Draining the Sea Navigation Bar

Introduction


The Database Design

Parent files and corresponding child and link files

The data base is composed of three types of files. The first is the "Parent File" (PF) which contains primary information from one of the five main categories comprising the data base; PF’s contain general background information about each case, the victims and the violations they suffered, the perpetrators, and the interviewees or witnesses where applicable.

Another type of file is called a "Child File" (CF). A CF is used to match characteristics or details to a record in a parent file; this enriches and increases knowledge about each record in the PF, particularly when a certain aspect of this file includes several different characteristics.

Finally, a third type of file is called a "Link File" (LF) which serves to relate different concepts, elements, or unique ideas in one PF to concepts, elements or unique ideas in another PF. In other words, this file can be used to relate a record in one PF to a record in a different PF.

Figure 1
Database Design

Source: CIIDH

Data base file clusters

The different files are grouped into five clusters containing different types of information and together they form the structure of the data base. The clusters are made up of Context, Victim, Violation, Perpetrator and Interviewee files, with their respective child and link files.

Context Files. These files contain data from information sources, and the geographical and historical contexts in which the violation or event occurred. That is, they include information indicating whether a case was taken from a written source or oral testimony and supply the information required to pinpoint more precisely the place and time in which each case occurred. The variable "Case Narrative" records containing the original account or description of the event is also included.

Victim Files. These files contain data about each victim, including the name, place and date of birth, sex, age, etc., and whether he or she survived the violation. Information about the victim’s work, educational, or organizing activities, as well as social, cultural, and physical characteristics is also codified here.

Violation Files. This file cluster contains all types of violations committed against the physical integrity of each victim appearing in the Victim Files described above. The type of violation suffered by each individual is described based on CIIDH categories and details are given such as the type of injury, the bodily location of the injury, and the type of weapon used by the perpetrators.

Perpetrator Files. This file cluster contains records of information about the perpetrators of the violations found in the Violation Files. The data refers to the background of the perpetrators, their names and whether, in the sources’ judgement, they were members of a government security force, the insurgency, or unidentified paramilitary groups.

Interviewee Files. Available data regarding the location of individuals who provided information about the case, knew the victims, or were witnesses and can provide details about the incident, the victims, perpetrators, or related issues is found here. The relationship of these individuals to the victim is also described.


Draining the Sea Navigation Bar

Table of Contents

Collaboration with Other Organizations Description of the Database Project Table of Contents