The LongNow. Why FERPA? The Sequel: Key Problems Entity Resolution Regulatory Hurdles.

Slides:



Advertisements
Similar presentations
SST Webinar SLDS Webinar1 The presentation will begin at approximately 3:00 p.m. ET Information on joining the teleconference can be found on the “Info”
Advertisements

1 Arkansas Grade Inflation Report Office of Public School Academic Accountability Arkansas Department of Education Dr. Charity Smith Assistant Commissioner.
September 24, 2012 Melody Parrish, Bryce Templeton, Terri Hanson, Tessie Bryant – Texas Education Agency 2.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
File Management Chapter 12. File Management A file is a named entity used to save results from a program or provide data to a program. Access control.
Effective Date of Free or Reduced Price Meal Eligibility Determinations SP
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7.1.
ETEC 100 Information Technology
Access A Relational Database Management System. Prof. Leighton2 Database ► A database is a collection of data that’s related to a particular topic ► A.
WELL-DESIGNED DATABASES Process faster Easy to develop and maintain Easy to read and write code.
Security expenditure should be determined by security risk. What is the financial risk to UNC of undetected modification of bioresearch data? theft and.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7.1.
ANRC AACD Arkansas Conservation Districts Training Program Power Point 12 Arkansas Natural Resources Commission.
Classroom Batch Testing Brigham Young University-Idaho Testing Center.
CENTER FOR NONPROFIT EXCELLENCE EVALUATION WORKSHOP SERIES Session IV: Analyzing and Reporting Your Data Presenters: Patty Emord.
FAMIS CONFERENCE Mari M. Presley, Assistant General Counsel Florida Department of Education June 14, 2011.
CHP - 9 File Structures. INTRODUCTION In some of the previous chapters, we have discussed representations of and operations on data structures. These.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
UML Unified Modeling Language. What is UML? Unified Modeling Language (UML) is a standardized, general-purpose modeling language in the field of software.
SSID and Banner Carl Ellsworth, Enterprise Data Operations.
Lucius McInnis Technical Account Manager Eastern Area New York User Forum Getting Data Ready for WebFOCUS August 10, 2011.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Initial Research Findings from Arkansas’ Statewide Longitudinal Data System: Using Standards-Based Research to Solve Real Education Problems Jake Walker,
Arizona’s Federal Accountability System 2011 David McNeil Director of Assessment, Accountability and Research.
POSTER TEMPLATE BY: Empowering School Leaders’ Data Driven Decision-Making Through Technology Dave VanLoo, Assessment Director,
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 7 Structuring System Requirements: Conceptual Data Modeling 7.1.
RELATIONSHIPS Generally there are two main database types: flat-file and relational.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Accessing and Reporting State Student Achievement Data for GPRA Purposes Amy A. Germuth, Ph.D. Compass Consulting Group, LLC.
Database Design. The process of developing database structures from user requirements for data a structured methodology Structured Methodology - a number.
Database A database is a collection of data organized to meet users’ needs. In this section: Database Structure Database Tools Industrial Databases Concepts.
Processes all living things carry out.
Brock Wilson HOPE Transcript Reporting There is hope for HOPE! K-12 Solutions Group © 2008 Infinite Campus. All Rights Reserved. SS1405.
ONLINEREGISTRATIONONLINEREGISTRATION. GWINNETT COUNTYPUBLIC SCHOOLSGWINNETT COUNTYPUBLIC SCHOOLS 2015 AVAILABLE APRIL 20 th After 6pm NEXTYEARNEXTYEAR.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall, modified by Dr. Lyn Mathis 5-1 David M. Kroenke’s, 10 th ed. Chapter.
CS 1308 Computer Literacy and the Internet
Visual C# 2012 How to Program © by Pearson Education, Inc. All Rights Reserved.
Essential 3a - SSID Enrollment Capabilities and Key Concepts v3.0, August 07, 2012 SSID ENROLLMENT Capabilities and Key Concepts Essential 3a.
Arkansas Research Center Neal Gibson, Ph.D. Greg Holland, Ph.D.
3 & 4 1 Chapters 3 and 4 Drawing ERDs October 16, 2006 Week 3.
Description and exemplification of entity-relationship modelling.
Database Design. The process of developing database structures from user requirements for data a structured methodology Structured Methodology - a number.
1 P-20W Identity Management November 16, :15 – 12:15 Bob Swiggum, GA Bill Hurwitch, ME Cathy Wagner, MN.
RBM at an Agency Level Cedric Saldanha Melbourne (613)
Information Access Mgt09/12/971 Entity-Relationship Design Information Level Design.
Information Retrieval Transfer Cycle Dania Bilal IS 530 Fall 2007.
JOHN DOE PERIOD 8. AT LEAST 80% OF HUMANITY LIVES ON LESS THAN $10 A DAY.
DATA POINTS For Boards to Measure Success!. Our Mission Statement The School District of Fort Atkinson is committed to delivering the quality opportunities.
Fraud Investigation FRAUD EXAMINATION ALBRECHT & ALBRECHT Theft and Concealment Investigation Methods CHAPTER 7.
State Higher Education Executive Officers Multi-State Longitudinal Data Exchange WICHE’s 4-State Pilot 2011 National Forum – PPI Committee.
Mean = = = 7 The mean is also known as the common average. To find the mean value of a set of data you.
Completing Connectivity Questions Complete this task BEFORE beginning a Form 471.
Query Optimization Cases. D. ChristozovINF 280 DB Systems Query Optimization: Cases 2 Executable Block 1 Algorithm using Indices (if available) Temporary.
1 Microsoft Access 2002 Tutorial 2 – Creating And Maintaining A Database.
SPECIAL PURPOSE DATABASES 13/09/ Temporal Database Concepts  Time is considered ordered sequence of points in some granularity Use the term choronon.
IT 5433 LM3 Relational Data Model. Learning Objectives: List the 5 properties of relations List the properties of a candidate key, primary key and foreign.
Connecting College to Career with State Government Data
Database Design.
 2012 Pearson Education, Inc. All rights reserved.
Multiplication table. x
SSID ENROLLMENT Capabilities and Key Concepts
Systems A system is an entity which maintains its existence through the mutual interaction of its parts.
Arkansas Research Center
Times.
For First Place Most Times Up at the Table
Conceptual Data Modeling
Presentation transcript:

The LongNow

Why FERPA?

The Sequel:

Key Problems Entity Resolution Regulatory Hurdles

Entity Resolution LEA: Jorge Castillo-Estrada 9/30/1997 M L LEA: George Castillo 9/30/1997 M L

Name Counts Student CountFirst NameLast Name 64JOSHUASMITH 56ASHLEYSMITH 52JESSICASMITH 48JUSTINSMITH 37ASHLEYJONES 31JUSTINWILLIAMS 30JESSICAJOHNSON 27JOSHUABROWN There are ~55,000 unique first names among students in Arkansas and ~40,000 last names. Approximately 20% of Arkansas students share both the same first and last name with another student.

More Data Issues There are 4,026 students in Arkansas that share an SSN with at least one other student in the state. Between August and January, 874 student transfers to other schools resulted in an SSN change. Between August and January, an additional 1,018 students changed their SSN—we have records for only 300 of these changes. Between August and January, 21,255 students moved to another district in the state—only 18,986 students were marked as “withdrawn.”

The Knowledge Base Approach “Indicative” information from multiple data sources is stored and merged into an “equivalence class” for each entity, using both fuzzy and logical associations. Knowledge base identifiers are used to manage the references. Bob Smith, Barton Elementary Robert Smith, Barton Elementary Bob Smith, Wilson Elementary Fuzzy Match Logical Match (Drop/Enroll) IdentifierRepresentation KB5765Bob Smith, Barton KB5765Robert Smith, Barton KB5765Bob Smith, Wilson Knowledge Base

Two Agencies, Two Regulations HIPPA FERPA

A trusted broker maintains a cross reference table, encoding the identifiers for various agencies and for various representations of the entities. Trusted Broker Bob SmithAC0236 Robert SmithED4297 ACHIADE Trusted Broker IdentifierRepresentation Identifier Encoded for ACHI Identifier Encoded for ADE KB5765Bob Smith, BartonAC0236ED4297 KB5765Robert Smith, BartonAC0236ED4297 KB5765Bob Smith, WilsonAC0236ED4297

Encoded Links The trusted broker can provide multiple agencies with encoded versions of the (hidden) knowledge base identifiers, protecting all future data requests. Bob SmithAC0236 Robert SmithAC0236 Bob SmithAC0236 Katherine JohnsAC0651 Kate SandersAC0651 Erica DavisAC1327 ED4297Bob Smith ED4297Robert Smith ED4297Bob Smith ED8516Katherine Johns ED8516Kate Sanders ED3508Erica Davis-Hill ACHIADE Trusted Broker

Brokered Result 1 AC0236 Score: 242 AC0651 Score: 417 AC1327 Score: 385 Data Requests The trusted broker translates encoded links between agencies for data requests and no personally identifying information needs to be exchanged. ACHI ADE What are the test scores for the following students? AC0236 AC0651 AC1327 ED3508 Score: 385 ED4297 Score: 242 ED8516 Score: 417 Trusted Broker AC0236 ↔ ED4297 AC0651 ↔ ED8516 AC1327 ↔ ED3508 Brokered Result 2 Score: 242 Score: 385 Score: 417 Brokered Result 3 Average Score: 348

Brokered Result 1 AC0236 Score: 242 AC0651 Score: 417 AC1327 Score: 385 Result Options The trusted broker may deliver results between agencies in a variety of ways, without exchanging personally identifying information. Trusted Broker Brokered Result 2 Score: 242 Score: 385 Score: 417 Brokered Result 3 Average Score: 348 Individual level results with encoded links (safe, encoded) Individual level results without links, random (safe, anonymous) Aggregated results (safe, anonymous)