Innovations in Quality Control Monitoring of Remote CAPI Employees



Similar documents
Building a CAPI Case management system for a small/medium size organization

VPN vs Port Forwarding

Aqua Accelerated Protocol (AAP) For Mac User Manual

Copyright Telerad Tech RADSpa. HIPAA Compliance

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6

The Raiser s Edge Mobile Event Management Application Guide

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

How To Configure A Microsoft Virtual Server On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd

Using Mac OS X 10.7 Filevault with Centrify DirectControl

Configuring and Monitoring Bluecoat AntiVirus

Safety and Health Grant Program Database Remote Access Installation Guide

Xopero Backup Build your private cloud backup environment. Getting started

The Raiser s Edge Mobile Application Guide

How to sync Office 365 with Gmail

Secure User Guide

Configuring an Client to Connect to CASS Mail Servers

MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2

Active Directory Syncing

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

CareGiver Remote Support Information Technology FAQ

Here is a demonstration of the Aqua Accelerated Protocol (AAP) software see the Aqua Connect YouTube Channel

Higher Computing Networking 1

Provider Express Obtaining Login Access. Information for Network Providers

CentreVu. Call Recording

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Secure Mail Message Retrieval Instructions

Cloudvue Remote Desktop Client GUI User Guide

Application Note: Cisco Integration with Onsight Connect

Trillium Web Course Request Student Request On-Line

SOE FILE STORAGE & BACKUP RECOMMENDATIONS Technology Department - 3/2014

DIGIPASS Authentication for GajShield GS Series

TBR System Office Performance Management Supervisor s Guide

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Maximizing Data Quality In HCBS Experience of Care Survey Data Collection Efforts

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Endpoint Security VPN for Windows 32-bit/64-bit

Setup and Log In. Click the Menu icon > Exit DO NOT CLICK X. The Avaya IP SoftPhone will not close properly.

OrecX Oreka Total Recorder Application Notes

Manage a Firewall Using your Plesk Control Panel Contents

NETWORK SECURITY GUIDELINES

Security Overview Enterprise-Class Secure Mobile File Sharing

Phone: Fax: Box: 230

Hallpass Instructions for Connecting to Mac with a Mac

Mini User Guide. Updating your contact details..2. Setting your Security Questions..4. Changing your password..5. Forgotten password...

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Secur User Guide

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Configuring and Monitoring Citrix Branch Repeater

Mi-Forms Release Notes for Release v10.1.2

Crystal Gears. The Next Generation Personal Desktop Call Recording Solution. Why Crystal Gears

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Sync Security and Privacy Brief

Connecting an Android to a FortiGate with SSL VPN

NAS 322 Connecting Your NAS to a VPN

Guide to Remote Desktop Connection

OIT OPERATIONAL PROCEDURE

The Hidden Dangers of Public WiFi

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video using-amicus-attorney-with-dropbox

IOD Incorporated. SOC 3 Report for IOD Incorporated

Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012

F re Alarm Network etwo (FAN) T rou rou h Virt Vi ual u Private Network etwo (VPN) Dr. Dr Sa S mir H. Abdull--Ja J u a wad

Connecting to the FILTER Virtual Private Network (VPN)

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Virtual Private Network (VPN)

File Transfer with Secure FTP

CONTENTS. PCI DSS Compliance Guide

Administering Windows Server 2012

So, now your phone data are safe even when changing mobile handset or your phone/ SIM is stolen/ lost/ broken.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Accessing the Media General SSL VPN

Please Note: This guidance is for information only and is not intended to replace legal advice when faced with a risk decision.

MedMail User Manual. Contents. 1.0 Introduction. 2.0 Installing the system. 3.0 Program operation

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

Monitoring the NTP Server. eg Enterprise v6.0

Wentworth Institute of Technology Performance Management Supervisor s Guide

Crystal Live. Overview. Interaction Recording and Monitoring Solution to Data Mining and Performance Management

Sophos Mobile Control User guide for Apple ios. Product version: 4

PostFiles. The file sharing and synchronization solution dedicated to professionals.

ProFiler Client Software User s Guide

The All-in-One Support Solution. Easy & Secure. Secure Advisor

Basic User Guide for the IAS VPN (

Information Security It s Everyone s Responsibility

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Session Administration System (SAS) Manager s Guide

BYOD Policy. Handout

How do I see an encrypted INCISIVE MD for the first time?

Remote Access VPN SSL VPN Access via Internet Explorer

Mary Theofanos Brian Stanton

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

WINGS WEB SERVICE MODULE

BlackBerry Internet Service. Version: User Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

AND Recorder 5.4. Overview. Benefits. Datenblatt

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Monitoring Open VPN Access Server

Configuring and Monitoring SharePoint Servers

Transcription:

Innovations in Quality Control Monitoring of Remote CAPI Employees Nick Schultz and Rae Ganci IFDTC 2011 5/16/2011 2011. Materials may not be reproduced without permission of the author.

The tools and processes described in this presentation owe a tremendous amount of credit to our programming staff and project directors in addition to field work that was done to develop our CATI quality control monitoring process; this was by no means a singular effort. 2

Overview Introduce Wisconsin Longitudinal Study & Remote Staff Developing a Monitoring Model for WLS CAPI Challenges & Innovations If we d known then what we know now 3

Wisconsin Longitudinal Study & Remote Staff 2011. Materials may not be reproduced without permission of the author

Wisconsin Longitudinal Study 1957 Wisconsin high school seniors Study of families by including a selected sibling Sixth wave, first CAPI effort 3 hours of data collection: CAPI interview questions, anthropometric and cognitive measures, DNA collection Over 12,000 respondents 5

Respondent Distribution 6

Interviewer Distribution 7

Team Leader Distribution 8

Developing a Monitoring Model for WLS CAPI 2011. Materials may not be reproduced without permission of the author

Goals Goals when creating a monitoring system for the CAPI effort of WLS were: 1) To remain as consistent as possible to existing UWSC quality control protocols and procedures (as developed for CATI) 2) To provide an efficient and manageable system for remote supervising staff 10

UWSC History of Monitoring for CAPI Studies No comparable CAPI studies of same size and duration and geographical dispersity Previous efforts focused on data verification Looking at data files Verification interviews with item data checking 11

UWSC Phone Room Monitoring Process 12

Key Challenges In an effort to maintain consistency with existing protocols and produce a manageable remote system: 1. Security of data 2. Secure and timely way of listening to interviews remotely 3. Easily accessible place for generating and storing evaluations and feedback 13

UWSC WLS CAPI Monitoring Process 14

Challenges Encountered 2011. Materials may not be reproduced without permission of the author

Security of Survey Data Confidential data exists on remote laptops Transfer of information needed a way to travel to our secure servers remotely Additional security concern in the event that the physical laptop was stolen or misplaced in the field It was clear early on that the transition to CAPI required additional security protocols to secure confidentiality 16

Listening to Audio Recordings Due to remote Interviewers and Team Lead staff, entire process of audio listening needed an overhaul Impossible to conduct listening live Technical problems of saving audio No hub for storing, retrieving audio for later use We needed to develop a process where audio could be captured & stored for later monitoring to overcome these challenges 17

Storing Evaluations & Logging Feedback Due to remote staff, we needed a place for TLs to access evaluation materials remotely Remote staff didn t have access to our local network Feedback needed to get to interviewer somehow We ultimately needed to have an area where materials could be stored for future reference, but accessible to both remote staff and local supervisors and project staff 18

Innovations 2011. Materials may not be reproduced without permission of the author

Security of Survey Data: VPN & Synchronization Process Sync process sends audio and case data to local server VPN makes sure data encrypted and must be active in order to sync VPN requires password login and secure internet connection For remote Supervisors, the VPN is required to access audio files, the monitoring website and the evaluation form 20

Virtual Private Network 21

Listening to Audio Recordings: Encrypted Audio Website Provides Supervisors a place to listen to audio Accessible to remote employees from their laptops Website is encrypted and requires password to access Provides the hub for storing old audio One stop shop for all audio files for all cases Broken up by interview module for small scale monitoring needs 22

Encrypted Audio Website: Intro Screen 23

Encrypted Audio Website: Specific Case QC Screen 24

Storing Evaluations and Feedback: Online Eval Survey Provides a place to store/view monitoring of interviewer staff Form provides standard evaluation items to ensure monitoring is conducted equally across supervisors Website has ability to track progress, Supervisors can start/stop monitoring at any point Internal programming support allows ability to update if new additions need to be implemented 25

Online Monitoring Website Picture 26

Online Monitoring Website Picture 27

Wishlist 2011. Materials may not be reproduced without permission of the author

Wishlist for the Future The ability to conduct live monitoring through some online process Data Entry playback of case during monitoring review Web monitoring form able to email documents directly to interviewers 29

Thank You! For copies of this presentation or more information, contact: Please visit us at: www.uwsc.wisc.edu 30