Data Collection

Information collection plan for the security of critical infrastructure

Slide 1 Introduction

  • Information collection plan
    • It is a document with description and sequence for Information collection
  • Components of the plan
    • Purpose
    • Metrics
    • Type of Information
    • Frequency

An Information collection plan is a document that gives a detailed description of the sequence and necessary steps in the collection of Information for a given project. An Information plan may be composed of different features such as a purpose, metrics, type of Information, frequency among others (Sutton & Austin, 2015). The purpose is the first element in an Information collection plan that needs clarification. The metrics or measurements are also a significant part of an Information collection plan as well as the type of Information; whether discrete or continuous Information. The plan also indicates the frequency in which the gathering of information may occur.

Slide 2 Methods for Information collection

  • Observation
    • Entails the capturing of incidences and on-site conditions
    • Is a valid method
    • Requires following of guidelines
    • Can be applied in state communication bases

Observation is among the best ways for Information collection due to the validity of Information collected. Observations have to be carried out by well-trained personnel who have to follow a clear set of guidelines strictly. This method can be applied in state communication-based centers to check for any issues that may be a threat to security. A trained observer can check how power has been connected in the base, the state of the equipment used, security programs installed in the center’s computers and the level of security in accessing the premises (Sutton & Austin, 2015).

Slide 3 Interviews

  • Can be carried out in person or over the phone
  • Provides more in-depth information
  • Management and other personnel in the communication base can be interviewed

Interviews are useful methods for Information collection that can be carried out over the phone or in person. Interviews are effective since the interviewer can seek answers to more complex questions and there is also a chance to get clarification in case of any confusion. The management of the communications base can be interviewed to know the security risks in the center and measures put in place to prevent them or for resilience purposes. Employees can also be interviewed to collect information on what risks they feel like they are exposed to and any measures they propose to prevent that (Peersman, 2014).

Slide 4 Surveys

  • They can be carried out by email, mail or in person
  • Information collection occurs through written instruments
  • They are cost effective
  • Management and other personnel in the communication base can be given the survey question

A survey is a method of Information collection that is carried out by administering written instruments to the relevant persons fill. Delivery of the printed devices may occur in person, via mail or email. Surveys are quite cost-effective as many people who are likely to give a wide range of Information can be reached at low costs. However, there may be an increment on the costs if the organization opts to employ mechanisms for boosting the rates of response. Personnel in the communication-based center may handle the survey questions that relate to the security of the communications asset in question. The threats should cover the vulnerabilities of the center and potential risks (Sutton & Austin, 2015; Peersman, 2014).

Slide 5 Focus groups

  • Discussion groups where participants are allowed to share opinions
  • Can be created by holding meetings with the communication base personnel

Focus groups can be defined as discussions held in small groups where participants have the freedom to air their opinions and discuss questions. Due to the ambiguity of the Information that may be collected from focus groups, they are best managed by holding the discussions before the administration of survey materials. This method can be implemented by meeting with the communication base personnel. They can then analyze the security questions in the survey and give their opinions on how to ensure security in the base and propose resilience measures.

Slide 6 Record review

  • Collection of Information from existing records
  • Occurs through checking the monthly reports, government documents, and financial documents.

Document or record review involves the gathering of Information in a systematic manner from existing documents. Record reviews can be very efficient and economical if the information is timely and readily available. The reliability and validity of this method of Information collection may increase if the personnel is well trained. By handling a proper assessment of the communication base center’s yearly and monthly reports, the security situation can be analyzed. This analysis can occur by checking for any past hazards and how they were handled as well as anything that the base authorities consider as a threat (Peersman, 2014).

Slide 7 Information collection designs

  • Pre/post measures
  • Time series
  • Post only measures
  • Comparison group

There are several designs for the gathering of Information that the organization can develop. It is important to note that more than one model may be employed. In the case of pre/post measures, Information is collected both at the beginning and when the program comes to an end. Information gathering occurs several times when the program is ongoing in the time series design. The post only measures entail the collection of Information at the end of the program.

Slide 8 Strategies for quality assurance

  • Spot checking
  • Double entry
  • Discussion of Information discrepancies

Assessment for Information quality and checking for errors is an integral part of Information collection that is often overlooked. There are several strategies for ensuring the quality of the collected information. For instance, spot checking provides quality by reviewing different samples of Information and comparing them with the source to check for any anomalies. Double entry involves the creation of a system where Information is collected twice then examined for any anomalies. Discussion of Information discrepancies with the organization is also essential for clarification.

Slide 9 Implementation of Information collection procedures

  • Factors to be considered
  • Personnel to handle the collection
  • Training and steps for collection
  • Monitoring of the process

Implementation of Information collection procedures is a vital part of the plan. It is therefore essential to know how to recruit the most reliable person and how their training of going to happen. Another critical factor for consideration is understanding the steps involved and the necessary resources. Lastly, finding who and how to monitor the process is a vital factor that will prevent any mistakes in the collection

Slide 10 Conclusion

  • Understanding an Information collection plan
  • Choosing the methods for collection
  • Understanding the strategies for quality assurance
  • Implementation of collection procedures

In conclusion, it is essential for the organization to understand an Information collection plan and choose the right methods for the collection of critical infrastructure Information on security. A proper comprehension of the strategies for quality assurance is inevitable. It is also essential for the organization to identify all the factors for consideration before embarking on Information collection

References

Peersman, G. (2014). Overview: Data Collection and Analysis Methods in Impact Evaluation. Florence: UNICEF Office of Research.

Sutton, J., & Austin, Z. (2015). Qualitative Research: Data Collection, Analysis, and Management. The Canadian Journal of Hospital Pharmacy, 68(3), 226-231.