Geospatial Analysis: Innovation in GIS for Better Decision MakingMEASURE Evaluation
Discussion led by John Spencer and Mark Janko. This webinar shared new techniques in geospatial analysis and how they have the potential to transform data-informed decision making.
Using Data to Support the Most Vulnerable: An OVC Information Needs FrameworkMEASURE Evaluation
The "Using Data to Support the Most Vulnerable: An OVC Information Needs Framework" webinar, organized by the HIV/AIDS Monitoring and Evaluation Network (AIMEnet), presented the OVC Information Needs Framework. MEASURE Evaluation's Molly Cannon and Lisa Parker led the one-hour webinar.
Geospatial Analysis: Innovation in GIS for Better Decision MakingMEASURE Evaluation
Discussion led by John Spencer and Mark Janko. This webinar shared new techniques in geospatial analysis and how they have the potential to transform data-informed decision making.
Using Data to Support the Most Vulnerable: An OVC Information Needs FrameworkMEASURE Evaluation
The "Using Data to Support the Most Vulnerable: An OVC Information Needs Framework" webinar, organized by the HIV/AIDS Monitoring and Evaluation Network (AIMEnet), presented the OVC Information Needs Framework. MEASURE Evaluation's Molly Cannon and Lisa Parker led the one-hour webinar.
Beyond Dots on a Map: Spatially Modeled Surfaces of DHS dataMEASURE Evaluation
This presentation was shared by Clara R. Burgert-Brucker, Pete Gething, Andy Tatem, and Tom Bird, all with The DHS Program, at the June 2016 MEASURE Evaluation GIS Working Group Meeting.
Presented by Nate Heard, Office of the Geographer and Global Issues, at the MEASURE Evaluation Geographic Information Systems (GIS) Working Group Meeting.
Strengthening National M&E Systems for Orphans and Vulnerable Children Progra...MEASURE Evaluation
Presented by Emeka Anoje from Catholic Relief Services’ SMILE project in Nigeria as part of the August 2015 webinar on Strengthening National M&E Systems for Orphans and Vulnerable Children Programs.
Using Maps in Decision Making to Strengthen Programs for Orphans and Vulnerab...MEASURE Evaluation
Jen Curran presented for this September 2012 Child Status Network webinar discussing the mapping of orphans and vulnerable children program data for decision making.
Decision Support System Enabled Data Warehouses for Improving the Analytic Ca...MEASURE Evaluation
“Decision Support Systems for Improving the Analytic Capacity of HIS in Developing Countries”
Mike Edwards (MEASURE Evaluation), Presenter. Co-author: Theo Lippeveld (MEASURE Evaluation)
Presentation given
Beyond Dots on a Map: Spatially Modeled Surfaces of DHS dataMEASURE Evaluation
This presentation was shared by Clara R. Burgert-Brucker, Pete Gething, Andy Tatem, and Tom Bird, all with The DHS Program, at the June 2016 MEASURE Evaluation GIS Working Group Meeting.
Presented by Nate Heard, Office of the Geographer and Global Issues, at the MEASURE Evaluation Geographic Information Systems (GIS) Working Group Meeting.
Strengthening National M&E Systems for Orphans and Vulnerable Children Progra...MEASURE Evaluation
Presented by Emeka Anoje from Catholic Relief Services’ SMILE project in Nigeria as part of the August 2015 webinar on Strengthening National M&E Systems for Orphans and Vulnerable Children Programs.
Using Maps in Decision Making to Strengthen Programs for Orphans and Vulnerab...MEASURE Evaluation
Jen Curran presented for this September 2012 Child Status Network webinar discussing the mapping of orphans and vulnerable children program data for decision making.
Decision Support System Enabled Data Warehouses for Improving the Analytic Ca...MEASURE Evaluation
“Decision Support Systems for Improving the Analytic Capacity of HIS in Developing Countries”
Mike Edwards (MEASURE Evaluation), Presenter. Co-author: Theo Lippeveld (MEASURE Evaluation)
Presentation given
Prof George Alter, UMich, ICPSR, presenting at the Managing and publishing sensitive data in the Social Sciences webinar on 29/3/17.
FULL webinar recording: https://youtu.be/7wxfeHNfKiQ
Webinar description:
2) Prof George Alter, (Research Professor, ICPSR and Visiting Professor, ANU) George will share the benefit of over 50 years of experience in managing sensitive social science data in the ICPSR: https://www.icpsr.umich.edu/icpsrweb/
More about ICPSR: -- ICPSR (USA) maintains a data archive of more than 250,000 files of research in the social and behavioral sciences. It hosts 21 specialized collections of data in education, aging, criminal justice, substance abuse, terrorism, and other fields. -- ICPSR collaborates with a number of funders, including U.S. statistical agencies and foundations, to create thematic collections: see https://www.icpsr.umich.edu/icpsrweb/content/about/thematic-collections.html
This paper was presented at the 'Towards a Magna Carta for Data' workshop at the RDS in Dublin, Sept 17th. It discusses how considerations of the ethics of big data consist of much more than the issues of privacy and security that it often gets boiled down to, and argues that the various ethical issues related to big data are multidimensional and contested; vary in nature across domains, and which ethical philosophy is adopted matters to the deliberation over data rights.
Data protection and privacy framework in the design of learning analytics sys...Tore Hoel
Presentation on The Influence of Data Protection and Privacy Frameworks on the Design of Learning Analytics Systems at LAK17, Vancouver, Canada - 2017-03-16
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
On June 28, the e-SIDES team members made a presentation of the project at the ICE/IEEE Conference 2017 in Madeira. The workshop "Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytic" welcomed a high-level international academic and government audience, such as professors and researchers, to present the initial analysis of the key challenges.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Data sharing promotes many goals of the NIH research endeavor. It is particularly important for unique data that cannot be readily replicated. Data sharing allows scientists to expedite the translation of research results into knowledge, products, and procedures to improve human health. Do you know what a data sharing plan should include? Are you aware of common practices and standards for data sharing? Do you know what services are available to help share your data responsibly? This workshop will begin to address these questions. Q&A will follow the presentation. Anyone interested in or planning to apply for NIH funding should attend. Note: The NIH data-sharing policy applies to applicants seeking $500,000 or more in direct costs in any year of the proposed research.
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST
This presentation reviews privacy concerns for mobile devices and outlines the importance of privacy engineering in ensuring users have safe access to their devices.
Knoware-Open Data-SUNZ12: Clare Somerville and Trish O'Kaneclaress
The New Zealand Government has issued a Declaration on Open and Transparent Government. What are the implications for public organisations of the intitaive, and what should they be doing to prepare and support it.
Managing missing values in routinely reported data: One approach from the Dem...MEASURE Evaluation
This Data for Impact webinar was held in December 2020. Access the recording and learn more at https://www.data4impactproject.org/resources/webinars/managing-missing-values-in-routinely-reported-data-one-approach-from-the-democratic-republic-of-the-congo/
This Data for Impact webinar took place October 29, 2020. Learn more at https://www.data4impactproject.org/resources/webinars/use-of-routine-data-for-economic-evaluations/
Data for Impact hosted a one-hour webinar sharing guidance for using routine data in evaluations. More: https://www.data4impactproject.org/resources/webinars/routine-data-use-in-evaluation-practical-guidance/
Lessons learned in using process tracing for evaluationMEASURE Evaluation
Access the recording for this Data for Impact (D4I) webinar at https://www.data4impactproject.org/lessons-learned-in-using-process-tracing-for-evaluation/
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. When you see a rainbow, there are likely
clouds somewhere near-by
3. Privacy/Confidentiality
• Issues around individual level data are pretty well
understood.
• Spatial data have unique challenges regarding
privacy and confidentiality
• What policy documents exist? (USG, National
Governments, Organizations)
• What trainings exist?
4. k-anonymity
• Given person-specific field-structured data,
produce a release of the data with scientific
guarantees that the individuals who are the
subjects of the data cannot be re-identified while
the data remain practically useful.
• Latanya Sweeney, k-anonymity:a model for protecting
privacy; International Journal on Uncertainty, Fuzziness
and Knowledge-based Systems, 10 (5), 2002; 557-570
5. k-anonymity
• Data can be suppressed or generalized to achieve
suitable k-anonymity
• Still some vulnerability to deductive disclosure
• Alternatives:
• L-diversity
• T-closeness
• Differential privacy
Always a trade-off between data
integrity and privacy
7. Stigma
Data collected on certain populations may put groups
at legal or physical risk.
Once again spatial data has unique issues
• In addition to methods and approaches described
there are other considerations
• Groups of individuals at risk
• Harder to conceal concentrations of groups
8. Stigma
A Framework for Ethical Engagement with Key
Populations in PEPFAR Programs
Breyer et al
http://www.pepfar.gov/sab/210110.htm
Improving access to services for some
populations brings some risk
10. Data Ownership
Who “owns” the data?
In other words, who has responsibility for:
• Access to data
• Policies around acceptable use
• Data updating
• Maintenance of hardware
• Funding
11. Data Ownership
Co-ownership?
Strengths and limitations of “co-ownership”
• Funding
• How to handle conflicts around data quality or
policies?
• National laws on data ownership
Examples of complications around sharing of data.
12. Data Ownership
Action: Clear policies around data ownership and
definition of term.
Is there a better concept than “owner”?
13. Data security
How is the data protected from unauthorized access?
DATIM
• Robust security procedures
National systems
• ?
14. Data security
National security considerations
Some countries may have restrictions on release of
information for “national security” reasons
15.
16. Positives
• Issues are not unique to PEPFAR or spatial data
• Coincides with growth in techniques around data in
other areas
• Growth in ICT
20. What did we miss?
List issues not covered
Resources
Contact information
21. MEASURE Evaluation is funded by the U.S. Agency
for International Development (USAID) under terms
of Cooperative Agreement AID-OAA-L-14-00004 and
implemented by the Carolina Population Center, University
of North Carolina at Chapel Hill in partnership with ICF
International, John Snow, Inc., Management Sciences for
Health, Palladium Group, and Tulane University. The views
expressed in this presentation do not necessarily reflect
the views of USAID or the United States government.
www.measureevaluation.org