15.11.2012 Views

icegov2012 proceedings

icegov2012 proceedings

icegov2012 proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Reliability of data: data collected must be reliable, they must not<br />

contain erroneous or inconsistent data;<br />

Security: Data must be accessible only by authorize persons;<br />

Versatility: it must be adapted to the type of data collected;<br />

Robustness should be able to use the system in degraded<br />

conditions (crisis countries, developing countries).<br />

In a broad sense, this data collection is generally established<br />

according to the client-server model:<br />

o The client uses a data collection terminal that can be a sheet<br />

of paper, a computer or mobile phone. The client is the data<br />

collector. This is usually a staff in a public service (doctor<br />

who treats local populations, secretary, municipal agent,<br />

agricultural agents etc.).<br />

o A medium that connects the customer's terminal to the server<br />

from the center of decisions. This medium may be the Internet<br />

or mobile phone through computer network or a USB key into<br />

a car, in case of transmission by surface or aerial (roads,<br />

rivers, airplanes);<br />

o Multiple protocols can be used to route data collected at the<br />

client to the server: SMS, MMS, HTML, WML, i-HTML, text<br />

file or data collection sheets. The protocols are generally<br />

dependent on the transmission medium;<br />

Once in the server at the center of decision, the data is stored in a<br />

database to be further processed.<br />

Below we give details the three main implementation of this<br />

client-server architecture.<br />

2.1. Computer-Internet-Server (CIS)<br />

We are here as part of a standard web application: the client is a<br />

computer (or smartphone) and the communication medium is<br />

Internet. The protocol for data exchange is usually the HTML<br />

language or assimilated. This architecture is commonly<br />

implemented in industrialized countries in almost all sectors<br />

(banks, municipalities, health, politics etc.). It has been used in<br />

France in 2010 for the prevention and monitoring of diabetes [6]<br />

and described in [11] as a good tool for e-democracy.<br />

This architecture ensures the timeliness of data because the data<br />

transmission medium, the Internet is fast enough in terms of time<br />

required by health systems. With data exchange protocols used,<br />

the chances of obtaining reliable data are large. Indeed,<br />

information gathered can be typed and verified (entered in a<br />

form), the controls (either automatically by the web servers) and<br />

transmission errors prevented by TCP/IP protocol. These<br />

protocols will also help ensure a high level of security by<br />

encrypting data. This system is also versatile: only the server<br />

needs to be updated in case of modification of the application.<br />

However, this architecture can be deployed in a context in which<br />

the Internet is degraded or nonexistent as in countries in crisis<br />

(war, natural disaster) or the developing countries. It does not<br />

answer our criteria for robustness.<br />

2.2. Mobile-GSM-Server (MGS)<br />

This architecture consists of a cell phone as a client. The person<br />

responsible for collecting the data types of SMS or MMS<br />

containing data to be transmitted. SMS or MMS messages are<br />

then transmitted via the Global System for Mobile communication<br />

407<br />

(GSM) to the server. The GSM network is the most common<br />

worldwide, it is often used in the management of health crises in<br />

developing countries or countries hit by natural disasters that see<br />

their wire line telecommunications infrastructure destroyed. It was<br />

used in China in 2005 after the earthquake [16], in Cameroon in<br />

2010 during the cholera outbreak [8], and in many other countries<br />

in Africa [2, 4, 5, 10, 15].<br />

This solution ensures the timeliness of data as SMS and MMS<br />

messages are sent immediately. But completeness is not always<br />

guaranteed because the data being entered into SMS or MMS, it is<br />

possible that the data collectors forget to enter some data which<br />

are confused (inverted data, invalid data). Security is not<br />

guaranteed because the data are difficult to quantify. Finally, it is<br />

not versatile because the change in one component can affect the<br />

data collector and require a new formation of the latter. It is robust<br />

against GSM networks as well resist natural disasters and are<br />

present in most countries.<br />

2.3. Human-Route-Server (HRS)<br />

For this architecture, the client is a person who collects the data<br />

with a data collection sheet paper or a computer for data capture<br />

and recording in file that can be stored on removable media. Note<br />

cards or removable media are then transmitted via the road, air or<br />

river. This system is one that is most prevalent in developing<br />

countries with no electronic system of data collection or in areas<br />

where Internet and GSM networks are absent. It is used in most<br />

countries south of Sahara in Africa [7, 12, 14].<br />

This increases the chances of obtaining reliable and complete data<br />

because the information collected may be typed (with spread<br />

sheets in the case of computerized data input or when integrating<br />

data in the case of data input on papers). Meanwhile, timeliness of<br />

data is not always guaranteed because the distance between the<br />

server and the client is often far apart and roads are bad. Data<br />

security can be ensured through file (encryption) but more<br />

difficult in the context of paper records. This system is not as<br />

versatile an update paper forms or entry program on a computer<br />

disconnected from the network is a difficult operation. For against<br />

this approach is robust: it can use on a multitude of medium (road,<br />

air, sea).<br />

2.4. Synthesis<br />

Given the table 1, no approach satisfies all the criteria of data<br />

collection systems of NHIS simultaneously. The next section<br />

presents our approach which opens way for the simultaneous<br />

consideration of all these criteria.<br />

Table 1. The different architectures<br />

architecture completeness promptness reliability<br />

CIS Good Good Good<br />

MGS Bad Good Bad<br />

HRS Good Bad Good<br />

architecture security versatility robustness<br />

CIS Good Good No<br />

MGS Bad Bad Yes<br />

HRS Bad Bad Yes

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!