Monday, 29 February 2016

Collecting and representing data




Collecting Data

What do we need to do before collecting Primary Data?
*Determine data types
*How to collect the data
*Who are the sources

 
Design Principles

Functionality:            Appearance:
.readable                                       .aligned/centred
.accessible                                     .repetition
.usable                                           .contrast
.clear                                     .appropriate colours
.(informs, educates, persuades)        .balance


Format and Convention 
Format                           Convention

Font                                                             Icons

Text-size                                                      Heading

Colour                                                         Summaries

Alignment

Column



 Example: Info graphic
 
Testing -> checking if the processing is working
E.g. Excel spreadsheet with functions

 Validating -> checking input data

 Completeness -> all charts labelled and explained and answers hypothesis

 Reliability -> sources are identified

 Presentation -> engaging, appropriate topic, pleasing to the eye

 Functionality -> does it accurately, depicts the data

 

 

Framing an Investigation
 
a)   Starts with  theory or  question

Eg. Do girls use social-media more than boys?

b)  Write a hypothesis

Eg. Girls will use social media than boys
 
c)    Investigate by collecting evidence to test hypothesis
Eg. Question/Survey

d)  Interpret Data

Eg. Compare girls with boys for each question (categories/section/group results) look at the data for how it should be graphed

e)   Accept or Reject data

Eg. Report on findings

Thursday, 25 February 2016

Data Security?




"This guy was spotted wandering round with a (POS) device. All he has to do is key in a price less than £30 and then touch the device on the pocket that contains your wallet and you’ve just been charged automatically on your touch pay enabled credit/debit card"

Monday, 22 February 2016


Presenting Information



Primary source data is difficult to read so we process it and display it in a info-graphic.




IPO chart- shows the process of developing an info-graphic(or any information system.)

 Infographic display information to:  
-Educate
-Inform
-persuade
They contain:





            -Diagrams
-Charts/Graphs
-Fonts
-Shapes
-Colours
-Lines and arrows to assist in communicating the information contained in the data.







Different charts for different data.

LINE CHART




Change/Progress through time (not custard!)









SCATTER CHART





Display a relationship age between variables.






             Pie Chart




Shows percentage of a whole.
           





            Bubble chart:                                                                                                                                      



      3 dimension of data.







Bar Chart:  



Comparing categories (groups of dates)







Design Tools: are diagrams or other tools that help you design a solution.

IPO Chart: 
















Hypothesis – what is expected or predicted through an investigation.

Example: Roger is expecting evidence of bullying at his university and those instances comparable with other educational institutes.                        

Design Layout: Is a depiction of what will be seen on the screen














Storyboard: Series of images (Screens/design layout) in order of the users progress through the solution.               
EXAMPLES:














































Dataflow Diagram: Shows the flow of data through solution.

Example:













Gantt chart: Allows for scheduling tasks.


Example:






Problem Solving 
 Methodology




ANALYSIS: 
Solution Requirements (What is needed to be done
Constraints (limitations
-$ -Equip –Skills –Time Scope (what is included and what is not)                            
 DESIGN: Solution design (Using design tools to plan a solution
Evaluation criteria (How will you know the solution is a success
It’s a list of things the solution needs to do.

DEVELOPMENT: 
Manipulation. (Coding) Actually making the solution from the design tools to meet the  evaluation criteria.                       
Validation-Confirming data entered is correct.
 Testing- checking the solution produces correct out comes. 
Documentation-User manually quick start: Guides, reports, on the progress of the solution.

EVALUTION: 
Strategy-How to check the solution is successful?
 –Observe users
 –Questionnaires
 -Watch data flow
 -Interview users. 
 Report-On all the aspects of the solution for the continued maintenance of solutions costs, etc...                



Sunday, 21 February 2016

Examples of Consent Forms

The Victorian DET offers a page on informed consent. It also purports to offer sample project information and consent forms, but both links generate 403 errors... obviously I hadn't filled out my download consent form properly.

The Uni of Wollongong uses the National Statement on Ethical Conduct in Research Involving Humans  to offer advice and sample templates for assent forms.

You might also want to visit Colorado College which offers some permission/participation templates. Although these are more aimed at adult participants, they contain several useful ideas.

Similar forms are available at 

Check out this interesting range of Infographics


http://www.wired.com/2016/02/gun-violence-statistics/

Wednesday, 17 February 2016


VCE Computing Workbook Questions


CHAPTER 1: DATA ANALYSIS

Test Your Knowledge

Data and Information

1. If information is produced form incorrect or incomplete data, then the information is deemed unusable and irrelevant as it is not accurate and/or will not produce accurate results.
2. It is important to ensure that the data being used is accurate as the data can affect research very greatly in a bad way and from time to time good. But this may be the difference between life and death or selecting the next president.
3. The properties of usable data include data that is relevant, accurate, reliable and free from bias. This data also needs to be the latest processed data.
4. Transcription is the most common reason for data inaccuracy since transcription is caused by misreading/misinterpreting the question, pressing the wrong key or even lack of punctuation.
5. The accuracy of primary source be determined by their status. Stakeholders are usually the most reliable primary source.
6. It is important for subjects to take time to answer any questions or to complete any practicals for research, since the lack of timeliness can result in the reduction of quality and usability of data. An example of lack of timeliness can be when one is very drowsy, they may skim through questions in a survey and misinterpret some questions and can result in the participant yielding inaccurate answers.
7. Vested interest, timing, small sample size, bias through sorting and bias through graphic representations are all influence the introduction of bias into data.
8. The difference between qualitative and quantitative data is firstly, qualitative data is data that focuses on the quality of the product, and can be gathered through interviews or focus groups, and these generally consist of small numbers of people, however, quantitative data is data that is harvested through quizzes or questionaries and largely focus on the simple, statistical information and is usually made up of large numbers of people.
9. Some strategies that could be used while gathering quantitative data is creating online surveys or polls, although some surveys can produce qualitative data and sometimes both types of data combined. Another such strategy for gathering quantitative data include questionaries, quizzes, and observation to an extent.
10. An example of APA style citation is when the author’s name and date of publication are inserted into the body of the text while the full reference is provided in the references list at the end of the document
11. It is important to get authorisation when collecting data so that the persons involved are informed about any legal and important information and that they must consent to.
12. The purpose of consent forms is to give the subject/s privacy and to allow them to decide if they want their data to be open to the public, available to other companies, etc...


Digital Systems



13. Encryption is important because it allows you to securely transmit/transfer data so that only the people who need to access the data have access and any unwanted persons won’t be able to access it. It can be used to transfer data or confidential files between the government organisations and businesses, etc.
14. Usernames and passwords allow for secure connections and to enable monitoring, secure file storage, and control what the user accesses it.
15. A strong password is made up of lowercase, uppercase, numbers and symbols and consists of usually more than 6 or 8, and sometimes even higher.
16. A strategy on backing up is making backups regularly and consistently.
17. A full backup is an exact copy of the whole lot, whereas an incremental backup is virtually an update, or only updating just the changes.
18. It is important to secure data when conducting research so that you have access to the data when you need it, and so that the data doesn’t get stolen or taken.


Interactions and Impact



19. The Australian Privacy Principles affect the individual by making sure that only the people who is required to access the data are the only ones that have access to it.
20. The Australian Privacy Act falls in 
21. It is important to de-identify personal data to keep it secure and to keep it free from bias.
22. The ethical dilemma in the context of data collection for research purposes is the participant wanting their data to be de-identified whereas the researcher would want to release as much information as possible.


Apply your Knowledge


Street Traffic

1. Arthur believes that there is too much traffic in his street, particularly on weekdays – in the morning and evening. Arthur lives in a small residential street, but cars use this street as a shortcut to avoid traffic lights and the main roads. Arthur wants to do some research to support his theory about the traffic on his street, and present a case to the local council.
a) Arthur will investigate the number of cars that pass through his street throughout the week during the day.
b) Arthur will require dates, times and numbers of vehicles. It is possible that vehicle type may be useful to include.
c) A data gathering tool such as a counter of a camera to record the day’s traffic.
d) It would be easier to set the camera on a tripod and record the traffic for that day. This way, he can slow down the time/recording during peak hours to make it easier to count the number of vehicles.
e) Arthur can keep his data backed up on an external hard drive and keep his computers secure and away from any intruders.
f) Arthur needs to get permission from the local council and or the people who are included in the shot or the research.
g) Arthur could use spreadsheets to enter the number of cars observed against times of the day for each week to export into easier to read formats.
h) What types of relationships and patterns is Arthur looking for?
i) How will Arthur present the data to the local council?


Case Study


Part A


Rodger is a PhD student
a) Rodger will investigate bullying in the workplace and he aims to gather research that suggests that bullying is prevalent in educational institutions. He hopes to compose a research paper on his findings in the event of establishing whether his University does indeed host bullying behaviour at the same rate as comparable organisations.
b) Rodger will need to gather information and the amount of people who have been bullied at the institute(s). He will need to collect data from primary sources where he collects the information about the number of students being bullied. He will also need to research using secondary sources to find out the rate of bullying elsewhere.
c) He will be able to gather all his data from his local university. He needs to gather the numbers/data from primary and secondary sources.
d) Rodger should use a tablet or laptop to be able to gather the numbers of people who have been bullied and the number who have not been bullied and categorize the data into gender, age and race.
e) A tablet will help Rodger to quickly gather the data on-the-go so that he can gather data while he is doing other tasks. It will also be less time consuming as it will eliminate the time required to computerise the data.
f) Rodger will keep the data safe by keeping it backed up to an external device which is kept on separate premises. This will ensure that the data is not going to be manipulated.
g) Rodger will need to get permission from the people being surveyed. He needs to ensure that the student’s data will follow nay privacy policies.
h) Rodger will use spreadsheets to organise and display the data in a simple and elegant way. This may include the use of charts, graphs and other notes.
i) Rodger will look to see if bullying is prevalent in educational intuitions such as his own University.


Edited using HTML

ps. sorry miss for not coming to school today, i was a bit sick and i had quite a bit of pain with my shoulder muscles, torso, back and headache, and a bit more. So i didnt have much of a fun day today. Anyway John reminded me to do this work so i quickly did it. And i used html to do it,

Tuesday, 9 February 2016

Medicare Case Study

In the news this week in Australia is a ethical situation with the management of Medicare personal data. Listen/read this article that was aired this morning 10/2/16.

http://www.abc.net.au/news/2016-02-09/govt-preparing-to-outsource-medicare-payments/7151316


What are the potential breaches of the Australian Privacy Principles that could eventuate from this situation.

Monday, 8 February 2016

UN Data Activity

Use this link to collect your data:

http://data.un.org/Data.aspx?q=internet+use&d=ITU&f=ind1Code%3aI99H

Is the number of people on the internet per country per year.

Download the data as a text file with semicolon separaters.

Open Excel - go to the Data tab and Get data as text and select the semicolon option.




After managing your data and expereimenting in Excel tty these free online tools:  Infogram, Piktochart, Venngage, Canva, and Easelly

Thursday, 4 February 2016

Work due for Tuesday 9th February

Roger is a PhD student investigating bullying the workplace. The research suggests that bullying is prevalent in educational institutions so he decided to collect information at his own University. He hopes to write a research paper on his findings in the event of establishing whether his University does indeed host bullying behaviour at the same rate as comparable organisations.

a) Clearly state the topic Roger will investigate.
b) What type of data will Roger need to assist in his investigation?
c) Where will he get all the data he needs?
d) Identify the appropriate type of data gathering tool Roger will use.
e) Justify the selected data gathering tools.
f) How will Roger keep the data safe?
g) Does Roger need to get permission to conduct his research and from whom?
h) What tools will Roger use to interpret the results?
i) What types of relationships and patterns is Roger looking for?
j) How would Roger present his data in his final paper?

An American case study related to ethical dilemmas and use of personal information:
Vigilant Solutions’ License Plate Reader Database Is a Massive Threat to Privacy (30/1/2016)


a) Identify the Australian Privacy Principals that have been breached, and how, in this case study 
b) Describe how they jeopardise the privacy of private information.