Disclosure Risk from Factor Scores

Drechsler, Jörg; Ronning, Gerd; Bleninger, Philipp
March 2014
Journal of Official Statistics (JOS);Mar2014, Vol. 30 Issue 1, p107
Academic Journal
Remote access can be a powerful tool for providing data access for external researchers. Since the microdata never leave the secure environment of the data-providing agency, alterations of the microdata can be kept to a minimum. Nevertheless, remote access is not free from risk. Many statistical analyses that do not seem to provide disclosive information at first sight can be used by sophisticated intruders to reveal sensitive information. For this reason the list of allowed queries is usually restricted in a remote setting. However, it is not always easy to identify problematic queries. We therefore strongly support the argument that has been made by other authors: that all queries should be monitored carefully and that any microlevel information should always be withheld. As an illustrative example, we use factor score analysis, for which the output of interest - the factor loading of the variables - seems to be unproblematic. However, as we show in the article, the individual factor scores that are usually returned as part of the output can be used to reveal sensitive information. Our empirical evaluations based on a German establishment survey emphasize that this risk is far from a purely theoretical problem.


Related Articles

  • Snowden Leaked NSA 'Deal' with Israel.  // Israel Faxx;9/15/2014, Vol. 22 Issue 184W, p10 

    The article reports on the accusation of former U.S. intelligence analyst Edward Snowden that the National Security Agency passes private and unedited American-Israel communications.

  • Principles- Versus Rules-Based Output Statistical Disclosure Control In Remote Access Environments. Ritchie, Felix; Elliot, Mark // IASSIST Quarterly;2015, Vol. 39 Issue 2, p5 

    In recent years, the level of detail in confidential data made available to social scientists has increased dramatically. One particularly important growth area has been ensuring that research outputs do not present any residual disclosure risk. Traditionally this has been managed by specifying...

  • Limiting Disclosure of Sensitive Attribute Values: An Active Approach. Junping Sun // International MultiConference of Engineers & Computer Scientists;2009, p766 

    As computer and other technologies advance and various data and information are pervasively available, preservation of private information embedded in volume data are facing more and more challenges than ever before. Although there are available mechanisms in database management systems limiting...

  • PRIVACY AND CONFIDENTIALITY: THE IMPORTANCE OF CONTEXT. Francis, Leslie Pickering // Monist;Jan2008, Vol. 91 Issue 1, p52 

    The article focuses on the ethical justification of protecting privacy which support for the significance of confidentiality. It is inferred that privacy is thought of as protecting aspects of access to the person, protecting him or her from bodily touching, intimacy, or direct exposure view...

  • Confidentiality of Patient Communications.  // South Dakota Medicine;May2014, Vol. 67 Issue 5, p213 

    The article discusses the protection of confidentiality of patient's health related information to the third party and the role of South Dakota law and Health Insurance Portability and Accountability Act regarding protection of healthcare related information.

  • Perspectives pour la recherche sur les déterminants de I'offre d'information des entreprises. Michaïlesco, Céline // Comptabilité Contrôle Audit;Dec2000 Special Issue, p83 

    Current research about determinants of accounting information disclosed by companies suffers from various limits liked with quantitative tools suggested by positivist methodologies. Statistical validation of disclosure determinants hides the firm communication process and its dynamic. To...

  • Noetix Corporation.  // KM World;Mar2013, Vol. 22 Issue 3, p23 

    The article offers information related to the business intelligence (BI) solutions offered by Noetix Corp. providing rapid implementation, open architecture, and upgrade protection of data.

  • The Importance of Establishing Confidentiality and Trust. MEATH, MICHAEL // Business Journal (Central New York);10/18/2013, Vol. 27 Issue 42, p19 

    The article offers the author's insights on the significance of ensuring the confidentiality of business information in which it has a big impact on the level of trust and respect that gained from employees, clients, and elected officials.

  • Disclosure of Cancer Diagnosis: Pakistani Patients' Perspective. Jawaid, Masood; Qamar, Beenish; Masood, Zubia; Jawaid, Shaukat Ali // Middle East Journal of Cancer;2010, Vol. 1 Issue 2, p89 

    Objective: To ascertain cancer patients' views regarding disclosure of diagnosis in the Pakistani population, anxiety levels after disclosure of the diagnosis, interest in knowing all the treatment options and desire to inform their families. Patients and Methods: In this cross-sectional study,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics