SlideShare a Scribd company logo
Planning a Data Entry Operation
P.Prabhu
Manager Research
5th August 2013
Creating the Application
 The data entry application can be designed by one or by
multiple people
 It is advisable that one person or a team work on the dictionary
together
 After the dictionary is final, people can work on different forms
independently, which will then be copied-and-pasted together
for the final product
 Make sure to backup the application data files frequently; not
only might you make an unrecoverable mistake to your files, but
CSPro has been known to (very rarely) render applications
unusable
Operator and System Controlled Modes
 CSPro has two modes of data entry, which come about due to
the differences in CSPro’s parent software packages
 Operator-controlled mode: as in IMPS, which was designed for
census data entry, where speed of data entry is sometimes
prioritized over accuracy, and where the sheer volume of
keying means that office editing of questionnaires may not be
possible (heads-down keying)
 System-controlled mode: as in ISSA, which was designed for
survey data entry, where accuracy is critical, and where office
editing is often possible (heads-up keying)
Operator and System Controlled Modes (continued)
 Graphic borrowed from Macro International:
Operator-Controlled Mode System-Controlled Mode
Operator-Controlled Mode
 In operator-controlled mode, the keyer can use the mouse to move
around the questionnaire, bypassing fields or whole sections of the
data entry application
 The mouse can also be used to skip to fields after having keyed in an
invalid response for a value
 Mouse action can cause havoc, but it can also make the keyed data
more true to the data on the questionnaire, as it eliminates the need for
office editing (though the data will have to be edited later)
 Keyers generally like this mode, though programmers are often
reluctant to give so much control to the keyers
System-Controlled Mode
 System-controlled mode ensures that keyed data comes in a format
that the programmer has specified, with skip patterns obeyed and all
consistency checks passed
 CSPro keeps track of the “path” of data entry, so that going backwards
in the questionnaire faithfully returns to the previous fields keyed, which
may not be the previous fields on a form in the case of skips
 Requires that keyers resolve all errors before moving on in the
questionnaire, which can slow down progress
 A mistake in the programming of the application can ruin the integrity of
the data file
 Unless consistent office editing rules are followed, system-controlled
mode can introduce various biases in the data file
Network Data Entry
 In the past, each keyer entered data to a file on a computer and a
supervisor had to copy the data from each machine to a centralized
computer and concatenate the data
 Now, with LANs very easy to set up, it may be easier to have the
keyers enter data directly to a single machine
 It is not possible for multiple keyers to enter data to one data file, but
they can enter data to different files on a network drive
 The supervisor must still concatenate the data to create the master
data file, but backing up and concatenating data is much easier if using
a network drive
 Similarly, placing the data entry application on a network drive
eliminates the prior need to redistribute the application after any
modifications were made
Testing the Application
 As a CSPro programmer, you should test the application thoroughly
– Ensure that every skip pattern works successfully, and that all
consistency checks are valid
– Make sure any calls to a lookup file complete without error
 It is extremely important, however, to have someone without any
CSPro experience test the application
 A novice can often discover problems more quickly, and can uncover
different problems, than an expert user
 Ideally a data entry application will be created and tested before the
census or survey goes to the field
 Timing several keyers entering pilot or test data will help determine how
many keyers must be hired for the keying operation
Verifying Data
 Verifying census or survey data (double keying) adds significant
expense to a data entry operation, but it may be necessary to
ensure good quality keyed data, particularly for a survey
 Two forms of verification:
– Independent verification
– Dependent verification
Independent Verification
 Two keyers key a questionnaire to separate data files
 The operational control system should ensure that the keying
supervisor can easily identify in what files the two keyed
questionnaires are located
 The supervisor runs the Compare Data tool, which produces a
report identifying differences in the keyed files
 The supervisor then chooses one file as the source file for the
final data file and modifies that file, resolving all errors by
reexamining the paper questionnaire
Dependent Verification
 A keyer keys a questionnaire to a data file
 A second keyer takes the first keyer’s data file and keys the
questionnaires in the same order as the first keyer keyed them
 If the second keyer enters a value that differs from the value
entered by the first keyer, the second keyer is prompted to rekey
the value
 The second keyer, not a supervisor, is the arbitrator of the
correct value of a field
Verifying Data (continued)
 Independent verification advantages:
– Keyers will not be slowed down by mistakes made by the
other keyer
– May be more accurate because three people look at hard-to-
read fields
– The second keying does not need to be in the same order as
the first keying
 Dependent verification advantages:
– Can be faster than independent verification because of the
elimination of the supervisory position and the need to look
at the paper questionnaires a third time
– Eliminates the need for two copies of all data files
– Allows for the verification of only high priority fields
Moving to next
PSI

More Related Content

What's hot

Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)
Digital Scholarship Unit at the UTSC Library
 
Faq dbms
Faq dbmsFaq dbms
Epi Info- An Statistical Software
Epi Info- An Statistical Software Epi Info- An Statistical Software
Epi Info- An Statistical Software
Dr-Jitendra Patel
 
Showcase 2
Showcase 2Showcase 2
Showcase 2
omgitsgilby
 
Class viii ch-2 log on to access
Class  viii ch-2 log on to accessClass  viii ch-2 log on to access
Class viii ch-2 log on to access
jessandy
 
Spreadsheets
SpreadsheetsSpreadsheets
Spreadsheets
Johan Koren
 
Class viii ch-3 working with tables
Class  viii ch-3 working with tablesClass  viii ch-3 working with tables
Class viii ch-3 working with tables
jessandy
 
Normalisation
NormalisationNormalisation
Normalisation
listergc
 
Assessment questions
Assessment questionsAssessment questions
Assessment questions
shaila_A
 

What's hot (9)

Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)
 
Faq dbms
Faq dbmsFaq dbms
Faq dbms
 
Epi Info- An Statistical Software
Epi Info- An Statistical Software Epi Info- An Statistical Software
Epi Info- An Statistical Software
 
Showcase 2
Showcase 2Showcase 2
Showcase 2
 
Class viii ch-2 log on to access
Class  viii ch-2 log on to accessClass  viii ch-2 log on to access
Class viii ch-2 log on to access
 
Spreadsheets
SpreadsheetsSpreadsheets
Spreadsheets
 
Class viii ch-3 working with tables
Class  viii ch-3 working with tablesClass  viii ch-3 working with tables
Class viii ch-3 working with tables
 
Normalisation
NormalisationNormalisation
Normalisation
 
Assessment questions
Assessment questionsAssessment questions
Assessment questions
 

Similar to CSPro workshop P- 2

Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-project
chetanmbhimewal
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
Brett Leonard
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
Kamal Acharya
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
Akshita Pillai
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
50120140501006 2
50120140501006 250120140501006 2
50120140501006 2
IAEME Publication
 
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L  M O N I T O R I N GQuality Remote Monitoring .docxT R I A L  M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
ssuserf9c51d
 
Machine learning Courier.pptx
Machine learning Courier.pptxMachine learning Courier.pptx
Machine learning Courier.pptx
17cse17GuruGanesh
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
Shashank Srivastava
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
Venkat Projects
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
anuj_rakheja
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
Finalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
Finalyear Projects
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
Maulen Bale
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
School management System
School management SystemSchool management System
School management System
HATIM Bhagat
 
Hari proposal
Hari proposalHari proposal
Hari proposal
Rey Jefferson
 
Testing
TestingTesting
Testing
BinamraRegmi
 
Data migration patterns special
Data migration patterns   specialData migration patterns   special
Data migration patterns special
Manikandan Suresh
 

Similar to CSPro workshop P- 2 (20)

Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-project
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
50120140501006 2
50120140501006 250120140501006 2
50120140501006 2
 
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L  M O N I T O R I N GQuality Remote Monitoring .docxT R I A L  M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
 
Machine learning Courier.pptx
Machine learning Courier.pptxMachine learning Courier.pptx
Machine learning Courier.pptx
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
School management System
School management SystemSchool management System
School management System
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Testing
TestingTesting
Testing
 
Data migration patterns special
Data migration patterns   specialData migration patterns   special
Data migration patterns special
 

Recently uploaded

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
y3i0qsdzb
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 

Recently uploaded (20)

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 

CSPro workshop P- 2

  • 1. Planning a Data Entry Operation P.Prabhu Manager Research 5th August 2013
  • 2. Creating the Application  The data entry application can be designed by one or by multiple people  It is advisable that one person or a team work on the dictionary together  After the dictionary is final, people can work on different forms independently, which will then be copied-and-pasted together for the final product  Make sure to backup the application data files frequently; not only might you make an unrecoverable mistake to your files, but CSPro has been known to (very rarely) render applications unusable
  • 3. Operator and System Controlled Modes  CSPro has two modes of data entry, which come about due to the differences in CSPro’s parent software packages  Operator-controlled mode: as in IMPS, which was designed for census data entry, where speed of data entry is sometimes prioritized over accuracy, and where the sheer volume of keying means that office editing of questionnaires may not be possible (heads-down keying)  System-controlled mode: as in ISSA, which was designed for survey data entry, where accuracy is critical, and where office editing is often possible (heads-up keying)
  • 4. Operator and System Controlled Modes (continued)  Graphic borrowed from Macro International: Operator-Controlled Mode System-Controlled Mode
  • 5. Operator-Controlled Mode  In operator-controlled mode, the keyer can use the mouse to move around the questionnaire, bypassing fields or whole sections of the data entry application  The mouse can also be used to skip to fields after having keyed in an invalid response for a value  Mouse action can cause havoc, but it can also make the keyed data more true to the data on the questionnaire, as it eliminates the need for office editing (though the data will have to be edited later)  Keyers generally like this mode, though programmers are often reluctant to give so much control to the keyers
  • 6. System-Controlled Mode  System-controlled mode ensures that keyed data comes in a format that the programmer has specified, with skip patterns obeyed and all consistency checks passed  CSPro keeps track of the “path” of data entry, so that going backwards in the questionnaire faithfully returns to the previous fields keyed, which may not be the previous fields on a form in the case of skips  Requires that keyers resolve all errors before moving on in the questionnaire, which can slow down progress  A mistake in the programming of the application can ruin the integrity of the data file  Unless consistent office editing rules are followed, system-controlled mode can introduce various biases in the data file
  • 7. Network Data Entry  In the past, each keyer entered data to a file on a computer and a supervisor had to copy the data from each machine to a centralized computer and concatenate the data  Now, with LANs very easy to set up, it may be easier to have the keyers enter data directly to a single machine  It is not possible for multiple keyers to enter data to one data file, but they can enter data to different files on a network drive  The supervisor must still concatenate the data to create the master data file, but backing up and concatenating data is much easier if using a network drive  Similarly, placing the data entry application on a network drive eliminates the prior need to redistribute the application after any modifications were made
  • 8. Testing the Application  As a CSPro programmer, you should test the application thoroughly – Ensure that every skip pattern works successfully, and that all consistency checks are valid – Make sure any calls to a lookup file complete without error  It is extremely important, however, to have someone without any CSPro experience test the application  A novice can often discover problems more quickly, and can uncover different problems, than an expert user  Ideally a data entry application will be created and tested before the census or survey goes to the field  Timing several keyers entering pilot or test data will help determine how many keyers must be hired for the keying operation
  • 9. Verifying Data  Verifying census or survey data (double keying) adds significant expense to a data entry operation, but it may be necessary to ensure good quality keyed data, particularly for a survey  Two forms of verification: – Independent verification – Dependent verification
  • 10. Independent Verification  Two keyers key a questionnaire to separate data files  The operational control system should ensure that the keying supervisor can easily identify in what files the two keyed questionnaires are located  The supervisor runs the Compare Data tool, which produces a report identifying differences in the keyed files  The supervisor then chooses one file as the source file for the final data file and modifies that file, resolving all errors by reexamining the paper questionnaire
  • 11. Dependent Verification  A keyer keys a questionnaire to a data file  A second keyer takes the first keyer’s data file and keys the questionnaires in the same order as the first keyer keyed them  If the second keyer enters a value that differs from the value entered by the first keyer, the second keyer is prompted to rekey the value  The second keyer, not a supervisor, is the arbitrator of the correct value of a field
  • 12. Verifying Data (continued)  Independent verification advantages: – Keyers will not be slowed down by mistakes made by the other keyer – May be more accurate because three people look at hard-to- read fields – The second keying does not need to be in the same order as the first keying  Dependent verification advantages: – Can be faster than independent verification because of the elimination of the supervisory position and the need to look at the paper questionnaires a third time – Eliminates the need for two copies of all data files – Allows for the verification of only high priority fields