Discussion of “ Statistical Disclosure Limitation: Releasing Useful Data for Statistical Analysis” Nancy J. Kirkendall Energy Information Administration.

Slides:



Advertisements
Similar presentations
Characterization and Management of Multiple Components of Cost and Risk in Disclosure Protection for Establishment Surveys Discussion of Advances in Disclosure.
Advertisements

Issues in Designing a Confidentiality Preserving Model Server by Philip M Steel & Arnold Reznek.
Statistical Disclosure Control (SDC) at SURS Andreja Smukavec General Methodology and Standards Sector.
Design of Experiments Lecture I
BTS Confidentiality Seminar Series June 11, 2003 FCSM/CDAC Disclosure Limiting Auditing Software: DAS Mark A. Schipper Ruey-Pyng Lu Energy Information.
Confidentiality risks of releasing measures of data quality Jerry Reiter Department of Statistical Science Duke University
© Statistisches Bundesamt, IIA - Mathematisch Statistische Methoden Summary of Topic ii (Tabular Data Protection) Frequency Tables Magnitude Tables Web.
Eurostat Statistical Disclosure Control. Presented by Peter-Paul de Wolf, Statistics Netherlands (CBS)
Enhancing Data Quality of Distributive Trade Statistics Workshop for African countries on the Implementation of International Recommendations for Distributive.
In a Virtual Data Centre Protecting Confidentiality COMPUTATIONAL INFORMATICS Christine O’Keefe, Mark Westcott, Adrien Ickowicz, Maree O’Sullivan, CSIRO.
Sensitivity Analysis for Observational Comparative Effectiveness Research Prepared for: Agency for Healthcare Research and Quality (AHRQ)
Lecture 18: Topics Integer Program/Goal Program AGEC 352 Spring 2011 – April 6 R. Keeney.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Size Comparisons Using Percentages. One hundred percent of something is the ENTIRE THING. One hundred percent of 1 is 1. One hundred percent of 100 is.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Multiple Indicator Cluster Surveys Data Dissemination and Further Analysis Workshop Data Archiving MICS4 Data Dissemination and Further Analysis Workshop.
Metadata driven application for aggregation and tabular protection Andreja Smukavec SURS.
Vienna, 23 April 2008 UNECE Work Session on SDE Topic (v) Editing on results (post-editing) 1 Topic (v): Editing based on results Discussants: Maria M.
Microdata Simulation for Confidentiality of Tax Returns Using Quantile Regression and Hot Deck Jennifer Huckett Iowa State University June 20, 2007.
1. “Software for Tabular Data Protection” Joe Fred Gonzalez, Jr. Lawrence H. Cox National Center for Health Statistics NCHS Data Users Conference July.
Overview of 2002 CIPSEA: Methods to Protect Confidential Tabular Data Amrut Champaneri, Ph.D. U.S. Department of Transportation Bureau of Transportation.
Copyright © Cengage Learning. All rights reserved. 5 Probability Distributions (Discrete Variables)
NSI/ISI Statistical software Issues and a way forward to maximise re-use and minimise integration efforts by Andrea Toniolo Staggemeier.
Confidentiality Issues with “Small Cell” Data Michael C. Samuel, DrPH STD Control Branch California Department of Public Health 2008 National STD Prevention.
Chapter 19 Confidence Interval for a Single Proportion.
JSM, Boston, August 8, 2014 Privacy, Big Data and The Public Good: Statistical Framework Stefan Bender (IAB)
Daniel Beckler United States Department of Agriculture National Agricultural Statistics Service Timothy Mulcahy NORC at the University of Chicago Topic.
Providing Access to Census- based Interaction Data in the UK: That’s WICID! John Stillwell School of Geography, University of Leeds Leeds, LS2 9JT, United.
Copyright 2010, The World Bank Group. All Rights Reserved. Part 2 Labor Market Information Produced in Collaboration between World Bank Institute and the.
Census/NeSS Roadshows March 2003 Better Information Initiatives.
1 The American Community Survey An Update Pamela Klein American Community Survey Office Washington Metropolitan Council on Governments Cooperative Forecasting.
Copyright 2010, The World Bank Group. All Rights Reserved. Business tendency surveys, part 1 1 Business statistics and registers.
Dissemination and interpretation of time use data Social and Housing Statistics Section United Nations Statistics Division Time Use Statistics workshop.
U N E C E Software Tools for Statistical Disclosure Control by Complementary Cell Suppression – Reality Check Ramesh A. Dandekar U. S. Department.
1 New Implementations of Noise for Tabular Magnitude Data, Synthetic Tabular Frequency and Microdata, and a Remote Microdata Analysis System Laura Zayatz.
Assessing Disclosure for a Longitudinal Linked File Sam Hawala – US Census Bureau November 9 th, 2005.
Comments: The Big Picture for Small Areas Alan M. Zaslavsky Harvard Medical School.
The use of protected microdata in tabulation: case of SDC-methods microaggregation and PRAM Researcher Janika Konnu Manchester, United Kingdom December.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Some ACS Data Issues and Statistical Significance (MOEs) Table Release Rules Statistical Filtering & Collapsing Disclosure Review Board Statistical Significance.
Michelle Simard Statistics Canada UNECE Worksessions on Statistical Disclosure Control Methods Helsinki, October 2015 Development of rules from administrative.
1 Using Fixed Intervals to Protect Sensitive Cells Instead of Cell Suppression By Steve Cohen and Bogong Li U.S. Bureau of Labor Statistics UNECE/Work.
Statistical data confidentiality and micro data in Albania
Building Simulation Model In this lecture, we are interested in whether a simulation model is accurate representation of the real system. We are interested.
Disclosure Limitation in Microdata with Multiple Imputation Jerry Reiter Institute of Statistics and Decision Sciences Duke University.
Differential Privacy Some contents are borrowed from Adam Smith’s slides.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
Inference: Probabilities and Distributions Feb , 2012.
Lisa Neidert Population Studies Center May 26-28, 2010 Ann Arbor, MI Third Working Group on Data Access.
Joint UNECE/Eurostat work session on statistical data confidentiality Manchester, December 2007 Dealing with Confidentiality in Dissemination: The.
Development of UK Virtual Microdata Laboratory Felix Ritchie Shanghai, March 2010.
United Nations Statistics Division Dissemination of IIP data.
Michelle Simard Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality Tarragona, Spain, November 23 rd, 2011 Progress on Real Time Remote.
Державна служба статистики України Statistical confidentiality assurance framework in State Statistics Service of Ukraine Anton Tovchenko head of mathematical.
1 Confidentiality and Data Access Committee Jacob Bournazian, Chair Energy Information Administration BTS Confidentiality Seminar Series June 11, 2003.
Confidence Interval for a Single Proportion.  Remember that when data is categorical we have a population parameter p and a sample statistic.  In this.
Census 2011 – A Question of Confidentiality Statistical Disclosure control for the 2011 Census Carole Abrahams ONS Methodology BSPS – York, September 2011.
The London Health Observatory: monitoring health and health care in the capital, supporting practitioners and informing decision-makers Disclosure control.
Reconciling Confidentiality Risk Measures from Statistics and Computer Science Jerry Reiter Department of Statistical Science Duke University.
11 Measuring Disclosure Risk and Data Utility for Flexible Table Generators Natalie Shlomo, Laszlo Antal, Mark Elliot University of Manchester
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Chapter 21 More About Tests and Intervals.
Expanding the Role of Synthetic Data at the U.S. Census Bureau 59 th ISI World Statistics Congress August 28 th, 2013 By Ron S. Jarmin U.S. Census Bureau.
Natalie Shlomo Social Statistics, School of Social Sciences
“Software for Tabular Data Protection”
Confidentiality in Published Statistical Tables
Dissemination Workshop for African countries on the Implementation of International Recommendations for Distributive Trade Statistics May 2008,
Classification Trees for Privacy in Sample Surveys
Building Valid, Credible, and Appropriately Detailed Simulation Models
Anco Hundepool Sarah Giessing
Imputation as a Practical Alternative to Data Swapping
Presentation transcript:

Discussion of “ Statistical Disclosure Limitation: Releasing Useful Data for Statistical Analysis” Nancy J. Kirkendall Energy Information Administration April 28, 2003 BTS Confidentiality Seminar Series, April 2003

A Subtle Difference Steve says “Statistical disclosure limitation needs to assess tradeoff between preserving confidentiality and usefulness of released data.” I would phrase it differently. Statistical agencies are required to preserve confidentiality, and within that constraint must make released data as useful as possible.

Basic Agreement We need better approaches to providing more useful information while protecting confidentiality.

Count vs. Magnitude Data Steve stresses the importance of using methods based on likelihood function. He uses count data. Distributional theory for count data in tables well established Most EIA data are magnitude data. Data may follow any distribution, with skew distributions most common. Not obvious how to base general methods on the likelihood function

Count vs. Magnitude Data (continued) Steve claims that using LP and IP approaches to finding bounds is NP hard -- for count data. For magnitude data finding optimal set of complementary suppressions in 3 or more dimensions is NP hard. Finding bounds is possible, and software is available.

Software to Compute Bounds Up to 3D has been available for decades. (CONFID, Census) More than 3D since ’95 (ACS), since ’01 (DAS) If table adds, bounds are computed. If table does not add, two approaches Make minor adjustments to make the table add. Then compute bounds (ACS, CONFID, Census) If the table does not add because of rounding, explicitly account for constraints due to the rounding process (DAS)

Teaching Survey Staff to Use Confidentiality Software Difficult for people to understand table dimensionality We need A tutorial to teach people how to translate tables in pubs into the mathematical structure of SDL for input into software User friendly interface to do it automatically

Releasing Useful Data I will use Steve’s example 2 to compare information released via Steve’s method Suppression Controlled tabular adjustment Example based on theory that low cell count = sensitive

Example 2, with 6 variables (ABCDEF) Steve determines that he can release the margins ADE, ABCE, and BF. (And nothing else.) Bounds indicate no confidentiality concern. However, he is releasing only 15% of all possible cells.

Comparison of Amounts of Data Released Of the 2 6 = 64 interior cells, there are a total of 3 6 =729 cells (including all marginal totals). Steve releases 105 ( ) cells. So 105/729=14.4% of data are released. Cell suppression, thanks to Ramesh Dandekar 9 sensitive cells (6 interior and 3 marginal totals using n =3 or less as sensitive) 103 complementary suppressions “Swiss cheese” approach releases ( )/729=84.6% of data

Comparison of Amounts of Data Released (continued) Ramesh also applied his controlled tabular adjustment. Adds or subtracts something from sensitive cells to protect Adjusts other cells to balance the table Result is release of counts for 100% of the cells The challenge is to make sure inferences are preserved.

How to Assure Inferences are Preserved? Ramesh regularly provides a histogram showing the distribution of percentage changes made to cells This documents changes made. Research needed to define an appropriate set of statistical tests To document the impact of changes on statistical analysis

Changing Data to Protect Confidentiality Not everyone thinks it is a good idea. Some users do not trust the result. When Ruben proposed simulating microdata in 1993 the users were aghast – they wanted the data. How to convince users the adjusted data are as good for inferences as the original? How to convince respondents that SDL has been applied?

However The sensitive cells in establishment data are frequently the small ones. High percent change to sensitive cells – is this worse than “W”? Small changes to big cells might be viewed as using different bases for rounding. Might be able to sell this. In some situations market dominated by giants – e.g., Large civil US Airliner Manufacturers. Not sure there is much that can be done if there is one giant in a cell

Tables versus Query System Challenges in confidentiality not the same Comparisons not really fair Current approaches Protect microdata. Then any tabulations are OK. Apply confidentiality protection to tables. Any data not suppressed can be released. NISS is trying to do something different.

In Addition to Research on Methods, We Need Comparisons of SDL methods on the same data sets, to facilitate real comparisons Ramesh has provided 8 simulated data sets. Agreement on standard measures for comparison Research to define a standard set of statistical tests to determine whether two tables provide same (multivariate) inferences Development of documentation for the public describing changes without allowing “intruder” to undo protection

Now for A Different Spin “What is Sensitive?” (thanks to Gordon Sande for this example)

Sources Ramesh Dandekar, EIA – work using Example 2. Research on controlled adjustment or synthetic tabular adjustment, simulated data Gordon Sande, Sande and Associates, Inc– general insights, use of rounding to protect data, software, last example Tore Delanius and Ivan Fellegi – work in the 1970’s – did the initial work on the danger of “association” in tables.