mapping - PowerPoint PPT Presentation

1 / 45
About This Presentation
Title:

mapping

Description:

On the walls of caves near Lascaux, France, Cro-Magnon hunters drew pictures of ... to track the migration routes of caribou and polar bears to help design programs ... – PowerPoint PPT presentation

Number of Views:46
Avg rating:3.0/5.0
Slides: 46
Provided by: Gunas
Category:
Tags: caribou | mapping

less

Transcript and Presenter's Notes

Title: mapping


1
mapping
targeted interventions
for
2
before we begin some history
3
On the walls of caves near Lascaux, France,
Cro-Magnon hunters drew pictures of the animals
they hunted 35,000 years ago. Associated with
the animal drawings are track lines and tallies
thought to depict migration routes. These early
records followed the two element structure of
modern geographic information systems a graphic
file linked to an attribute data base.
35,000 year old technology!!!
4
Today, biologists use collar transmitters and
satellite receivers to track the migration routes
of caribou and polar bears to help design
programs to protect the animals. In a GIS map,
the migration routes were indicated by different
colors for each month for 21 months.
Researchers then used the GIS to superimpose the
migration routes on maps of oil development plans
to determine the potential for interference with
the animals.
ok. mapping helps animals and oil Industry. so
what?
5
mapping has been used throughout history in every
field including health, medicine, government
social sciences.
How can mapping help local targeted
interventions???
6
collecting, storing, analyzing and using
information are the toughest tasks in targeted
interventions
information can be stored, viewed and analyzed in
different ways!
Let us look at the way mapping has been done in
some states
7
Contents
  • Mapping Basics
  • Target Groups
  • Approach
  • Methodology
  • Ethics

8
Mapping Basics
Map Layers of Information linked to location
9
Mapping Basics
Map Layers of Information linked to location
Base Map
Layers
10
Contents
  • Mapping Basics
  • Target Groups
  • Approach
  • Methodology
  • Ethics

11
Target Groups for Mapping
A.       Core Transmitter Groups B.       Mobile
Occupation Groups C.       Settlements/communities
with Risk Factors D.       Workplaces with Risk
Factors E.       Outdoor occupation groups in
Urban areas F.       Vulnerable Groups in Urban
areas G. Other groups with known Risk
Behaviour
12
Contents
  • Mapping Basics
  • Target Groups
  • Approach
  • Methodology
  • Ethics

13
Approach
  • National Level
  • State Level
  • NGO Level
  • Policy
  • Programme
  • Project

14
Approach
What Information will be needed at the Project
level?
Detailed Information
  • Situation Analysis
  • Social mapping
  • Needs Assessment
  • Baseline measurements on Indicators
  • Etc

Overlapping terms
15
Approach
What Information will be needed at the National
Level?
For each Target Group
  • Where are they located ?
  • How many of them are there ?

Anything else?
16
Approach
What Information will be mapped at the State
Level?
Location Numbers of each target
group Category of Target Group at Risk where
critical to the mapping process

Local NGOs CBOs with access to each target group
17
Approach
This information will be in the form of
  • Maps showing locations / sites
  • Estimates of the population at each site
  • Relevant local categories at the site
  • Risk situations (qualitative)


List of local NGOs CBOs
18
Approach
Approaches for mapping at state level
  • Prioritisation
  • Saturation
  • Convenience

19
Contents
  • Mapping Basics
  • Target Groups
  • Approach
  • Methodology
  • Ethics

20
We're on the streets, how much easier can it be
to find us? A Sex worker
21
Methodframe
22
Methodframe
23
Methodframe
  • Toolbox
  • Secondary Research
  • Sample survey
  • Group discussion
  • Depth Interview
  • Expert Estimates
  • Rapid Assessment
  • Participatory Map
  • Observation
  • Traffic counts
  • Listing
  • Delphi

24
Methodframe
25
Methodframe
26
Broad mapping tasks
Identify Validate Classify Estimate List
Assess Find
  • Sites with likelihood of finding the target
    group.
  • High Risk Behaviour of the Target Group.
    (Qualitatively)
  • Target group into different types present at each
    site based on local knowledge terminology
  • Numbers of the target groups who
    live/solicit/have sex/visit regularly for other
    reasons at each site (using available
    methodology)
  • Other places where the target group found in each
    mapped site live / solicit /have sex/visit
    regularly for other reasons.
  • Changes in the target group size at specific
    sites due to seasons, events, timings and
    specific days of a week or month
  • Local NGOs, Sexual Health service providers

27
Methods
App
Toolbox
  • Secondary Research
  • Sample survey(?)
  • Group discussion
  • Depth Interview
  • Expert Estimates
  • Rapid Assessment Techniques
  • Participatory Mapping
  • Observation
  • Listing
  • Traffic counts
  • Delphi

28
Key method
DELPHI
  • Developed by RAND corporation for different
    purposes Adapted for estimation of sensitive
    hidden Information
  • Involves Identifying Local experts Local to
    the extent of one or few streets More Local
    Better results
  • Involves repeated Independent estimates by a
    panel of Local Experts followed by sharing
    insights Estimates by other panelists and
    challenging / Revising estimates till consensus
    is reached or till sufficient Information is
    available
  • Method Extensively Tested at 4 cities/towns by

29
Key method
Capture-Recapture Method
  • This technique is used to arrive at estimates of
    the size of populations of mobile animals like
    ground beetles, fishes etc. An initial sample of
    the population in question is caught, its
    individuals marked and then release back into the
    wild and note taken of the number released. This
    marked individuals are allowed to become randomly
    dispersed throughout the population and then a
    second sample is taken. Its size and the number
    in it of marked and hence recaptured individuals
    are noted.
  •  

30
Key method
Capture-Recapture Method
  • Example
  •  Suppose we want to count number of fishes in a
    pond. Total number of fish in the pond is N
    (unknown figure). On the first day we catch 100
    fishes (we will call it M), mark them with a
    red spot and release them in the pond.
  •  The next day we return to the pond and again
    catch 100 fishes (we will call it n). From the
    catch 5 fishes are having red colour mark made by
    us on the previous day (we will call it m). So
    the equation is
  • M _m_ 100 _5_ 100 X 100 N
    2000
  • N n   N 100 5
  • That means the total number of the fish in the
    pond is 2000.

31
Other Methods
Fairly standard and well known research methods
32
Broad mapping tasks
  • Identify Sites
  • Validate Risk
  • Classify Target Groups
  • Estimate Size
  • List Other sites
  • Assess seasonal/Periodical Changes
  • Find NGOs, CBOs, SHSP


33
  • Sources (Key Informants)
  • Primary Key Informants are Target Group members
    their Risk partners (Example Sex workers their
    Clients)
  • Secondary Key Informants are those part of /close
    to the Risk circuits (Example pimps, agents,
    brokers, madams, underworld, hotel workers,
    shopkeepers near risk sites, ARD around risk
    sites, SHSP, other sex circuit/network members)
  • Tertiary Key Informants are those with a good
    idea of the target group at a Taluka/district/stat
    e level (Example NGOs, Govt officials,
    Underworld leaders, Network dons, Union leaders,
    prison inmates)

34
  • Sites
  • A Mapping Site is a contiguous area with a
    defined boundary in which a people belonging to a
    specific target group can be found to aggregate
  • Contiguous continuous area without a break
    having similar patterns of risk behaviour
    activity or similar target group presence
  • Defined boundary it is important to define
    the boundary of the Site being mapped to avoid
    overlap or double counting. Sites can be
    identified from key informant interviews and
    secondary data. Site boundaries can be defined
    before, during or after the estimation at spots
  • Aggregate Concentrated pocket where the target
    group is found to Live /Seek Risk / Take Risk /
    Work / Hangout / Seek Services
  • In other words Where can we find ___ (target
    group)?

35
Identifying Sites
36
Identifying Sites
  • Identified throughout the mapping effort (till
    the end)
  • Initially from Tertiary KI at District level
  • Later at sites from Primary Secondary KI at
    site level (Site Mapping Booklets)
  • Also from Lead Slips (information from other
    teams doing mapping in other Districts)
  • Enter Key Informant Information in Key Informant
    Log
  • Enter Site name Target Group in Site Suspect
    List
  • Keep adding names of new sites in Site Suspect
    List till the end of mapping

37
Identifying Sites
District____________________
Key Informants Log
38
Identifying Sites
District____________________
Site Suspect List List from different interviews.
Lead slips from other districts, Information from
other sites. List to be updated throughout the
fieldwork
Reasons for not mapping site C-Combined with or
split from other Sites, S-Too small to cover
N-No Risk found after Visit, P-Problems in
Mapping-Could not visit, U-Untraceable/No Such
Site, L- located in other District (generate
lead Slip) D-Duplication.
Code after mapping the site
39
Validating Risk
40
Validating Risk
  • Validation Steps
  • Identify Interview Doctors treating STDs among
    patients from the site, fill up information gaps
    with clinic staff, chemist etc.
  • Conduct Group Discussion among Primary Target
    Group members at site
  • Look for presence of Sex workers/risk sources
    nearby
  • Ask Sex workers about client profiles

Do the _____(Target Group) found at _____Site
Have STDs? / Known Risk Behaviour? Who are their
sex partners? (regular, Paid Non Regular, Casual
Non Regular) How Risky is the Behaviour? Do they
visit Sex workers nearby/ far away? What are the
risk situations?
41
Validating Risk
Reference Period last 12 months Sex
partners Regular Wife/ Husband Fiancée Live-in
partner Other regular/ faithful partner Paid Non
Regular Sex worker Other Paid Sex partner who has
other paying partners Casual Non
Regular Occasional fling
42
Site Mapping Booklet
  • Separate booklet for each target group at each
    site
  • Site definition/boundaries could vary
  • Site boundaries may have to redefined as the
    mapping progresses
  • Contents
  • Qualitative report on Validation of Risk (based
    on group discussions)
  • Site Location Map (base map showing site
    location)
  • Final Site Map (site map showing site boundaries)
  • Site Summary
  • Detailed description of the Site followed by
    description of the site boundaries and the type
    of Risk activity at the Site, Types of Target
    Group in the site etc.. Attach additional pages
    as required.
  • Site Estimation Summary (fill up after completion
    of site field work)
  • Types of Target Group at site (From Key Informant
    Interviews/discussions)
  • Site Estimate Worksheet
  • Other places visited (outside site in past 12
    months)
  • Delphi Form
  • Lead Slips

43
Contents
  • Mapping Basics
  • Target Groups
  • Approach
  • Methodology
  • Ethics

44
It is unethical to conduct research which is
badly planned or poorly executed
In research on man the interest of science and
society should never take precedence over
considerations related to the well being of the
subject
Declaration of Helsinki
45
Ethical Considerations
  • Informed Consent (Written from DELPHI Panel
    Members)
  • Confidentiality (No Names, No Police, Numbered
    copies of Report)
  • Right to Refuse/Walk out (Better Interview)
  • Benefit - Do not Damage (Information/Treatment)
  • Collect only what is needed (Numbers Location )
Write a Comment
User Comments (0)
About PowerShow.com