DATA COLLECTION, MANAGEMENT AND ANALYSIS

Slides:



Advertisements
Similar presentations
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
Advertisements

OH 9-1 Managing Shifts to Ensure a Quality Operation Human Resources Management and Supervision 9 OH 9-1.
Click here for Game Rules & InstructionsClick here for Game Rules & Instructions: Copyright.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Computer Security: Principles and Practice
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
UNSD-CELADE Regional Workshop on Census Cartography for the 2010 Latin America’s census round Best practices in the use of GIS & census mapping.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Strategically Managing the HRM Function McGraw-Hill/Irwin ©2012 The McGraw-Hill Companies, All Rights Reserved.
Database Analysis and the DreamHome Case Study
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Scientific data storage: How are computers involved in the following?
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
ONE LAPTOP PER CHILD This works are licensed under a Creative Commons Attribution 2.5 License. One Laptop per Child Country Technical Support November.
Great Sales Presentation
Census Planning and Management
Computers in the Ambulatory Care Setting
Securing Information Systems
Technology and Business Continuity
A FRUIT AND VEGETABLE PRESCRIPTION PROGRAM
Project Management Business Management.
Phase 4: Manage Deployment
MONITOR YOUR SECURITY GUARD MOVEMENTS ROUND THE CLOCK
IDS Intrusion Detection Systems
IOT – Firefighting Example
Chapter 19: Network Management
Avenues International Inc.
CompTIA Security+ Study Guide (SY0-401)
Logistics Assessment & Planning
Articulating Your Practice C3 - Session #3
Critical Security Controls
Information Technology 2016 Budget Presentation
2016 Citrix presentation.
Logistics Assessment WFP Logistics, We Deliver.
Lesson Objectives Aims You should be able to:
Election Situation Room Professional Development Training
Information Technology (IT) Department
Lec3: Network Management
Tool Server Workstation Router Universal
Preparedness for the 2016 Presidential General Election
CompTIA Security+ Study Guide (SY0-501)
Election Security Best Practices
MONITOR YOUR SECURITY GUARD MOVEMENTS ROUND THE CLOCK
(Resource Person, Department of Computer Science, AIOU)
Data Quality By Suparna Kansakar.
Texas Secretary of State Elections Division
Election Security Best Practices
Manage Service Requests and Incidents
FIREWALL.
Big DATA.
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Quality assurance in population and housing Census
IT Management Services Infrastructure Services
In the attack index…what number is your Company?
Overview: Chapter 2 Localization and Tracking
Lec1: Introduction to Network Management
International Standards and Contemporary Technologies,
Presentation transcript:

DATA COLLECTION, MANAGEMENT AND ANALYSIS

What kind of data is collected through systematic observation? Observers deployed across the country report responses to questions on a uniform checklist that assess the quality of the election process observed, and, in some cases, collect vote count results for verification. Go back

Developing a Data Collection Plan What kind of information needs to be reported on election day? What is the strongest nationwide mode of communication that could be used on election day? What challenges could occur on election day to disrupt your data collection strategy? Will observers be able to realistically understand and use the method of data collection?

Strategies for Rapid Reporting Use short forms with limited questions Identify the most appropriate method of transmission Determine a reasonable timeline for data collection Streamline and simplify bottom-to-top reporting Transmitting election day checklists vs. critical incidents

Methods of Transmission SMS Phone call Mobile, landline, satellite Smartphone app Internet Fax Paper, hand delivery Usually back-up plan

Planning for 100% Reporting Rates Back-ups and contingency plans Build into trainings Conduct a simulation Test communication systems for weaknesses before election day Use observer stipends strategically to encourage response rates Pay observers after they have completed their reporting duties

Reporting timelines Reporting often happens at the end of certain key election day processes Observer arrival Opening Voting Closing Counting

Internal Communication Schema (image)

Data Management Developing an observer database Compiling all information about field supervisors and observers Creating an election day protocol Developing a document that outlines what you will do with your data Entering the data Entering data from your observation forms into electronic files Analyzing the data Inspecting, cleaning, detecting patterns and developing explanations to your data

Database for Observer Management Collect information for centralized observer database starting at recruitment Assign and track observer deployment

Election Day Protocol The protocol should answer at least the following question: How is the data flow at the data center? What are the roles of different staff? Who reports to the board? What is the most efficient paper handling process at the data center? How will staff process incoming observer data on election day? How will you analyze the data? Which part of the dataset will be examined first? In what order will the data be analyzed? What is the protocol if findings indicate some problems? What problems seem most likely to occur on Election Day? Who will have access to your observation findings internally, and when? What information will be provided to outsiders? To whom will the data be released? What is the estimated time for the information to be shared? How will you share your findings?

Data Security Install basic protections. Your network should be secure from all predictable forms of malicious attacks Create a network log-in protocol. You need to provide different security levels for each person based on their defined roles, an efficient method of managing users Establish a storage and back-up protocol. In the event of server/ computer crash, data back-up will allow you to recover your data and continue your election day operation

Organizing and Staffing the Data Center Logistics Calculations for number of operators needed Trainings and simulation

Simulation

Data Analysis Before Election Day On Election Day Gather contextual information which will help you to interpret your data Develop a clear election day protocol Create Software to visualize the findings On Election Day Analyzing initial data Scanning the data Searching for systematic patterns Determining the impact of the problems

Quality Control Data management – built in verification Simulation as test of management and communication structure Training data clerks Back-up plans and systems