IMPROVING CONFIDENTIALITY WITH tau-ARGUS BY FOCUSSING ON CLEVER USAGE OF MICRODATA Roland van der Meijden MSc. ± 10 minutes.

Slides:



Advertisements
Similar presentations
Alessandra Capobianchi and Luisa Franconi Istat - Division for Information Technology and Methodology - Italy Ntts 2009 Brussel Febbruary 2009 Cell.
Advertisements

Issues in Designing a Confidentiality Preserving Model Server by Philip M Steel & Arnold Reznek.
Statistical Disclosure Control (SDC) at SURS Andreja Smukavec General Methodology and Standards Sector.
1 st Place Post-Secondary Winner. 2 nd Place Post-Secondary Winner.
Eurostat Statistical Disclosure Control. Presented by Peter-Paul de Wolf, Statistics Netherlands (CBS)
RECURSIVE PATTERNS WRITE A START VALUE… THEN WRITE THE PATTERN USING THE WORDS NOW AND NEXT: NEXT = NOW _________.
Writing A History Research Paper The Technique of Writing Like Historians Exit Caitlin Magee February 5, 2015.
Test Effort Estimation Models Based on Test Specifications Eduardo Aranha Paulo Borba TAIC PART 2007 Informatics.
Doc.: IEEE /160r0 SubmissionSlide 1 Output power management for TVWS network coexistence Notice: This document has been prepared to assist IEEE.
Reversing Conway’s Game of Life Jonathan Goetz. The Rules of the Game 1 living neighbor = cell dies 2 living neighbors = cell maintains 3 living neighbors.
Session 4. Panel session: How useful is the notion of “circle of trust” concept ? A vision for the future. Maurice Brandt Destatis Germany 2ND EUROPEAN.
Metadata driven application for aggregation and tabular protection Andreja Smukavec SURS.
Basque Statistics Office Confidentiality Project: Final stages Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality Tarragona, Spain,
Floating point variables of different lengths. Trade-off: accuracy vs. memory space Recall that the computer can combine adjacent bytes in the RAM memory.
Software Estimation and Function Point Analysis Presented by Craig Myers MBA 731 November 12, 2007.
Version 1.1 Tau-Argus and SuperCROSS A practical example using the UK Business Register Unit data Andrea Staggemeier Philip Lowthian Grant Lee.
G-Confid: Turning the tables on disclosure risk Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality Ottawa, Canada 30 October 2013 Peter.
StatLine 4 metadata implementation Edwin de Jonge Statistics Netherlands.
© ITEDO Software 2001 From 3D CAD to Web catalogs Dieter Weidenbrück.
Daniel Beckler United States Department of Agriculture National Agricultural Statistics Service Timothy Mulcahy NORC at the University of Chicago Topic.
U N E C E Software Tools for Statistical Disclosure Control by Complementary Cell Suppression – Reality Check Ramesh A. Dandekar U. S. Department.
1 Assessing the Impact of SDC Methods on Census Frequency Tables Natalie Shlomo Southampton Statistical Sciences Research Institute University of Southampton.
Joint meeting Working Groups on Environmental Accounts & Environmental Expenditure Statistics Luxembourg, 10 March 2015 Confidential data (point 7 of the.
Confidentiality issues in the EU Population and Housing Censuses of 2011 Risks and Criteria.
Final Presentation Industrial project Automatic tagging tool for Hebrew Wiki pages Supervisors: Dr. Miri Rabinovitz, Supervisors: Dr. Miri Rabinovitz,
Handwritten Recognition with Neural Network Chatklaw Jareanpon, Olarik Surinta Mahasarakham University.
Sampling Error Estimation – SORS practice Rudi Seljak, Petra Blažič Statistical Office of the Republic of Slovenia.
1 Using Fixed Intervals to Protect Sensitive Cells Instead of Cell Suppression By Steve Cohen and Bogong Li U.S. Bureau of Labor Statistics UNECE/Work.
Introduction to Software Project Estimation I (Condensed) Barry Schrag Software Engineering Consultant MCSD, MCAD, MCDBA Bellevue.
Techniques to apply cell suppression to large sparse linked tables and some results using those techniques on the 2012 (US) Economic Census Philip Steel,
Statistical data confidentiality and micro data in Albania
1 Overview Importing data from generic raster files Creating surfaces from point samples Mapping contours Calculating summary attributes for polygon features.
We are learning to write expressions using variables. (8-1)
The Application for Statistical Processing at SURS Andreja Smukavec, SURS Rudi Seljak, SURS UNECE Statistical Data Confidentiality Work Session Helsinki,
European Conference on Quality in Official Statistics, Rome, July 2008 Community Innovation Survey: a Flexible Approach to the Dissemination of Microdata.
Access to microdata in the Netherlands: from a cold war to co-operation projects Eric Schulte Nordholt Senior researcher and project leader of the Census.
Joint UNECE/Eurostat work session on statistical data confidentiality Manchester, December 2007 Dealing with Confidentiality in Dissemination: The.
This Certifies that _______________________ Has won 1 st Place in and has successfully completed our 9 week weight loss challenge Proudly given this _____.
EFGS Vienna, 11 November 2015, Mr. Niek van Leeuwen, Non disclosure rules applied on non-hierarchical small areas.
United Nations Statistics Division Dissemination of IIP data.
Joint Eurostat Unece Worksession on Statistical Data Confidentiality 2011, Tarragona Initial analyses on comparable dissemination from the Essnet project.
Independent Component Analysis features of Color & Stereo images Authors: Patrik O. Hoyer Aapo Hyvarinen CIS 526: Neural Computation Presented by: Ajay.
11 Measuring Disclosure Risk and Data Utility for Flexible Table Generators Natalie Shlomo, Laszlo Antal, Mark Elliot University of Manchester
ESTP course, SBS module 13 March 2013 Structural Business Statistics Data reporting to Eurostat, transmission format and tools.
Supervisor : Prof . Abbdolahzadeh
THE FAMU-CIS ALUMNI SYSTEM
Disclosure scenario and risk assessment: Structure of Earnings Survey
CONTENTS 1. Introduction 2. The Basic Checker-playing Program
Confidentiality in Published Statistical Tables
Establishing an Automated Confidentiality Service in Stats NZ
Smart Antenna Rashmikanta Dash Regd.no: ETC-A-52
Access to European microdata for scientific purposes
Treatment of statistical confidentiality Table protection using Excel and tau-Argus Practical course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER.
Treatment of statistical confidentiality Table protection using Excel and tau-Argus Practical course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER.
Structural Business Statistics Data reporting to Eurostat, transmission format and tools ESTP course, SBS module 13 March 2013.
Data from statistical modeling (e. g
Roundtable on Business Survey Frames 17-21/10/2005
Function Rules and Tables.
The Weekend Navigator Part II
This Certifies that ________________________
Item 2.2 of the Agenda Remote access to confidential data for researchers: possible actions under the 7th Framework Programme Pascal JACQUES Unit B 5 15.
Federal Statistical Office Germany Research Data Centre
Chapter 6 Vocabulary Input Output Function
Structural Business Statistics
The role of metadata in census data dissemination
SAFE – a method for anonymising the German Census
Item 5 Wim Kloek, Eurostat
Anco Hundepool Sarah Giessing
Building pattern  Complete the following tables and write the rule 
Future of EDAMIS Webforms
Presentation transcript:

IMPROVING CONFIDENTIALITY WITH tau-ARGUS BY FOCUSSING ON CLEVER USAGE OF MICRODATA Roland van der Meijden MSc. ± 10 minutes

Content of presentation tau-Argus Tuning possibilities Hierarchies Historyfile, information loss and base material Conclusions

Tau-Argus Automated cell suppression software Calculates confidentiality effects on all dimensions of a table simultaneously Offers 4 confidentiality rules: -(n,k)-rule / dominance rule -p%-rule -p-q-rule / prior-posterior-rule -Minimum frequency rule

Tuning possibilities Hierarchies: The way hierarchies are built is of influence on how secondary suppressions are applied. History file: A preference can be given for which cells may or must be secondarily confidential. Information loss weights: Information will be lost when applying secondary suppressions. The way tau-Argus calculates this information loss can be adjusted. Base material: The way the microdata and preferred output are composed is of influence on the way secondary suppressions are applied.

Hierarchies (1)

Hierarchies (2) Status narrow size class size class total size class S - L size class A - E size class % cells A frequency unsafe 32,842,052,961,4 D secondary unsafe 27,231,525,117,9 V safe 35,125,121,520,4 Status wide size class size class total size class S - L size class A - E size class % cells A frequency unsafe 32,841,149,361,4 D secondary unsafe 26,531,528,418,1 V safe 35,725,821,620,2

Historyfile, information loss and base material (1) Historyfile – Confidential, publishable, preferably do (not) suppress secondarily Information loss – Cell value, frequency, equal and distance Base material – Small area estimation, deliberately adjusting microdata and coordination of publication obligations

Historyfile, information loss and base material (2) Methods for determining information loss Cell valueFrequency Status 2 nd digit NACE 3 rd digit NACE 4 th digit NACE 5 th digit NACE 2 nd digit NACE 3 rd digit NACE 4 th digit NACE 5 th digit NACE A frequency unsafe B dominance unsafe D secondary unsafe V safe

Conclusions - tau-Argus is a tool that is helpful in calculating confidentiality effects. - The confidentiality pattern can be influenced. - Improving the confidentiality pattern, takes a lot of effort. - Both tooling and the way base material is used are of influence on the confidentiality pattern.