Disclosure-Protected Inference with Linked Microdata Using a Remote Analysis Server

Chipperfield, James O.
March 2014
Journal of Official Statistics (JOS);Mar2014, Vol. 30 Issue 1, p123
Academic Journal
Large amounts of microdata are collected by data custodians in the form of censuses and administrative records. Often, data custodians will collect different information on the same individual. Many important questions can be answered by linking microdata collected by different data custodians. For this reason, there is very strong demand from analysts, within government, business, and universities, for linked microdata. However, many data custodians are legally obliged to ensure the risk of disclosing information about a person or organisation is acceptably low. Different authors have considered the problem of how to facilitate reliable statistical inference from analysis of linked microdata while ensuring that the risk of disclosure is acceptably low. This article considers the problem from the perspective of an Integrating Authority that, by definition, is trusted to link the microdata and to facilitate analysts' access to the linked microdata via a remote server, which allows analysts to fit models and view the statistical output without being able to observe the underlying linked microdata. One disclosure risk that must be managed by an Integrating Authority is that one data custodian may use the microdata it supplied to the Integrating Authority and statistical output released from the remote server to disclose information about a person or organisation that was supplied by the other data custodian. This article considers analysis of only binary variables. The utility and disclosure risk of the proposed method are investigated both in a simulation and using a real example. This article shows that some popular protections against disclosure (dropping records, rounding regression coefficients or imposing restrictions on model selection) can be ineffective in the above setting.


Related Articles

  • Whose Business Is It? McWilliams, Denise // Human Rights;Spring2010, Vol. 37 Issue 2, p22 

    The article discusses the issues related to privacy and private information. It is stated that in exchange for a promised benefit, most people are willing to disclose private information. It is mentioned that privacy is viewed as a fundamental human right by European nations and significant...

  • The Paradox of Public Disclosure: Hogan v Australian Crime Commission. Bannister, Judith // Sydney Law Review;Mar2010, Vol. 32 Issue 1, p159 

    The article focuses on the paradox of the public disclosure of a private individual's personal financial and taxation information in the Australia. It cites the case of actor Paul Hogan who complained to the High Court against the Australian Crime Commission for seizing his documents to support...

  • Protect and survive. Arnstein, Vicki // Employers Law;Mar2009, p19 

    The article discusses how businesses can protect themselves from ex-employees who take confidential information from them. It states that courts in Great Britain are now willing to enforce restrictive covenants in departing employees' contracts and recent cases. It mentions that employers should...

  • Questions dog Cisco routers. Messmer, Ellen; Hochmuth, Phil // Network World;8/8/2005, Vol. 22 Issue 31, p1 

    This article focuses on the plan of Cisco Systems Inc. to continue testing its IPv6 packet in the U.S. Experts have claimed that responsible disclosure notion might potentially lead to manipulation of Cisco router tables, denial-of-service attacks and access to confidential data. The company has...

  • Analysis of the Univariate Microaggregation Disclosure Risk. Nin, Jordi; Torra, Vicenç // New Generation Computing;2009, Vol. 27 Issue 3, p197 

    Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces the original data with the centroid of such cluster. As clusters contain at...

  • HOW TO RUN YOUR BUSINESS IN A FISHBOWL. Feuer, Michael // Smart Business Cleveland;Nov2012, Vol. 24 Issue 4, p90 

    The article offers tips on how to protect some important assets of the company such as the company's information. It considers the present time as an era of heightened visibility where sensitive company information can be obtained by anyone and everyone. It asserts the importance of enforcing a...

  • Git can facilitate greater reproducibility and increased transparency in science. Ram, Karthik // Source Code for Biology & Medicine;2013, Vol. 8 Issue 1, Special section p1 

    Background: Reproducibility is the hallmark of good science. Maintaining a high degree of transparency in scientific reporting is essential not just for gaining trust and credibility within the scientific community but also for facilitating the development of new ideas. Sharing data and computer...

  • When to disclose information -- and when you should say no. Jones, Emyr Wyn // Pulse;6/23/2010, Vol. 70 Issue 22, p15 

    The article offers advice on when and when not to disclose clinical information. It presents case studies which concern information requests that are appropriate and inappropriate for response. The principles of information security are said to require that reasonable care is vital in securing...

  • FDA and the Importance of Confidentiality. Rosen, David L. // BioPharm International;Oct2012, Vol. 25 Issue 10, p74 

    The article offers information regarding the issues related to the release of confidential data of a company's product by the U.S. Food and Drug Administration (FDA). It informs that the scientists in FDA have been suspected of leaking confidential, commercial, and trade secret information to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics