Lessons learned in training ‘safe users’ of confidential data

Slides:



Advertisements
Similar presentations
Evaluation Design Designing & Refining Questions Ben Silliman Youth Development Specialist NC 4-H.
Advertisements

Quality Assurance and Quality Enhancement Relationships and Perspectives Professor Barry Jackson PVC, Director of Learning & Teaching Middlesex University.
Child Safeguarding Standards
The role of staff training in enhancing the student experience.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Operationalising ‘safe statistics’ the case of linear regression Felix Ritchie Bristol Business School, University of the West of England, Bristol.
Michael Eburn Senior Lecturer School of Law University of New England ARMIDALE NSW 2351.
Classroom management Elizabeth Karakehagias
Year 11 R and S Ethics Great Ethical Thinkers. Codes of Ethics in Society.
Training of Adults Useful tips to know to conduct a good training Presentation 22.
Student Centered Learning
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
What should teachers do in order to maximize learning outcomes for their students?
Chand Chauhan Yvonne Zubovic FACET Retreat May18, 2013.
Workshop A Risk & Risk Assessment Working in the community Gogarty Consultancy Providing Social Work, Training and Consultancy Services
Eli McGlothern Motivation. Sources Elliot Eisner “The Art and Craft of Teaching” 1983 emeritus professor of Art and Education at the Stanford Graduate.
College of Science and Engineering Evaluation of the Learning and Teaching Strategy: The Way Forward? Velda McCune Centre for Teaching, Learning and Assessment.
Social Care Theory for Practice Values. A Definition of Values Values are part of our personality and direct how we behave, think and therefore how we.
19 th October 2011 GTA Training Student Support Dr Elaine Clark Fellow in Action Learning and Health Care Management.
Rhetorical Framework Purpose Audience Situation Persona/Ethos Message.
Engaged and informed patients: The potential of shared decision making ……… a King’s Fund Conference October 2010.
User-centred, evidence-based, risk- managed access to data Hans-Peter Hafner 1, Rainer Lenz 1,2, Felix Ritchie 3, Richard Welpton 4 1 Technical University.
Incentive compatibility in data security Felix Ritchie, ONS (Richard Welpton, Secure Data Service)
ICAEW Institute of Accountants Banquet Hall 9.00am Concurrent Session 1A Ethical Practice - Black, White or Grey? Mr. Mark Billington.
AN INQUIRY INTO THE STUDENTS’ READINESS TOWARDS SELF- DIRECTED LEARNING L.M. Kapila Bandara Faculty of Education University of Colombo.
Instructional Methods of the Curriculum Dr.Sawsan Mustafa Abdalla Associate Professor.
An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Gill Taylor November 2007 Assessment For Learning at Ivybridge Community College.
Principals of Adult Education & Training. The Four Facts About You  Each person writes down four facts about themselves, one of which is a lie. Sit down.
Bloom, Assessment & Aims and Objectives Module: ES204 Lecturers – Dr Justin Rami.
Professional boundaries
Operating a business in the digital economy
General Data Protection Regulation (EU 2016/679)
21st Centruy Approaches to Teaching Physics
Values and Beliefs.
The challenge of clinician and health system leadership
Spontaneous recognition: Risk or distraction
Provide instruction.
Honours Seminar in Psychology
EMPLOYEE RETENTION, ENGAGEMENT, & CAREERS
Part 2 The Volunteer Code of Ethics
NUS Charter on Complaints & Appeals
The fundamentals of volunteering and the law
One-to-one laptops in English classrooms: Teachers’ concern profiles and the implications to professional development strategies. Wan Fareed Centre for.
Politics & ethics in governance
Introduction to safe guarding in psychology
Sabrina Iavarone Senior User Services Officer
Target Setting for Student Progress
Consumer Decision Processes
Values and behaviours-based recruitment
Open data: who needs it? Presentation by Felix Ritchie
SPORTS MEDICINE 1 OBJ: I WILL LEARN THE RULES AND EXPECTIONS OF THE CLASS OBJ: I STATE PREVIOUSLY LEARNED INFORMATION IN A BASELINE ASSESSMENT OBJ: I WILL.
The ‘Five Safes’ framework for data access management
Applying Critical Thinking in Child Welfare
Dr Julie Watson University of Edinburgh ECRED/Nursing Studies
The ‘Five Safes’ framework for data access management
Consumer Decision Processes
Online Teaching & Learning Online Instructor
New employee induction for new staff and managers
Dr Abby Seltzer Consultant Psychiatrist
Treatment of statistical confidentiality Part 3: Generalised Output SDC Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK.
Reading Paper discussion – Week 4
Effectiveness Working Group
Dealing with confidential data Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION.
Leadership Video Q&A Prompt
TPS Workshop Objectives
Careers in Psychology Module 3.
Heathfield Community School Workshop with Helen Aries
Presentation transcript:

Lessons learned in training ‘safe users’ of confidential data Elizabeth Green and Felix Ritchie, University of the West of England John Newman and Talei Parker, Australian Bureau of Statistics Presentation by Felix Ritchie Professor of Applied Economics Director, Bristol Centre for Economics and Finance Date

How to train users of confidential data Confidential data users can’t be trusted (all potential “intruders”) don’t care about data protection do want to know the law aren’t interested in the nuances of confidentiality Therefore we need to teach them the legal framework give clear unambiguous rules ensure awareness of consequences This also protects the data holder misuse only arises from deliberate flouting of rules (as long as we have covered everything relevant…)

How to train users of confidential data In short, the ideal course frightens the user with knowledge of consequences educates the user in the rules of data use authorises the user to use data, but on his/her own responsibility Q: Are we missing anything? A: Everything important about data access pedagogy human psychology

How to train users of confidential data Confidential data users can’t be trusted (all potential “intruders”) don’t care about data protection do want to know the law aren’t interested in the nuances of confidentiality Therefore we need to teach them the legal framework give clear unambiguous rules ensure awareness of consequences This also protects the data holder misuse only arises from deliberate flouting of rules (as long as we have covered everything relevant…) Nope Nope Nope Nope Nnn… Nnnnn… Nnnnnnno… … ish. Sort of yes No no no no no no no no no…

What do we know about… researchers? Trustworthy Well-intentioned Predominately intrinsically motivated Human

What do we know about… psychology? The information we hear is affected by our motivations social environment preconceptions Rationalisation preferred to rationality

What do we know about… teaching? Interaction better than lectures Self-discovery better than instruction Very low retention of facts Face-to-face better than passive medium

How to train users of confidential data more effectively badly & data holders How to train users of confidential data more effectively badly Assume researchers are… there because they have to be expecting to learn facts focused on themselves focused on their research careers But they are also sensible, intelligent and willing to engage able to hold complex discussions on nuanced topics annoyed by being seen as ‘untrustworthy’ uninterested in and unlikely to retain detail human

The new model: principles Simple, broad messages, not detailed facts Attitudes, not behaviour Community, not individual Positive not negative User-centred, not provider-centred Interaction, not instruction

Old versus new S F A E C A P R U I Old New frighten them to educate them authorise them but shift responsibility New simple attitudinal communitarian positive user-centred interactive S A C P U I F E A R

Old versus new: evidence Directly (breach prevention): almost none Indirectly (positive behaviours): lots of anecdotal evidence Current project to gain evidence: new course designed upon these guidelines pre-/post-course attitudinal questionnaires follow-up behavioural analysis Results by the next UNECE conference…

Questions?