Dobility sat down with Oxfam Canada’s Anja Kessler to reflect on MERL Tech London 2018, share best practices in digital data collection, and discuss how MEL (monitoring, evaluation, and learning) is improving programing, including Creating Spaces to Act on Violence Against Women and Girls (CS).
Going into effect on May 25, 2018, the General Data Protection Regulation (GDPR) intends to strengthen and unify data protection for all individuals within the European Union (EU). Implications for the international development and research communities could be profound. Learn more in this overview post.
MERL TECH UK 2018 PANEL DISCUSSION Dobility is excited to be speaking at the upcoming MERL Tech UK event in London, March 19th and 20th. Here is a snapshot of…
It was our pleasure to attend EvalFest 2018 organized by the ECOI (Evaluation Community of India) on development evaluation. It truly served as a great learning platform to share the…
Recently, I had the pleasure of interviewing my colleague, Vikas Arora, who has over a decade of experience in the public health sector. Prior to joining Dobility India, he worked in the pharmaceutical industry, taught public health courses at university, and managed mHealth projects in rural areas. I asked Vikas about his work and the opportunities he see to further engage public health researchers in India.
We recently connected with Sharon Weir, the co-founder of 4th Wheel Social Impact (4WSI), about how SurveyCTO aligns with their work improving the way social programs in India are conceptualized, implemented, monitored, and evaluated. She shared details of a recent project in Bangalore that is assessing the impact of life skills program for local youth and why digital data collection is great for researchers AND respondents.
Close your eyes and imagine you’re being interviewed about your sexual behaviors, your finances, and your health conditions – and then asked the same questions about each member of your family. The person speaking with you has taken photos of you, your children, and your home, and they captured your GPS coordinates within one meter of accuracy. You’ve trusted a stranger with incredibly personal and easily identifiable information. But what steps are they taking to keep your data secure and your family safe?
Learn how to design randomized evaluations and implement them in the field to measure the impact of social programs in this new course run by MIT, edX, and Abdul Latif Jameel Poverty Action Lab (J-PAL). "Designing and Running Randomized Evaluations" is part of MIT's "Data, Economics, and Development Policy MicroMasters" program.
Our latest release includes more features in the Data Explorer and some minor updates that will make our users' lives just a little easier. You can read more in the release notes, watch a short video overview, and try the features yourself by logging in and updating to 2.21 today.
We recently interviewed Faizan Diwan, who many of you may know from his work with SurveyCTO. Prior to joining the Dobility team, he spent several years as a Research Manager for Innovations for Poverty Action (IPA) in Kenya, where he led multiple large-scale impact evaluations spanning finance, labor, agriculture, and public health, managed the Busara Center for Behavioral Economics in Nairobi, and helped lead IPA Kenya’s efforts to shift from paper-based to tablet-based surveys. We asked him about digital data collection and his advice for others.
We are beyond excited to share the new Data Explorer exclusively with SurveyCTO users. Not only that, it's FREE and INCLUDED with every subscription tier... at least for now. The Data Explorer enables you to view encrypted data in the browser with your own 2048-bit encryption keys, visualize data in an integrated system that detects the data types of their fields and how they should be labeled, and catch data-quality issues from the first day of data-collection.
Monitor your data-collection more effectively and learn from your data faster with SurveyCTO's upcoming 2.20 release. Learn how we're supercharging your visibility into your data and doubling down on data security at the same time.