Lending a hand:developing a support structure for young migrants in South Africa and Uganda
We use mixed methods to adapt, implement and evaluate the feasibility of an intervention. We will use participatory methods working with youth advisory groups in both countries already engaged in the design of this project, to develop and implement the intervention. Then we will conduct a mixed methods process evaluation to assess which facets of the package are valued and test our assumptions about the challenges young migrants face and the appropriateness of the intervention offered.
The work is divided into four phases across 30 months: Phase 1 (months 1-3): recruitment of staff and other preparations; Phase 2 (months 4-9): Baseline assessment and co-designing the intervention with young people and other stakeholders; Phase 3 (months 10-21): Implementation of the intervention; Phase 4 (months 22-30): Analysis, dissemination and discussions on refinement of the intervention and, if the intervention is feasible, the design of a full-scale trial.
Adolescents; mobility; migration; South Africa; health; wellbeing
Africa Health Research Institute
PIP area - and Mtubatuba, KwaZulu-Natal
All young people who have migrated, with particular attention to young people who have moved into or out of UMkhanyakude (who are within twelve months of their move to the new location) while still providing advice to migrants of longer standing, who may be planning a further move or trying to make a change in their employment, for example
Producers and sponsors
Africa Health Research Institute
For the baseline survey : The sample size calculation for the baseline and end-line surveys is based on a simple one sample test of proportions to demonstrate acceptability defined as the proportion of our participants who use our services is at least 50%. To do this, we will simply count the proportion of baseline participants offered the intervention who make contact with our peer-supporter intervention by three months. In the end-line survey, following 9-10 months of intervention delivery, we will measure the proportion of the population who have engaged with at least one of the health-related, skills-related or social service components of the intervention. We have been conservative with our sample size calculation, allowing for the fact that sample size estimates such as these are very sensitive to the assumption of the expected proportion. We expect uptake to be 60%; as long as it is at least 50% we will achieve power of greater than 94%.
Dates of Data Collection
The representative of the Receiving Organization agrees to comply with the following conditions:
1. Access to the restricted data will be limited to the Lead Researcher and other members of the research team listed in this request.
2. Copies of the restricted data or any data created on the basis of the original data will not be copied or made available to anyone other than those mentioned in this Data Access Agreement, unless formally authorized by the Data Archive.
3. The data will only be processed for the stated statistical and research purpose. They will be used for solely for reporting of aggregated information, and not for investigation of specific individuals or organizations. Data will not in any way be used for any administrative, proprietary or law enforcement purposes.
4. The Lead Researcher must state if it is their intention to match the restricted microdata with any other micro-dataset. If any matching is to take place, details must be provided of the datasets to be matched and of the reasons for the matching. Any datasets created as a result of matching will be considered to be restricted and must comply with the terms of this Data Access Agreement.
5. The Lead Researcher undertakes that no attempt will be made to identify any individual person, family, business, enterprise or organization. If such a unique disclosure is made inadvertently, no use will be made of the identity of any person or establishment discovered and full details will be reported to the Data Archive. The identification will not be revealed to any other person not included in the Data Access Agreement.
6. The Lead Researcher will implement security measures to prevent unauthorized access to licensed microdata acquired from the Data Archive. The microdata must be destroyed upon the completion of this research, unless the Data Archive obtains satisfactory guarantee that the data can be secured and provides written authorization to the Receiving Organization to retain them. Destruction of the microdata will be confirmed in writing by the Lead Researcher to the Data Archive.
7. Any books, articles, conference papers, theses, dissertations, reports, or other publications that employ data obtained from the Data Archive will cite the source of data in accordance with the citation requirement provided with the dataset.
8. An electronic copy of all reports and publications based on the requested data will be sent to the Data Archive.
9. The original collector of the data, the Data Archive, and the relevant funding agencies bear no responsibility for use of the data or for interpretations or inferences based upon such uses.
10. This agreement will come into force on the date that approval is given for access to the restricted dataset and remain in force until the completion date of the project or an earlier date if the project is completed ahead of time.
11. If there are any changes to the project specification, security arrangements, personnel or organization detailed in this application form, it is the responsibility of the Lead Researcher to seek the agreement of the Data Archive to these changes. Where there is a change to the employer organization of the Lead Researcher this will involve a new application being made and termination of the original project.
12. Breaches of the agreement will be taken seriously and the Data Archive will take action against those responsible for the lapse if willful or accidental. Failure to comply with the directions of the Data Archive will be deemed to be a major breach of the agreement and may involve recourse to legal proceedings. The Data Archive will maintain and share with partner data archives a register of those individuals and organizations which are responsible for breaching the terms of the Data Access Agreement and will impose sanctions on release of future data to these parties.