Data management in the field Ari Haukijärvi 2nd EHES training seminar.

Slides:



Advertisements
Similar presentations
MICS4 Data Processing Workshop Multiple Indicator Cluster Surveys Data Processing Workshop Overview of Data Processing System.
Advertisements

Quality assurance Kari Kuulasmaa 1 st EHES Training Seminar, February 2010, Rome.
Process for preparing the national manuals Hanna Tolonen.
HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
GCSE ICT Networks & Security..
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Review Questions Business 205
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Computers: Tools for an Information Age
QMS Documentation Click the mouse to advance slides and animations in this slide show…
Instructions and forms
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Software Validation in Accredited Laboratories A Practical Guide Greg Gogates Fasor Inc. 26 Sept 2001 A copy of this paper will be maintained.
Software Configuration Management (SCM)
Copyright 2010, The World Bank Group. All Rights Reserved. Agricultural Coding and Data Processing Section B 1.
Records Survey and Retention Schedule Recertification 2011.
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
End HomeWelcome! The Software Development Process.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Dr. Mojca Noč Razinger SURS Data collection in the Statistical Office of the Republic of Slovenia (SURS)
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Service-wide VRS Deployment Briefing Video Relay Service Agency-Wide Shared Services Special Projects Office NTEU Re-Briefing August, 2010 *Updates and.
File Systems and Databases Lecture 1. Files and Databases File: A collection of records or documents dealing with one organization, person, area or subject.
INVENTORY AND HISTORY. Instructional Objectives n Types of inventory and historical data n Different methods of collecting inventory and historical data.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Topics Covered Phase 1: Preliminary investigation Phase 1: Preliminary investigation Phase 2: Feasibility Study Phase 2: Feasibility Study Phase 3: System.
Group work: Challenges in organizing fieldwork and training personnel for different examination sites 2nd EHES training seminar
Preparing national HES Manuals. What is the function of the national HES manual Documents the entire survey process Planning Field work Laboratory procedures.
Chapter 2 Securing Network Server and User Workstations.
Quality control and audit visit: process & actions.
1 NTTC/NTC ERO Training 2010 ERO TRAINING The ELECTRONIC RETURN ORIGINATOR (ERO) is the Transmitter in Tax-Aide.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
CABLING SYSTEM WARRANTY REGISTRATION. PURPOSE OF CABLING REGISTRATION.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
Scientific data storage: How are computers involved in the following?
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
( ) 1 Chapter # 8 How Data is stored DATABASE.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Blackboard Security System
Controlling Computer-Based Information Systems, Part II
UNIT 19 Data Security 2.
Electronic Records Management Program
Budgeting and fund raising
Data protection.
Test Proctoring in a Public Library
Lecture 1 File Systems and Databases.
Software Validation in Accredited Laboratories
The Office Procedures and Technology
Computers in the Ambulatory Care Setting
What is a System? A system is a collection of interrelated components that work together to perform a specific task.
Presentation transcript:

Data management in the field Ari Haukijärvi 2nd EHES training seminar

Division of tasks and preparation of the fieldwork The Central Office - Overall data management preparation and coordination during the fieldwork Arranging computer equipment and networks for the fieldwork teams (if computerized data collection is used): Planning the structure of computer network(s) and equipment Establishing and customizing the network(s) Installing the survey software Planning of software updates during the fieldwork Testing Training, responsibilities, and support of the fieldwork teams: In putting up the network (if needed) In using the data recording equipment and software Issuing responsibilities to team members Providing instruction manuals for the fieldwork Arranging helpdesk during the fieldwork

Division of tasks and preparation of the fieldwork The Central Office Coordinating the fieldwork data management Database(s) maintained in the Central office can be used to monitor and control the fieldwork: Scheduling appointments Creating invitations, lists of appointment schedules, calendars, etc. Storing fieldwork inventory data Generating feedback Receiving and processing the survey data

Division of tasks and preparation of the fieldwork The Fieldwork teams Setting up the equipment and network connections (if needed) at the fieldwork site Basic technical knowledge in using equipment and software for data collection Responsibilities in backing up and transferring the data Named person(s) or all team members?

Collecting the survey data Data from Questionnaires and interviews Physical measurements Laboratory tests and samples … are recorded on paper forms on workstations, from which data files are copied to a local (fieldwork team) network’s server directly to the local (fieldwork team) network's server directly to the central survey database (in the Central Office)

Example 1 (System architecture of Health 2000 Survey)

Example 2 (MAAMU)

Data error checking Routine checking procedures: Visual checking of key items at examination site In computer-assisted data collection automatic built-in software checks at examination site Extensive checking for all computerized data (in the Central Office) … to ensure: complete data records no errors no lost or mixed-up records

Data management in the field - Key issues Identification Data confidentiality and security Backing up the data

Identification Follow-up of participants through the survey process to make sure that correct data corresponds to each subject, and to monitor in which phase of the survey each subject is by means of unique subject ID code (Serial number): used to identify the subject throughout the survey barcodes (referencing to the subject ID) in survey forms in laboratory samples

Data confidentiality and security Paper forms Not to be left alone for unauthorized to see or get lost Clear responsibilities in collecting and storing Sealed containers (also during shipments) No personal information included > subject ID code Data in electronic format Locking workstations and server computers when not used Safe place for equipment when not used Encrypted hard disks Encrypted data transfers Data should not be archived in personal directories or local computers' hard drives The personal data of survey subjects should be encrypted and available only to persons who have authorized access

Backing up the data The data need to be backed up regularly on external storage device (e.g. external hard drive, optical disk, another computer, etc.) separate from the original data source ’Remote’ backup: Data transfer to the Central Office Logging the data transfers

Data correction/documentation Changes to the data According to the rules for data verification and correction, specified in the national manual By trained persons Need to be documented: Version of data What was changed Reason for the change Time of the change The original raw data is backed up and unchanged