Trusted Research
Section 4: The Role of Escalation Procedures
Lecture 15 Escalation Procedures
Section 5: Support and Resources
Lecture 16 Support and Resources
Section 6: Protecting Knowledge Assets
Lecture 17 The Importance of Protecting Knowledge Assets
Section 7: Case Studies and Practical Applications
Lecture 18 Case Study 1
Lecture 19 Case Study 2
Lecture 20 Practical Exercise
Section 8: Reflection Exercise
Lecture 21 Reflection Exercise
Section 9: Final Quiz
Section 10: Conclusion and Next Steps
Lecture 22 Conclusion and Next Steps
Lecture 23 References and Further Reading
Lecture 24 Congratulations
This course is designed for academic researchers, research administrators, IT professionals, and international research collaborators involved in academic or research environments. It is particularly suited for those responsible for managing, securing, or advising on research projects that involve international partnerships, sensitive data, or complex regulatory compliance.