Data Security

This page outlines the steps in a typical research project and lists each topic within data security that a research team should consider at that point. If you are following these best practices, then not even the full research team has access to identifying data, but very rarely that is ever needed to do the analysis.

Naming Conventions

Impact Evaluation projects should follow a clear file naming convention as many team members will need to understand and interact with files over the project lifetime. It is very important to use a naming convention that not only you understand but someone looking at the files after years also understands.

Research Documentation

When publishing research, it is important to make documentation available so that readers can understand the details of the research design that the work reports. This includes all of the technical details and decisions that could influence how the findings are read or understood. Usually, this will involve producing a document along the lines of a methodological note or appendix. That document will describe how a given study was designed and how the design was carried out.

Dissemination

Dissemination is the process of sharing impact evaluation (intermediate or final) results to impact policy decisions and direct resources towards proven and effective interventions. Effective dissemination of findings and results involves careful planning, thought, consideration of target audiences, and communication with those audiences.