Presentation is loading. Please wait.

Presentation is loading. Please wait.

Requirements for the IT environment and digital logistics

Similar presentations


Presentation on theme: "Requirements for the IT environment and digital logistics"— Presentation transcript:

1 Requirements for the IT environment and digital logistics
By Guido PIeraccini

2 OUTLINE ELECTRONIC DATA COLLECTION HANDHELD DEVICES (CAPI)
INTERNET DATA COLLECTION (CASI) FIELD MANAGEMENT AND MONITORING SYSTEM SECURITY ISSUES

3 ELECTRONIC DATA COLLECTION
Session 1 ELECTRONIC DATA COLLECTION

4 DATA COLLECTION METHODS
Paper questionnaire with face-to-face interview (PAPI) Paper questionnaire with self-enumeration (PASI) Paper-based data collection Computer-assisted personal interviewing (CAPI) Computer-assisted telephone interviewing (CATI) Computer-assisted self-interviewing (CASI) Electronic data collection

5 E-QUESTIONNAIRE In e-questionnaire, rosters may need to be converted to single format questions and asked one after the other. This is in general necessary because the screen of mobile devices are often too small to show the rosters comfortably. When useful (i.e. administrative codes, date of birth, etc.), two or more questions could be grouped in one screen.

6 E-QUESTIONNAIRE’S BENEFITS
Users cannot miss questions or move to the wrong ones (Automated skip) Selection of appropriate codes from drop-down menu (pre-coding) Customizing of questions with household member’s name (customization) Inconsistent responses solved during the interview (immediate editing ) Multiple language capabilities and built-in help capability Collect and update the enumeration status of each unit (case management)

7 TESTING THE E-QUESTIONNAIRE
Functional tests used to test all the aspects of the questionnaire design from Question’s texts, to response options, missing values, instructions, error messages, etc. Scenario-based tests using the input of subject matter specialists for testing typical and common profiles, entry problems, warning/error messages Extreme-scenario tests similar tests for extreme cases such as large households including several generations, multiple occupations, multiple types of disabilities Usability tests testing user friendliness of the application

8 HANDHELD DEVICES (CAPI)
Session 2 HANDHELD DEVICES (CAPI)

9 DATA SYNCRONIZATION When using mobile devices for a census it is important to be able to transfer the data collected to the head office quickly and securely. Transferring data between devices in the field to central servers is referred to as synchronization. Allows better monitoring of the progress of the field operation and early detection of potential problems. Get 10 icons for $9/month

10 SYNCHRONIZATION OPTIONS
Online: full network-based data transfer; Partially online: data stored in the mobile devices until is available a mobile internet; Off-line: Enumerators synchronize their device with a supervisor's device, via Bluetooth

11 SYNCHRONIZATION’S NETWORKS
Cellular 2G/3G/4G: A powerful tool but expensive; WiFi: the most basic networking component. Almost all handheld devices have WiFi capability; Bluetooth: requires proximity between the devices to transfer the data;

12 TECHNICAL SUPPORT TO THE FIELD STAFF
IT support team: to resolve technical problems, operational problems related to devices, applications and data transfer encountered by enumerators and supervisors Call center: provide logistical support, IT related support and methodological support to field staff and information to publics Emergency Support: consider GPS coordinates to provide immediate support to field staff in case of emergency

13 INTERNET DATA COLLECTION (CASI)
Session 3 INTERNET DATA COLLECTION (CASI)

14 REQUIREMENTS 01 02 03 04 05 06 07 High literacy rate
High computer literacy rate 02 High rate of access to the Internet 03 Wide use of mobile devices 04 A reliable address frame is necessary 05 Clear procedures for non-response follow up 06 Public trust on the use of Internet 07

15 Additional functionalities:
CENSUS PORTAL Completing the online questionnaire should be easy Questionnaire’s screens should be readable and completed on any device, including mobile devices Questionnaire: The login procedure Online support ‘About the Census’ section ‘contact us’ option Additional functionalities: Unique identifiers to access the online questionnaire should be provided to the households Instructions and conceptual helps; Frequently Asked Questions; Help button; Questionnaire’s guide

16 ICT INFRASTRUCTURE Cloud?
The size of the ICT infrastructure such as servers, storage devices and internet bandwidth is related to: The number of expected total users The number of expected simultaneous users at the busiest time The average number of pages a respondent will see The average time spent per page Cloud? Respondents who cannot access the system or who cannot navigate at a reasonable speed might become frustrated and not respond at all.

17 OPTIONS FOR MULTI-MODE
In a Census, internet response will likely be insufficient to reach all the households. Therefore, the CASI method is generally offered as one among a set of options of a multi‐mode data collection Paper-based questionnaire PAPI PASI Electronic questionnaire CAPI CASI CATI Multi-mode paper-based data collection Multi-mode electronic data collection Mixed electronic/paper data collection

18 Field Management and monitoring system
Session 4 Field Management and monitoring system

19 RATIONALE Should be focused on:
Recruitment and payment of field staff Progress of the field enumeration and identification of levels of non-response or under coverage Identifying trouble spots Performance indicators for monitoring the enumeration can be generated in real time from the data received from the field. An efficient management and monitoring system is the key factor for successful field enumeration using electronic data collection.

20 GEOSPATIAL TECHNOLOGY/1
CAPI/CASI Census data received could be loaded in a GIS database located at the headquarters and mapped with a web feature service The web service may include special widgets for visualizing the data collected, such as a daily percentage covered in each EA It could be used to compare the number of population and housing units estimated with the numbers effectively enumerated This is theoretically possible also in CASI collections, if a comprehensive address register with GIS coordinates is available

21 GEOSPATIAL TECHNOLOGY/2
CAPI If, with a certain frequency, the CAPI application is recording the enumerator’s GPS coordinates (para-data), it would be possible for Supervisor/Local coordinators/HQ to monitor the enumerator’s routes (tracking system) The base map of the enumerator’s EA could be also loaded on the mobile device, together with some information about buildings and households. It would be possible to use them to ensure that each enumerator can't work outside the assigned EA

22 COMPLETENESS IN MULTI-MODE
To avoid duplications, there should be a mechanism for identifying housing units enumerated by a specific mode Clear procedures for non- response follow up Many simultaneous respondent may crash the server, and data may be corrupted or lost, resulting in incomplete questionnaires Operational Micro Database Census Completeness Management Due to the simultaneous collection of data in the census, the special status were assigned in OMB and consequently to the Completeness Management System . After opening the questionnaire in the channel CAII, the system was setting the appropriate status. Then the unit census was blocked for other channels (CAPI, CATI). Respondent had 14 days to fully fill in the questionnaire in the channel. After this time the questionnaire was unlocked and the unit was directed to the channel CAPI / CATI. CAPI CASI CATI PAPI/PASI

23 Session 5 SECURITY ISSUES

24 THREATS TO DATA STORED ON MOBILE DEVICES
1 Web based threats: Web-based applications containing untrusted content could introduce risks and threats such as phishing scams, malicious code in downloads, browser exploits; 2 Poor authorization and authentication: Poor authorization and authentication schemes; 3 Insecure data storage: This applies to scenarios when sensitive data stored on device or cloud synced data is left unprotected; 4 Use of location services: Mobile devices with location services enabled are at increased risk of targeted attacks because it is easier to determine where the user and the mobile device are; 5 Network exploits: This results from software flaws in the mobile operating system or other software that operates on local networks (such as Bluetooth, Wi-Fi) or cellular networks; CAPI

25 SECURING DATA ON MOBILE DEVICES
Preferably secure the devices with a mobile device management (MDM) system, avoiding the installation of unauthorized apps; 1 Strongly encrypt stored data on both built-in storage and removable media storage; 2 Wipe the device before reissuing it to another user or retiring the device. A device can also be configured to wipe itself after a certain period; 3 Provide the device password and/or other authentication before accessing the agency’s network; 4 Automatically monitor, detect, and report when policy violations occur, such as changes from the approved security configuration; 5 CAPI

26 THREATS TO DATA DURING TRANSMISSION
Solution: Strongly encrypt data communications between the mobile device and the servers. This is most often done using a virtual private network (VPN); Use HTTPS or FTPES for network communication in order to protect the transmission of data between field staff and the server; Compress transmission package and use a long password with special characters; Insufficient transport layer protection: lack of encryption for transmitted data CAPI + CASI

27 THREATS TO DATA ON THE SERVER
Solution: Use the latest technologies in firewall, intrusion detection system (IDS), and web application firewall (WAF) to ensure data security; Server side controls: Failure to implement proper security controls such as critical patches, secure configurations or disabling unnecessary services can result in confidentiality and data integrity risks; Insecure data storage: This refers to where sensitive data stored on servers, or cloud synchronized data, is left unprotected; CAPI + CASI


Download ppt "Requirements for the IT environment and digital logistics"

Similar presentations


Ads by Google