From: Developing public health surveillance dashboards: a scoping review on the design principles
Main principle | Subsidiary principles | Reference | |
---|---|---|---|
Considering aim and target users | ✓ Knowing the audience and their information needs ✓ Level (scale) of focus ✓ Responsible organization and type ✓ Multilanguages available ✓ Scope of web page information ✓ State the purpose of dashboard | ||
Appropriate Content | KPI | ✓ Macro, Mezzo, Micro level KPIs ✓ Timely and actionable indicators based on health system capacity ✓ Including relevant data disaggregation options (Sex, SES) ✓ Managing the type, volume, and flow of displayed information -Disaggregating the information into relevant subgroups | |
Interface | Interaction techniques | ✓ Provide overview of KPIs, change the display size and location information ✓ Zoom in and zoom out, pop-up and control commands and warning, customizable and actionable dashboard ✓ Switching from a global to local view, drill down to the local regions of the map to explore datasets in greater detail, not used of scrolling | |
Visualization techniques | ✓ Choosing the right data visualization ✓ Visualization techniques of data tables, pie charts, bar, histogram, line, area, scatter, bubble and a series of multiple and interactive maps, equipped with geographic information system (GIS) software ✓ Using storytelling and visual cues ✓ Supporting Correct Data Interpretation (using colored markers for clients to indicate their status, highlighting urgent/emergency alerts in red, and showing the data lines in the charts as blue (routine and exercise alerts) or red (urgent and emergency alerts) ✓ Minimizing distractions, clichés, and unnecessary embellishments (routine and exercise alerts) or red (urgent and emergency alerts) | [28, 29, 34, 35, 37, 42, 44, 47, 50,51,52,53,54,55,56,57,58,59] | |
Considering types of data analysis and presentation | Trend Analysis, tracking, and forecasting | ✓ Provide real-time analysis ✓ Linking time trends to policy decisions ✓ Geographic levels of analysis ✓ Global and local comparison ✓ Chart selection, mini map, and global information display ✓ Techniques to analyze time trends and viewing past data ✓ Show trends and changes in data over time ✓ Key numbers relating to a region ✓ Assessing performance ✓ Support identification and evaluation of trends over time | |
Applies machine intelligence | ✓ Anticipate spread and assess patterns ✓ Allow users to select the time period over which performance indicators are displayed ✓ Support comparison against the national average | ||
Reporting format | ✓ Reports in Word and PDF | ||
Infrastructure | Data integration and warehousing | ✓ Proper design of data warehouse and data collection ✓ Data integration with online analytical processing system and data warehouse or other systems ✓ Data warehouse integrated with process data and operational security and data close to real-time ✓ The architecture based on the service-oriented architecture (SOA) | |
Integration data Sources and data generation | ✓ Reporting data sources and methods clearly for trust to the dashboard ✓ Data quality was assessed by examining accuracy, real-time, and completeness ✓ Data Input, Storage, and Extraction process for the extraction of data warehousing ✓ Providing reliable, accurate, consistent and timely data | ||
Data quality | ✓ Completeness (e.g., missing data), correctness (e.g., accuracy), currency (e.g., timeliness), and provenance (e.g., reliability of the source) | ||
Information standards | ✓ Information Exchange standards and content standards ✓ Privacy and security standards, Functional standards (Work processes, workflow and dataflow models) ✓ Standard inputs for the dashboard frontend ✓ Standard architecture for including new datasets into the dashboard ✓ Standard dataset formats for the generation of data visualizations ✓ Data collection, data fusion logic, data curation and sharing, anomaly detection, data corrections, and the supportive human resources | ||
System security | ✓ Methods, techniques, and technologies used to protect data security, attention to system security | ||
Accessibility | ✓ Web and mobile access, desktops, laptops, and tablets |