SlideShare a Scribd company logo
Risk management and the release
of microdata:
Sonia Whiteley & Eric Skuja
The Social Research Centre
IAOS Conference on Official Statistics,
Da Nang Viet Nam, 8-10 October 2014
balancing disclosure risks and data utility
About the Social Research Centre (1)
 We are a private, for profit company owned by ANU
Enterprise, a subsidiary of the Australian National
University and co-founder of the Australian Centre for
Applied Social Research Methods (AusCen).
 Our resources include 60 professional staff, 125 station
call centre, a panel of 250 interviewing staff and qualitative
interviewing facilities.
 Typical services provided include survey design and
execution (including sampling, questionnaire design,
survey administration and interviewer training), qualitative
research, survey data management, statistical consulting
and analytical and interpretative reporting.
About the Social Research Centre (2)
We conduct a number of large scale surveys that contribute
to the annual Report on Government Services (ROGS) which
provides information on the equity, effectiveness and
efficiency of government services in Australia including the:
 National Survey of Community Satisfaction with Policing
(NSCSP)
 Student Outcomes Survey (SOS)
 Australian Early Development Census (AEDC).
About the AEDC (1)
 The Australian Early Development Census (AEDC) is
conducted every three years for every Australian child
currently enrolled in their first year of full-time school.
 Approximately 100 checklist questions cover the five
theoretical domains of early childhood development
including:
− Physical health and well being
− Social competence
− Emotional maturity
− Language and cognitive skills (school-based), and
− Communication skills and general knowledge.
About the AEDC (2)
 The AEDC was conducted for the first time in 2009 with a
second collection in 2012. Preparations are already
underway for the 2015 AEDC collection.
 Approximately 290,000 checklists were completed for
each AEDC which equates to more than 96 per cent of in-
scope children.
 There are three school systems in Australia, Government,
Catholic and Independent and all actively participate in the
AEDC.
Our role in the AEDC
Our involvement in the AEDC is ongoing and includes:
 Collecting checklist data from teachers via a secure, online
system
 Developing and maintaining a government website
containing
− AEDC resources http://www.aedc.gov.au/ and
− AEDC macrodata and maps http://www.aedc.gov.au/data
 Managing and disseminating the AEDC data collections.
Traditional risk management of microdata
 A ‘worst case’ scenario approach requires the data
custodians to be responsible for identifying and mitigating
all potential risks
 This model assumes that data users are
 Unprofessional
 Cannot be trusted
 Do not have the required skills or training, and
 (In extreme cases) Intend to maliciously misuse the data
 Data must be protected from the users and the utility of the
unit record data for research is a lower priority
 The product of this approach is typically a confidentailised
unit record file and the confidentialisation is regarded as
the primary safeguard
Initial approach to AEDC data management
 The AEDC Data Protocol and the AEDC Linkage Policy
provide the research community with guidance regarding
the appropriate uses of the data.
 Two confidentialised unit record files (CURFs) were
produced:
1. The Research CURF and
2. The Geography CURF
 The files were split due to the
− large number of demographic variables
− fine level of geographic information that was available, and
− concerns about the re identification and disclosure of
children, classes and schools
Perturbation issues
 Both files were perturbed by an external agency based on
a ‘worst case scenario’ view of risk
 The perturbation rules were undisclosed to prevent
reverse engineering
 Key variables of relevance to early childhood education
researchers were changed significantly
− In particular, gender of the child was altered substantially in
some geographic areas
 Government agencies started to use the CURFs because
they were smaller and more accessible files which led to
discrepancies between the official results and the agency
results
Alternative approaches to risk management
 The responsibility for appropriately using and reporting
microdata is shared between the data custodian and the
research community
 It is assumed that researchers will observe their
professional codes of conduct and do not intend to misuse
the data
 The main risk focus is on ensuring that researchers
appropriately handle, store and publish the data. This
includes:
Confirming a genuine research aim
Restriction of data access to authorised users
Ensuring the microdata is anonymised, and
Undertaking a risk assessment of files prior to release
Formal risk assessments
 Government departments are still extremely risk averse,
especially when it comes to information about very young
children. Two simple risk assessments accompany each
microdata file. Both act as topics for negotiation and
support rather than obstruction:
1. The proportion of unique records in the dataset is assessed
mainly to discourage unauthorised data linkage projects
being undertaken by other government agencies.
2. The proportion of cells in two-way tables with three or fewer
children is calculated to foreshadow potential problems
when researchers publish the data.
High risk data
Built Environment measures
 Child Friendly Neighbourhoods: A composite index based on the
following built environment measures requires the children’s X-Y
coordinates:
− Child health resources Proximity of childcare facilities.
− Parks and greenness Proximity of neighbourhood parks.
− Residential density Number of residential dwellings.
− Home environment Type of residence. Size of backyard.
− Traffic exposure Road network classifications
− Crime Crime and child related offenses
− Land use mix Evenness of different land uses
− Public transport Accessibility of bus and rail stops
− Street connectivity Number of 3-way or more intersections
Managing high risk data
Points dispersed within a mesh block
Implications of using anonymised microdata
 Improves data utility but does not necessarily present higher
levels of disclosure risk than a CURF.
 Ensures that there is ‘one version of the truth’ and that outputs
produced by researchers will be consistent all data users.
 Ensures that access requests for any unit record file follow the
same formal, detailed assessment, management and close-out
procedures.
 Concerns about unintentional misuse of microdata need to be
clearly communicated to the research community.
 Provides an avenue for offering training and support are a
condition of data release where a potential data user may not
have the skills or experience
 Creates a platform where all genuine data access requests can
be accommodated through a combination of engaged
negotiation regarding the required data elements and by offering
supported (and supportive) access modalities.

More Related Content

What's hot

Critique1 presentation
Critique1 presentationCritique1 presentation
Critique1 presentation
IMButler7
 
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
TimDraws
 

What's hot (6)

Epidemic Intelligence-MedISys
Epidemic Intelligence-MedISysEpidemic Intelligence-MedISys
Epidemic Intelligence-MedISys
 
AI-LAB
AI-LABAI-LAB
AI-LAB
 
Critique1 presentation
Critique1 presentationCritique1 presentation
Critique1 presentation
 
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
This Is Not What We Ordered: Exploring Why Biased Search Result Rankings Affe...
 
mLearning Tibotec project presented at eLearning Africa in Dakar Senegal
mLearning Tibotec project presented at eLearning Africa in Dakar SenegalmLearning Tibotec project presented at eLearning Africa in Dakar Senegal
mLearning Tibotec project presented at eLearning Africa in Dakar Senegal
 
Quality and safety of health information on the Internet: Who decides and ho...
Quality and safety of health information on the Internet: Who decides and ho...Quality and safety of health information on the Internet: Who decides and ho...
Quality and safety of health information on the Internet: Who decides and ho...
 

Similar to Risk management and the release of microdata:

Predictive Risk
Predictive RiskPredictive Risk
Predictive Risk
lnbj50
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
EADTU
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
Michael Woods, MD, MMM
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 
INTEGRATING CSI INTO OVC PROGRAM M&E SYSTEM
INTEGRATING CSI INTO OVC PROGRAM  M&E SYSTEMINTEGRATING CSI INTO OVC PROGRAM  M&E SYSTEM
INTEGRATING CSI INTO OVC PROGRAM M&E SYSTEM
MEASURE Evaluation
 

Similar to Risk management and the release of microdata: (20)

Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data Science
 
Surfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global HealthSurfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global Health
 
Data collaboratives: an assessment of new ways to use data for civic impact -...
Data collaboratives: an assessment of new ways to use data for civic impact -...Data collaboratives: an assessment of new ways to use data for civic impact -...
Data collaboratives: an assessment of new ways to use data for civic impact -...
 
The UVA School of Data Science
The UVA School of Data ScienceThe UVA School of Data Science
The UVA School of Data Science
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Pilot 2.1 Tri-Borders
Pilot 2.1 Tri-BordersPilot 2.1 Tri-Borders
Pilot 2.1 Tri-Borders
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among Parents
 
Predictive Risk
Predictive RiskPredictive Risk
Predictive Risk
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilities
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
USING EQUIST FOR BOTTLENECK ANALYSIS
USING EQUIST FOR BOTTLENECK ANALYSIS�USING EQUIST FOR BOTTLENECK ANALYSIS�
USING EQUIST FOR BOTTLENECK ANALYSIS
 
SEEN 11.1
SEEN 11.1SEEN 11.1
SEEN 11.1
 
INTEGRATING CSI INTO OVC PROGRAM M&E SYSTEM
INTEGRATING CSI INTO OVC PROGRAM  M&E SYSTEMINTEGRATING CSI INTO OVC PROGRAM  M&E SYSTEM
INTEGRATING CSI INTO OVC PROGRAM M&E SYSTEM
 
Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
New ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care TransportNew ALERT - Latent Safety Threats in Critical Care Transport
New ALERT - Latent Safety Threats in Critical Care Transport
 

More from Sonia Whiteley

Total Survey Error across a program of three national surveys: using a risk m...
Total Survey Error across a program of three national surveys: using a risk m...Total Survey Error across a program of three national surveys: using a risk m...
Total Survey Error across a program of three national surveys: using a risk m...
Sonia Whiteley
 
Mitigating errors of representation: a practical case study of the University...
Mitigating errors of representation: a practical case study of the University...Mitigating errors of representation: a practical case study of the University...
Mitigating errors of representation: a practical case study of the University...
Sonia Whiteley
 

More from Sonia Whiteley (8)

Thinking about leaving? Departure intentions of commencing university students
Thinking about leaving? Departure intentions of commencing university studentsThinking about leaving? Departure intentions of commencing university students
Thinking about leaving? Departure intentions of commencing university students
 
Creating a coherent performance indicator framework for the higher education ...
Creating a coherent performance indicator framework for the higher education ...Creating a coherent performance indicator framework for the higher education ...
Creating a coherent performance indicator framework for the higher education ...
 
Total Survey Error across a program of three national surveys: using a risk m...
Total Survey Error across a program of three national surveys: using a risk m...Total Survey Error across a program of three national surveys: using a risk m...
Total Survey Error across a program of three national surveys: using a risk m...
 
How to get more value out of your AEDC data
How to get more value out of your AEDC dataHow to get more value out of your AEDC data
How to get more value out of your AEDC data
 
Total Survey Error & Institutional Research: A case study of the University E...
Total Survey Error & Institutional Research: A case study of the University E...Total Survey Error & Institutional Research: A case study of the University E...
Total Survey Error & Institutional Research: A case study of the University E...
 
Mitigating errors of representation: a practical case study of the University...
Mitigating errors of representation: a practical case study of the University...Mitigating errors of representation: a practical case study of the University...
Mitigating errors of representation: a practical case study of the University...
 
How to access the AEDC data collections
How to access the AEDC data collectionsHow to access the AEDC data collections
How to access the AEDC data collections
 
Collecting feedback on quality indicators of the higher education student exp...
Collecting feedback on quality indicators of the higher education student exp...Collecting feedback on quality indicators of the higher education student exp...
Collecting feedback on quality indicators of the higher education student exp...
 

Recently uploaded

Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 

Recently uploaded (20)

Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 

Risk management and the release of microdata:

  • 1. Risk management and the release of microdata: Sonia Whiteley & Eric Skuja The Social Research Centre IAOS Conference on Official Statistics, Da Nang Viet Nam, 8-10 October 2014 balancing disclosure risks and data utility
  • 2. About the Social Research Centre (1)  We are a private, for profit company owned by ANU Enterprise, a subsidiary of the Australian National University and co-founder of the Australian Centre for Applied Social Research Methods (AusCen).  Our resources include 60 professional staff, 125 station call centre, a panel of 250 interviewing staff and qualitative interviewing facilities.  Typical services provided include survey design and execution (including sampling, questionnaire design, survey administration and interviewer training), qualitative research, survey data management, statistical consulting and analytical and interpretative reporting.
  • 3. About the Social Research Centre (2) We conduct a number of large scale surveys that contribute to the annual Report on Government Services (ROGS) which provides information on the equity, effectiveness and efficiency of government services in Australia including the:  National Survey of Community Satisfaction with Policing (NSCSP)  Student Outcomes Survey (SOS)  Australian Early Development Census (AEDC).
  • 4. About the AEDC (1)  The Australian Early Development Census (AEDC) is conducted every three years for every Australian child currently enrolled in their first year of full-time school.  Approximately 100 checklist questions cover the five theoretical domains of early childhood development including: − Physical health and well being − Social competence − Emotional maturity − Language and cognitive skills (school-based), and − Communication skills and general knowledge.
  • 5. About the AEDC (2)  The AEDC was conducted for the first time in 2009 with a second collection in 2012. Preparations are already underway for the 2015 AEDC collection.  Approximately 290,000 checklists were completed for each AEDC which equates to more than 96 per cent of in- scope children.  There are three school systems in Australia, Government, Catholic and Independent and all actively participate in the AEDC.
  • 6. Our role in the AEDC Our involvement in the AEDC is ongoing and includes:  Collecting checklist data from teachers via a secure, online system  Developing and maintaining a government website containing − AEDC resources http://www.aedc.gov.au/ and − AEDC macrodata and maps http://www.aedc.gov.au/data  Managing and disseminating the AEDC data collections.
  • 7. Traditional risk management of microdata  A ‘worst case’ scenario approach requires the data custodians to be responsible for identifying and mitigating all potential risks  This model assumes that data users are  Unprofessional  Cannot be trusted  Do not have the required skills or training, and  (In extreme cases) Intend to maliciously misuse the data  Data must be protected from the users and the utility of the unit record data for research is a lower priority  The product of this approach is typically a confidentailised unit record file and the confidentialisation is regarded as the primary safeguard
  • 8. Initial approach to AEDC data management  The AEDC Data Protocol and the AEDC Linkage Policy provide the research community with guidance regarding the appropriate uses of the data.  Two confidentialised unit record files (CURFs) were produced: 1. The Research CURF and 2. The Geography CURF  The files were split due to the − large number of demographic variables − fine level of geographic information that was available, and − concerns about the re identification and disclosure of children, classes and schools
  • 9. Perturbation issues  Both files were perturbed by an external agency based on a ‘worst case scenario’ view of risk  The perturbation rules were undisclosed to prevent reverse engineering  Key variables of relevance to early childhood education researchers were changed significantly − In particular, gender of the child was altered substantially in some geographic areas  Government agencies started to use the CURFs because they were smaller and more accessible files which led to discrepancies between the official results and the agency results
  • 10. Alternative approaches to risk management  The responsibility for appropriately using and reporting microdata is shared between the data custodian and the research community  It is assumed that researchers will observe their professional codes of conduct and do not intend to misuse the data  The main risk focus is on ensuring that researchers appropriately handle, store and publish the data. This includes: Confirming a genuine research aim Restriction of data access to authorised users Ensuring the microdata is anonymised, and Undertaking a risk assessment of files prior to release
  • 11. Formal risk assessments  Government departments are still extremely risk averse, especially when it comes to information about very young children. Two simple risk assessments accompany each microdata file. Both act as topics for negotiation and support rather than obstruction: 1. The proportion of unique records in the dataset is assessed mainly to discourage unauthorised data linkage projects being undertaken by other government agencies. 2. The proportion of cells in two-way tables with three or fewer children is calculated to foreshadow potential problems when researchers publish the data.
  • 12. High risk data Built Environment measures  Child Friendly Neighbourhoods: A composite index based on the following built environment measures requires the children’s X-Y coordinates: − Child health resources Proximity of childcare facilities. − Parks and greenness Proximity of neighbourhood parks. − Residential density Number of residential dwellings. − Home environment Type of residence. Size of backyard. − Traffic exposure Road network classifications − Crime Crime and child related offenses − Land use mix Evenness of different land uses − Public transport Accessibility of bus and rail stops − Street connectivity Number of 3-way or more intersections
  • 13. Managing high risk data Points dispersed within a mesh block
  • 14. Implications of using anonymised microdata  Improves data utility but does not necessarily present higher levels of disclosure risk than a CURF.  Ensures that there is ‘one version of the truth’ and that outputs produced by researchers will be consistent all data users.  Ensures that access requests for any unit record file follow the same formal, detailed assessment, management and close-out procedures.  Concerns about unintentional misuse of microdata need to be clearly communicated to the research community.  Provides an avenue for offering training and support are a condition of data release where a potential data user may not have the skills or experience  Creates a platform where all genuine data access requests can be accommodated through a combination of engaged negotiation regarding the required data elements and by offering supported (and supportive) access modalities.