SlideShare a Scribd company logo
1 of 24
Matching Uses and Protections
for Government Data Releases
Micah Altman
<micah_altman@alumni.brown.edu>
Center for Research in Equitable and Open Scholarship, MIT
Prepared for:
Data Privacy: From
Foundations to
Applications
Simons Institute
U.C. Berkeley
March 2019
Abstract
In this talk we describe work-in progress that aims to align emerging methods of data
protections with research uses. We use the American Community Survey as an exemplar
case for examining the range of ways that government data is used for research. We identify
the range of research uses by combining evidence of use from multiple sources including
research articles; national and local media coverage; social media; and research proposals.
We then employ human and computer-assisted coding methods to characterize the range of
data analysis methodologies that researchers employ. Then, building on previous work
cataloging that surveys and characterizes computational and technical controls for privacy,
we match these methods to available and emerging privacy and data security controls. Our
preliminary analysis suggests that tiered-access to government data will be necessary to
support current and new research in the social and health sciences.
Attribution Statement
Co-Conspirators:
● Cavan Capps, U.S. Census
● Zachary Lizee, U. Mass Boston
● Dylan Sam, Brown U.
Project Collaborators:
● Urs Gasser, David O’Brien, Ron Prevost, Salil Vadhan,
and the Harvard University Privacy Tools Project
Sponsors:
▶ Supported in part by the Sloan Foundation
Disclaimer
These opinions are my own, they are not the opinions of my employers,
collaborators, or project funders.
Secondary disclaimer:
“It’s tough to make predictions, especially about the future!”
- Attributed to Woody Allen, Yogi Berra, Niels Bohr, Vint Cerf, Winston Churchill, Confucius, Disreali [sic], Freeman Dyson, Cecil B.
Demille, Albert Einstein, Enrico Fermi, Edgar R. Fiedler, Bob Fourer, Sam Goldwyn, Allan Lamport, Groucho Marx, Dan Quayle, George
Bernard Shaw, Casey Stengel, Will Rogers, M. Taub, Mark Twain, Kerr L. White, etc.
Related Work
● Altman, M., Wood, A., O’Brien, D. R., Vadhan, S., & Gasser, U. (2015). Towards a
modern approach to privacy-aware government data releases. Berkeley
Technology Law Journal, 30(3), 1967-2072.
https://doi.org/10.15779/Z38FG17
● Altman, Micah and Capps, Cavan and Prevost, Ronald, Location Confidentiality and
Official Surveys (March 31, 2016). Available at SSRN:
https://ssrn.com/abstract=2757737 or http://dx.doi.org/10.2139/ssrn.2757737
● Altman, M., Wood, A., O’Brien, D. R.,, & Gasser, U., Practical approaches to big data
privacy over time,
International Data Privacy Law, Volume 8, Issue 1,, Pages 29–51,
https://doi.org/10.1093/idpl/ipx027
Broader Context
Of
Use and Risk
for Government Information
Functions of Government Information
● Official decision & communications
● Broader social benefit (research and business uses)
● Public transparency and accountability
Harm Depends on Privacy & Sensitivity
Illustrating how to choose
privacy controls that are
consistent with the uses,
threats, and vulnerabilities
at each lifecycle stage
Changes in Data Collection, Environment
Change Identifiability, Threats and Vulnerabilities
A shift from one-time to high-frequency data collection.
Identifiability
Threats
(sensitivity)
Vulnerabilities
(sensitivity)
Age Small decrease
Moderate
increase
Moderate decrease
Period Small increase
Moderate
increase
No substantial
evidence of effect
Frequency Large increase Small increase
No substantial
evidence of effect
Example temporal risk factors for big data
Approaches to Managing
Informational Harm
Informational controls
Procedural, technical, educational, economic, and legal means for
enhancing privacy can be applied at different stages
Procedural Economic Educational Legal Technical
Access/Release
Access controls;
Consent;
Expert panels; Individual
privacy settings;
Presumption of openness vs.
privacy;
Purpose specification;
Registration;
Restrictions on use by data
controller;
Risk assessments
Access/Use fees
(for data
controller or
subjects);
Property rights
assignment
Data asset registers;
Notice;
Transparency
Integrity and accuracy
requirements; Data use
agreements (contract
with data recipient)/
Terms of service
Authentication;
Computable policy;
Differential privacy;
Encryption (incl.
Functional;
Homomorphic);
Interactive query
systems;
Secure multiparty
computation
Sequencing controls
Review of uses, threats,
and vulnerabilities as
information is used
over time
Select appropriate
controls at each stage
What do technical controls control?
● Controls on computation --
limit the direct computations that can be meaningfully performed
○ Common: file-level encryption, interactive-analysis systems (model servers)
○ Emerging: functional encryption, homomorphic encryption, secure public ledgers, personal
data stores
● Controls on inference
limit how learning from computations about the observed units
○ Common: redaction, SDL
○ Emerging: differentially private mechanisms
● Controls on purpose
limit the domain of human activity to which inferences are applied.
○ Common: legal mechanisms
○ Emerging: executable policy languages; machine actionable taxonomies, personal data stores
Big Data Risk Drivers
Lower Risk ————————————————————————→ Higher Risk
Age, Period, Sample Size,
Population Diversity
High Dimensional High Frequency
High Dimensional
&
High Frequency
Intended
Mode of
Analysis
Population-
level
Statistical
Analysis Notice, Consent, Terms of
Service; Formal Oversight
Differential Privacy; Formal Oversight Secure Data
Enclave/Model
Server; Restricted
Access; Formal
OversightIndividual
Analytics
Personal Data Stores;
Blockchain Audit Logs; Secure
Multiparty Computation; Formal
Oversight
Examples of appropriate privacy and security controls based on the risk drivers
and intended mode of analysis identified a big data use case.
Characterizing Traces of Use
Media and Social
Media Mentions
Access Logs Published Analyses
Matching Uses and
Protections
(Exploratory, Preliminary)
Identifying Current Modes of Dissemination
• Official Indicators
• Pre-computed published tables
Published
Estimates
• Interactive queries to find a single number or table
• Based on pre-computed tablesQuick Lookups
• Public interactive servers
• Based on public use tabulations or micro-data
Dynamic Tables
& Maps
• Aggregated to pre-defined geographical or logical
units
• Processed statistical disclosure limitation methods
• Based on protected micro-data
Public Use
Tabulations
• Processed with SDL: deidentification, sampling,
synthetic data
• In rare cases, synthetic data used
• Based on protected micro-data
Public Use Micro-
data
• Possibly identified
• Available within Research Data Centers
Protected Micro-
data
What could this inform?
● Data prep
○ External data sources used
○ Cleaning - level
○ Linking - level
● Statistical computing approach
○ Sum queries/univariate method
○ Linear models/GLM
○ Likelihood
○ Bayesian estimates
● Diagnostics
○ Summary diagnostics
○ Sensitivity analysis
○ Individual outliers
● Desired purpose
○ Research
○ Policy
○ Commercial
○ Education
● Data Characteristics
○ What ACS measures used
○ ACS Unit of analysis
○ Study unity of analysis
○ Time dimensions
○ Other Structure
■ Network
■ Textual
■ Spatial
■ Video
● Presentation characteristics
○ Summary/regression
○ Individual cases/plots
● Replication
○ Results
○ Full
Conclusions
and/or
Provocations
Summary
● One size does not fit all
-- anticipate that tiered access will be necessary to address major uses
● Government data supports several objectives
-- government decision & communication; broader social benefit (research
and economy); transparency and accountability
● Informational controls vary in compatibility --
controls should be matched to objectives and modes of analysis
Provocations & Vigorous Hand Waving
● Discovery research (currently) requires access beyond limits of formal protections
-- empirically guided exploratory research, theory generation, process tracing, novel
syntheses (etc.) are incompletely understood and formalized
● A representative use isn’t
-- need to consider multiple uses and tensions between these to get substantial social
benefit avoid substantial harms
● Worst-case analyses aren’t
-- some formal (DP) and legal analysis (Title 13) take worst case approach to
inferential risk, but…
-- apply average-case analysis to use/utility reduction
-- are optimistic about operational/implementation risks
Non-temporal risk factors of big data also affect
privacy risk components in different ways.
High-dimensional data pose challenges for traditional privacy approaches such as
de-identification, and can support new uses of data that were unforeseen at the
time of collection.
Broader analytic uses, such as the use of data for personalized classification, and
both traditional and modern approaches to de-identification fail to protect against
learning facts about populations that could be used to discriminate.
Increases in sample size and diversity lead to heightened risks
that a target individual is included, vulnerable populations
are included, and a wide range of threats are plausible.
Now
(10 minutes)
or
Later
micah_altman@alumni.brown.edu
micahaltman.com
*£1 for a five minute argument, but only £8 for a course of ten.
Questions? Observations? Arguments?*

More Related Content

What's hot

Managing confidential data
Managing confidential dataManaging confidential data
Managing confidential dataMicah Altman
 
"Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective""Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective"Micah Altman
 
Linking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesLinking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesMicah Altman
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha commentsMicah Altman
 
Learning from Conversation with the Governor: Big Data Challenges for Bank of...
Learning from Conversation with the Governor: Big Data Challenges for Bank of...Learning from Conversation with the Governor: Big Data Challenges for Bank of...
Learning from Conversation with the Governor: Big Data Challenges for Bank of...Korkrid Akepanidtaworn
 
Open Data, Open Opportunity, Open to Progress
Open Data, Open Opportunity, Open to ProgressOpen Data, Open Opportunity, Open to Progress
Open Data, Open Opportunity, Open to ProgressKorkrid Akepanidtaworn
 
Ralph schroeder and eric meyer
Ralph schroeder and eric meyerRalph schroeder and eric meyer
Ralph schroeder and eric meyeroiisdp
 
Understanding the Big Data Enterprise
Understanding the Big Data EnterpriseUnderstanding the Big Data Enterprise
Understanding the Big Data EnterprisePhilip Bourne
 
From Where Have We Come & Where Are We Going
From Where Have We Come & Where Are We GoingFrom Where Have We Come & Where Are We Going
From Where Have We Come & Where Are We GoingPhilip Bourne
 
The Vision for Data @ the NIH
The Vision for Data @ the NIHThe Vision for Data @ the NIH
The Vision for Data @ the NIHPhilip Bourne
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_conceptsMicah Altman
 
A SWOT Analysis of Data Science @ NIH
A SWOT Analysis of Data Science @ NIHA SWOT Analysis of Data Science @ NIH
A SWOT Analysis of Data Science @ NIHPhilip Bourne
 
Data Science in Biomedicine - Where Are We Headed?
Data Science in Biomedicine - Where Are We Headed?Data Science in Biomedicine - Where Are We Headed?
Data Science in Biomedicine - Where Are We Headed?Philip Bourne
 
From Big Data to the Big Picture
From Big Data to the Big PictureFrom Big Data to the Big Picture
From Big Data to the Big PictureSAGE Publishing
 
Research Data Census
Research Data CensusResearch Data Census
Research Data CensusJerry Sheehan
 

What's hot (20)

Managing confidential data
Managing confidential dataManaging confidential data
Managing confidential data
 
Niso library law
Niso library lawNiso library law
Niso library law
 
"Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective""Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective"
 
Linking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesLinking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual Archives
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha comments
 
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
Barbara Evans, "Big Data and the Meaning of Individual Autonomy in a Crowd"
 
Learning from Conversation with the Governor: Big Data Challenges for Bank of...
Learning from Conversation with the Governor: Big Data Challenges for Bank of...Learning from Conversation with the Governor: Big Data Challenges for Bank of...
Learning from Conversation with the Governor: Big Data Challenges for Bank of...
 
Open Data, Open Opportunity, Open to Progress
Open Data, Open Opportunity, Open to ProgressOpen Data, Open Opportunity, Open to Progress
Open Data, Open Opportunity, Open to Progress
 
Ralph schroeder and eric meyer
Ralph schroeder and eric meyerRalph schroeder and eric meyer
Ralph schroeder and eric meyer
 
ICICCE0280
ICICCE0280ICICCE0280
ICICCE0280
 
Understanding the Big Data Enterprise
Understanding the Big Data EnterpriseUnderstanding the Big Data Enterprise
Understanding the Big Data Enterprise
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
From Where Have We Come & Where Are We Going
From Where Have We Come & Where Are We GoingFrom Where Have We Come & Where Are We Going
From Where Have We Come & Where Are We Going
 
The Vision for Data @ the NIH
The Vision for Data @ the NIHThe Vision for Data @ the NIH
The Vision for Data @ the NIH
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_concepts
 
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
 
A SWOT Analysis of Data Science @ NIH
A SWOT Analysis of Data Science @ NIHA SWOT Analysis of Data Science @ NIH
A SWOT Analysis of Data Science @ NIH
 
Data Science in Biomedicine - Where Are We Headed?
Data Science in Biomedicine - Where Are We Headed?Data Science in Biomedicine - Where Are We Headed?
Data Science in Biomedicine - Where Are We Headed?
 
From Big Data to the Big Picture
From Big Data to the Big PictureFrom Big Data to the Big Picture
From Big Data to the Big Picture
 
Research Data Census
Research Data CensusResearch Data Census
Research Data Census
 

Similar to Matching Uses and Protections for Government Data Releases: Presentation at the Simons Institute

IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and PrivacyData Science at Intersection of Security and Privacy
Data Science at Intersection of Security and PrivacyTarun Chopra
 
Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data CitationMicah Altman
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
A Survey on Big Data Analytics: Challenges
A Survey on Big Data Analytics: ChallengesA Survey on Big Data Analytics: Challenges
A Survey on Big Data Analytics: ChallengesDr. Amarjeet Singh
 
DSS_Understanding_the_paradigm_shift.pdf
DSS_Understanding_the_paradigm_shift.pdfDSS_Understanding_the_paradigm_shift.pdf
DSS_Understanding_the_paradigm_shift.pdfBizuayehuDesalegn
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 
Privacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesPrivacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesMicah Altman
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsunyil96
 
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...Anastasija Nikiforova
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docxcroysierkathey
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfAsefaAdimasu2
 
Singapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxSingapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxjennifer822
 
Singapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxSingapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxedgar6wallace88877
 

Similar to Matching Uses and Protections for Government Data Releases: Presentation at the Simons Institute (20)

IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and PrivacyData Science at Intersection of Security and Privacy
Data Science at Intersection of Security and Privacy
 
Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data Citation
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
A Survey on Big Data Analytics: Challenges
A Survey on Big Data Analytics: ChallengesA Survey on Big Data Analytics: Challenges
A Survey on Big Data Analytics: Challenges
 
DSS_Understanding_the_paradigm_shift.pdf
DSS_Understanding_the_paradigm_shift.pdfDSS_Understanding_the_paradigm_shift.pdf
DSS_Understanding_the_paradigm_shift.pdf
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Privacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use CasesPrivacy in Research Data Managemnt - Use Cases
Privacy in Research Data Managemnt - Use Cases
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methods
 
Data collection, Data Integration, Data Understanding e Data Cleaning & Prepa...
Data collection, Data Integration, Data Understanding e Data Cleaning & Prepa...Data collection, Data Integration, Data Understanding e Data Cleaning & Prepa...
Data collection, Data Integration, Data Understanding e Data Cleaning & Prepa...
 
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Singapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxSingapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docx
 
Singapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docxSingapore Management UniversityInstitutional Knowledge at Si.docx
Singapore Management UniversityInstitutional Knowledge at Si.docx
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 

More from Micah Altman

Selecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesSelecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesMicah Altman
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset ConversationMicah Altman
 
Can We Fix Peer Review
Can We Fix Peer ReviewCan We Fix Peer Review
Can We Fix Peer ReviewMicah Altman
 
Academy Owned Peer Review
Academy Owned Peer ReviewAcademy Owned Peer Review
Academy Owned Peer ReviewMicah Altman
 
Redistricting in the US -- An Overview
Redistricting in the US -- An OverviewRedistricting in the US -- An Overview
Redistricting in the US -- An OverviewMicah Altman
 
A Future for Electoral Districting
A Future for Electoral DistrictingA Future for Electoral Districting
A Future for Electoral DistrictingMicah Altman
 
A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk  A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk Micah Altman
 
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...Micah Altman
 
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Micah Altman
 
Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Micah Altman
 
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsCreative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsMicah Altman
 
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...Micah Altman
 
Ndsa 2016 opening plenary
Ndsa 2016 opening plenaryNdsa 2016 opening plenary
Ndsa 2016 opening plenaryMicah Altman
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
 
Software Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanSoftware Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanMicah Altman
 
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...Micah Altman
 
Gary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceGary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceMicah Altman
 
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Micah Altman
 
Agenda's for Preservation Research
Agenda's for Preservation ResearchAgenda's for Preservation Research
Agenda's for Preservation ResearchMicah Altman
 
Software Repositories for Research -- An Environmental Scan
Software Repositories for Research -- An Environmental ScanSoftware Repositories for Research -- An Environmental Scan
Software Repositories for Research -- An Environmental ScanMicah Altman
 

More from Micah Altman (20)

Selecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesSelecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategies
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset Conversation
 
Can We Fix Peer Review
Can We Fix Peer ReviewCan We Fix Peer Review
Can We Fix Peer Review
 
Academy Owned Peer Review
Academy Owned Peer ReviewAcademy Owned Peer Review
Academy Owned Peer Review
 
Redistricting in the US -- An Overview
Redistricting in the US -- An OverviewRedistricting in the US -- An Overview
Redistricting in the US -- An Overview
 
A Future for Electoral Districting
A Future for Electoral DistrictingA Future for Electoral Districting
A Future for Electoral Districting
 
A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk  A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk
 
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
 
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
 
Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:
 
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsCreative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
 
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
 
Ndsa 2016 opening plenary
Ndsa 2016 opening plenaryNdsa 2016 opening plenary
Ndsa 2016 opening plenary
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...
 
Software Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanSoftware Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental Scan
 
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
 
Gary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceGary Price, MIT Program on Information Science
Gary Price, MIT Program on Information Science
 
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
 
Agenda's for Preservation Research
Agenda's for Preservation ResearchAgenda's for Preservation Research
Agenda's for Preservation Research
 
Software Repositories for Research -- An Environmental Scan
Software Repositories for Research -- An Environmental ScanSoftware Repositories for Research -- An Environmental Scan
Software Repositories for Research -- An Environmental Scan
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Matching Uses and Protections for Government Data Releases: Presentation at the Simons Institute

  • 1. Matching Uses and Protections for Government Data Releases Micah Altman <micah_altman@alumni.brown.edu> Center for Research in Equitable and Open Scholarship, MIT Prepared for: Data Privacy: From Foundations to Applications Simons Institute U.C. Berkeley March 2019
  • 2. Abstract In this talk we describe work-in progress that aims to align emerging methods of data protections with research uses. We use the American Community Survey as an exemplar case for examining the range of ways that government data is used for research. We identify the range of research uses by combining evidence of use from multiple sources including research articles; national and local media coverage; social media; and research proposals. We then employ human and computer-assisted coding methods to characterize the range of data analysis methodologies that researchers employ. Then, building on previous work cataloging that surveys and characterizes computational and technical controls for privacy, we match these methods to available and emerging privacy and data security controls. Our preliminary analysis suggests that tiered-access to government data will be necessary to support current and new research in the social and health sciences.
  • 3. Attribution Statement Co-Conspirators: ● Cavan Capps, U.S. Census ● Zachary Lizee, U. Mass Boston ● Dylan Sam, Brown U. Project Collaborators: ● Urs Gasser, David O’Brien, Ron Prevost, Salil Vadhan, and the Harvard University Privacy Tools Project Sponsors: ▶ Supported in part by the Sloan Foundation
  • 4. Disclaimer These opinions are my own, they are not the opinions of my employers, collaborators, or project funders. Secondary disclaimer: “It’s tough to make predictions, especially about the future!” - Attributed to Woody Allen, Yogi Berra, Niels Bohr, Vint Cerf, Winston Churchill, Confucius, Disreali [sic], Freeman Dyson, Cecil B. Demille, Albert Einstein, Enrico Fermi, Edgar R. Fiedler, Bob Fourer, Sam Goldwyn, Allan Lamport, Groucho Marx, Dan Quayle, George Bernard Shaw, Casey Stengel, Will Rogers, M. Taub, Mark Twain, Kerr L. White, etc.
  • 5. Related Work ● Altman, M., Wood, A., O’Brien, D. R., Vadhan, S., & Gasser, U. (2015). Towards a modern approach to privacy-aware government data releases. Berkeley Technology Law Journal, 30(3), 1967-2072. https://doi.org/10.15779/Z38FG17 ● Altman, Micah and Capps, Cavan and Prevost, Ronald, Location Confidentiality and Official Surveys (March 31, 2016). Available at SSRN: https://ssrn.com/abstract=2757737 or http://dx.doi.org/10.2139/ssrn.2757737 ● Altman, M., Wood, A., O’Brien, D. R.,, & Gasser, U., Practical approaches to big data privacy over time, International Data Privacy Law, Volume 8, Issue 1,, Pages 29–51, https://doi.org/10.1093/idpl/ipx027
  • 6. Broader Context Of Use and Risk for Government Information
  • 7. Functions of Government Information ● Official decision & communications ● Broader social benefit (research and business uses) ● Public transparency and accountability
  • 8. Harm Depends on Privacy & Sensitivity Illustrating how to choose privacy controls that are consistent with the uses, threats, and vulnerabilities at each lifecycle stage
  • 9. Changes in Data Collection, Environment Change Identifiability, Threats and Vulnerabilities A shift from one-time to high-frequency data collection.
  • 10. Identifiability Threats (sensitivity) Vulnerabilities (sensitivity) Age Small decrease Moderate increase Moderate decrease Period Small increase Moderate increase No substantial evidence of effect Frequency Large increase Small increase No substantial evidence of effect Example temporal risk factors for big data
  • 12. Informational controls Procedural, technical, educational, economic, and legal means for enhancing privacy can be applied at different stages Procedural Economic Educational Legal Technical Access/Release Access controls; Consent; Expert panels; Individual privacy settings; Presumption of openness vs. privacy; Purpose specification; Registration; Restrictions on use by data controller; Risk assessments Access/Use fees (for data controller or subjects); Property rights assignment Data asset registers; Notice; Transparency Integrity and accuracy requirements; Data use agreements (contract with data recipient)/ Terms of service Authentication; Computable policy; Differential privacy; Encryption (incl. Functional; Homomorphic); Interactive query systems; Secure multiparty computation
  • 13. Sequencing controls Review of uses, threats, and vulnerabilities as information is used over time Select appropriate controls at each stage
  • 14. What do technical controls control? ● Controls on computation -- limit the direct computations that can be meaningfully performed ○ Common: file-level encryption, interactive-analysis systems (model servers) ○ Emerging: functional encryption, homomorphic encryption, secure public ledgers, personal data stores ● Controls on inference limit how learning from computations about the observed units ○ Common: redaction, SDL ○ Emerging: differentially private mechanisms ● Controls on purpose limit the domain of human activity to which inferences are applied. ○ Common: legal mechanisms ○ Emerging: executable policy languages; machine actionable taxonomies, personal data stores
  • 15. Big Data Risk Drivers Lower Risk ————————————————————————→ Higher Risk Age, Period, Sample Size, Population Diversity High Dimensional High Frequency High Dimensional & High Frequency Intended Mode of Analysis Population- level Statistical Analysis Notice, Consent, Terms of Service; Formal Oversight Differential Privacy; Formal Oversight Secure Data Enclave/Model Server; Restricted Access; Formal OversightIndividual Analytics Personal Data Stores; Blockchain Audit Logs; Secure Multiparty Computation; Formal Oversight Examples of appropriate privacy and security controls based on the risk drivers and intended mode of analysis identified a big data use case.
  • 16. Characterizing Traces of Use Media and Social Media Mentions Access Logs Published Analyses
  • 18. Identifying Current Modes of Dissemination • Official Indicators • Pre-computed published tables Published Estimates • Interactive queries to find a single number or table • Based on pre-computed tablesQuick Lookups • Public interactive servers • Based on public use tabulations or micro-data Dynamic Tables & Maps • Aggregated to pre-defined geographical or logical units • Processed statistical disclosure limitation methods • Based on protected micro-data Public Use Tabulations • Processed with SDL: deidentification, sampling, synthetic data • In rare cases, synthetic data used • Based on protected micro-data Public Use Micro- data • Possibly identified • Available within Research Data Centers Protected Micro- data
  • 19. What could this inform? ● Data prep ○ External data sources used ○ Cleaning - level ○ Linking - level ● Statistical computing approach ○ Sum queries/univariate method ○ Linear models/GLM ○ Likelihood ○ Bayesian estimates ● Diagnostics ○ Summary diagnostics ○ Sensitivity analysis ○ Individual outliers ● Desired purpose ○ Research ○ Policy ○ Commercial ○ Education ● Data Characteristics ○ What ACS measures used ○ ACS Unit of analysis ○ Study unity of analysis ○ Time dimensions ○ Other Structure ■ Network ■ Textual ■ Spatial ■ Video ● Presentation characteristics ○ Summary/regression ○ Individual cases/plots ● Replication ○ Results ○ Full
  • 21. Summary ● One size does not fit all -- anticipate that tiered access will be necessary to address major uses ● Government data supports several objectives -- government decision & communication; broader social benefit (research and economy); transparency and accountability ● Informational controls vary in compatibility -- controls should be matched to objectives and modes of analysis
  • 22. Provocations & Vigorous Hand Waving ● Discovery research (currently) requires access beyond limits of formal protections -- empirically guided exploratory research, theory generation, process tracing, novel syntheses (etc.) are incompletely understood and formalized ● A representative use isn’t -- need to consider multiple uses and tensions between these to get substantial social benefit avoid substantial harms ● Worst-case analyses aren’t -- some formal (DP) and legal analysis (Title 13) take worst case approach to inferential risk, but… -- apply average-case analysis to use/utility reduction -- are optimistic about operational/implementation risks
  • 23. Non-temporal risk factors of big data also affect privacy risk components in different ways. High-dimensional data pose challenges for traditional privacy approaches such as de-identification, and can support new uses of data that were unforeseen at the time of collection. Broader analytic uses, such as the use of data for personalized classification, and both traditional and modern approaches to de-identification fail to protect against learning facts about populations that could be used to discriminate. Increases in sample size and diversity lead to heightened risks that a target individual is included, vulnerable populations are included, and a wide range of threats are plausible.
  • 24. Now (10 minutes) or Later micah_altman@alumni.brown.edu micahaltman.com *£1 for a five minute argument, but only £8 for a course of ten. Questions? Observations? Arguments?*