User-centred, evidence-based, risk- managed access to data Hans-Peter Hafner 1, Rainer Lenz 1,2, Felix Ritchie 3, Richard Welpton 4 1 Technical University.

Slides:



Advertisements
Similar presentations
S CHOOL OF A GRICULTURAL & R ESOURCE E CONOMICS Making the most of ‘Caring for our Country’: Suggestions for strengthening the program,
Advertisements

Alberto Camacho Jessica George Maria Moya Rekeisha Scott Stephanie Williams Group B:
Local Control and Accountability Plan: Performance Based Budgeting California Association of School Business Officials.
Brian A. Harris-Kojetin, Ph.D. Statistical and Science Policy
A systematic problem solving & decision making method
Facilitation with Fidelity Part 1: A Focus on Delivering Your Program with Fidelity South Carolina Campaign to Prevent Teen Pregnancy.
Risk Analysis & Management. Phases Initial Risk Assessment Risk Analysis Risk Management and Mitigation.
Planning using Problem Analysis and The Theory of Change.
The purpose of this Unit is to enable individuals to develop the key principles, values and attitude which are central to high quality care practice Key.
Design Research Intelligent questioning for effective designs.
Operationalising ‘safe statistics’ the case of linear regression Felix Ritchie Bristol Business School, University of the West of England, Bristol.
The Process of Interaction Design. Overview What is Interaction Design? —Four basic activities —Three key characteristics Some practical issues —Who are.
The Rational Decision-Making Process
International data sharing via standards Felix Ritchie.
The Process of Interaction Design. What is Interaction Design? It is a process: — a goal-directed problem solving activity informed by intended use, target.
Developing a Statistical Disclosure Standard for Europe Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2010: Cornell.
Equality and Diversity
Understand your role 1 Standard.
Develop Systematic processes Mission Performance Criteria Feedback for Quality Assurance Assessment: Collection, Analysis of Evidence Evaluation: Interpretation.
FINANCE IN A CANADIAN SETTING Sixth Canadian Edition Lusztig, Cleary, Schwab.
Chapter Seven Individual & Group Decision Making How Managers Make Things Happen McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc.
AIM-IRS Annual Business Meeting & Training Seminar Decision Making and Problem Solving.
If Community Development is about achieving social justice for all – how can we make sure everyone benefits and contributes, regardless of protected characteristic?
Cost-Benefit & Risk Analysis in Public Policy
ENABLING DATA LINKAGE TO MAXIMISE THE VALUE OF PUBLIC HEALTH RESEARCH DATA Presentation of findings to the Public Health Research Data Forum University.
TVET/BCC TOT 2007 Competency Based Education and Training: Implications for Workforce Antonia Coward PhD.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Evidence-based decision-making needs decisions, evidence.. And? Annie Duflo Innovations for Poverty Action April 8, 2014.
User-focused Threat Identification For Anonymised Microdata Hans-Peter Hafner HTW Saar – Saarland University of Applied Sciences
Audit Sampling: An Overview and Application to Tests of Controls
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Access to sensitive data in the UK: a principles-based approach Felix Ritchie.
MBA7020_01.ppt/June 13, 2005/Page 1 Georgia State University - Confidential MBA 7020 Business Analysis Foundations Introduction - Why Business Analysis.
Indicators to Measure Progress and Performance IWRM Training Course for the Mekong July 20-31, 2009.
Ami™ as a process Showing the structural elements in the Accelerated Model for Improvement™
The Easy Tool Training For Customer Service Representatives By : Veronica Flores
Development of UK Virtual Microdata Laboratory Felix Ritchie Shanghai, March 2010.
David Moser USACE Chief Economist
Professional Ethics and Responsibilities
Human Resource Management JOB ANALYSIS
Unit 10 “ Use English to learn it ” 10-1 Content-Based Instruction (especially for ESP, EOP, and immersion programs)
John Deutsch Institute: Access to Business Data Access to business data: Is the balance of risks right? Felix Ritchie.
Prepared by Amira Selim 31 st October 2009 Revised by Dahlia Biazid Requirements Analysis.
UNIT III. A managerial problem can be described as the gap between a given current state of affairs and a future desired state. Problem solving may then.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Software Engineering 2004 Jyrki Nummenmaa 1 Why new software methodologies The classic waterfall-model based techniques are strongly based on the.
Presented by The Solutions Group Decision Making Tools.
The professional portfolio. VIT standards VIT provisional registration.
Using existing lifts in existing buildings to evacuate disabled persons Derek Smith Technical Director UK Lift and Escalator Industry Association.
Planning Planning is considered the most important element of the administrative process. The higher the level of administration, the more the involvement.
Understanding the Integrated Resource Plan (IRP 2010 Rev 2)
1 Team Skill 4 Managing the scope Noureddine Abbadeni Al-Ain University of Science and Technology College of Engineering and Information Technology Based.
Spontaneous recognition: Risk or distraction
Measurement for Improvement
Access to business data: Is the balance of risks right?
ENVIRONMENTAL ASSESSMENT TOOLS
NHS Tribunal Training Alan D Miller April 2008 Depute Chairman
Open data: who needs it? Presentation by Felix Ritchie
Treatment of statistical confidentiality Part 5 Summary & reflection: rules versus principles Introductory course Trainer: Felix Ritchie CONTRACTOR IS.
The ‘Five Safes’ framework for data access management
The ‘Five Safes’ framework for data access management
Lessons learned in training ‘safe users’ of confidential data
National Principles of Public Engagement
Access to business data: Is the balance of risks right?
Developing Sustainable Projects
Access to confidential data: Is the balance of risks right?
Cooperative & Experiential Education
Dealing with confidential data Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION.
Driving Successful Projects
Presentation transcript:

User-centred, evidence-based, risk- managed access to data Hans-Peter Hafner 1, Rainer Lenz 1,2, Felix Ritchie 3, Richard Welpton 4 1 Technical University of Saarland 2 University of Dortmund 3 University of the West of England, Bristol 4 Valuation Office Agency

Audience participation time Consider these two statements – We should release research data unless it can’t be done safely (open by default) – We should not release research data unless it can be done safely (closed by default) Which better describes your attitude? Which better describes your organisation’s attitude? Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Audience participation time Does the evidence suggest that researchers are – intruders? – idiots? – lazy? – liable to make mistakes? Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Audience participation time “Maintaining confidentiality is our highest priority” – Yes or no? Is it important to incorporate user preferences when designing data release methods? – essential/important Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Audience participation time Can data access be made safe? yes/no Should we plan for worst cases or likely ones? worst/most likely Can we make decisions objectively? objective/subjective Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Audience participation time Finally… all other things being equal, is damaging the data a good thing? – so why do we like doing it so much? Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Producing safe data for research use: what good is SDC? well-established, stable theories multiplicity of methods to address problems solid knowledge of characteristics of different techniques automatic tools to implement and evaluate  it’s very good  it’s very badly used Felix RitchiePage 7 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

SDC in practice Assumption of no-release unless proven Almost no analysis of user needs – or user behaviour No reference to non-statistical tools Quantified risk measures with no basis in fact No recognition of ‘uncertainty’ No reference to evidence Felix RitchiePage 8 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

SDC in practice, in summary we mistake constraints and objectives we plan and assess in a vacuum we treat the user as the enemy we ignore hard decisions about real-world uncertainty in favour of easy pseudo-scientific ones Felix RitchiePage 9 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Data access 2.0 (a) User-centred Default-open, not default-closed user value is the objective – maintaining confidentiality is a constraint – acting lawfully is a constraint – using technology is a constraint, etc etc non-statistical solutions must be considered – data damage is the residual Felix RitchiePage 10 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Data access 2.0 (b) Evidence-based We know what fails in user environments – no intruders (keep worst cases as checks) – researchers are well-intentioned – researchers choose the path of least resistance – everyone makes mistakes we can adjust the world to our liking – good training demonstrably effective – researchers willing to collaborate Felix RitchiePage 11 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Data access 2.0 (c) Risk managed Problems can arise from many sources – apply non-statistical approaches to non-statistical problems – ‘risks’ are not directly comparable The world is uncertain, not risky – our views are necessarily subjective – no monopoly on truth – balance of subjective probabilities Felix RitchiePage 12 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

The chances of change? institutions matter traditions matter power structures matter incentives matter – Especially in government …but it is happening Felix RitchiePage 13 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Reasons for change? cheaper safer more efficient popular with users grounded in the real world – able to stand up to scrutiny – prepared for the future Felix RitchiePage 14 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”

Questions? Attitude: default-open/default-closed Researchers: intruders/idiots/lazy/error-prone/human Confidentiality: is/is not the objective User preferences: essential/important Safe data access: possible/not possible Scenario planning: worst-case/likely threats Decision-making: objective/subjective Damaging data: a good thing/bad thing Felix RitchiePage 15 Hafner Lenz Ritchie Welpton “User centred, evidence-based, risk managed access to data”