SlideShare a Scribd company logo
1 of 15
Download to read offline
Statistical Disclosure Control
Basic Concepts
Professor Mark Elliot
Outline
• What is a statistical disclosure
• How might statistical disclosure happen?
Privacy, confidentiality and disclosure
Privacy
Confidentiality
Disclosure
Control
What is Statistical Disclosure Control
(SDC)?
Statistical disclosure control (SDC) is the
practice of reducing the risk of:
finding people (or other entities) in data: Re-identification
and/or
associating data with a person (or entity): Association
What is Statistical Disclosure Control
(SDC)?
Need to strike the right balance between
maximising data utility (including meeting
customer requirements) and management of
confidentiality risk.
Statistical disclosure is itself an active
research area
• Sub fields
• Disclosure risk assessment
• Disclosure control methodology
• Measurement of analytical validity
• Data Environment Analysis
• All data types
• Typically Microdata and Aggregate data
• Business and Personal data
• Intentional and Consequential data
How might a disclosure happen?
• Imagine you are a “data intruder”
– What would you need to do in order to identify
information about individuals within anonymised
data?
– What might be your motivations?
• In what other ways might a statistical
disclosure happen other than malicious
intrusion?
The Disclosure Risk Problem:
Type I: Identification
Name Address Sex Age ..
Income .. ..Sex Age ..
ID
variables
Key
variables
Target
variables
Identification file
Target file
The Disclosure Risk Problem
Type II: Attribution
High Medium Low T otal
Professors 0 100 50 150
Pop stars 100 50 5 155
T otal 100 150 55 305
Income levels for two occupations
The Disclosure Risk Problem:
Type III: Subtraction
High Medium Low T otal
Professors 1 100 50 151
Pop Stars 100 50 5 155
T otal 101 150 55 306
Income levels for two occupations
The Disclosure Risk Problem
Type III: After subtraction
High Medium Low T otal
Professors 0 100 50 150
Pop Stars 100 50 5 155
T otal 100 150 55 305
Income levels for two occupations
The Disclosure Risk Problem
Type IV: Table linkage
 Original cell counts can be recovered from the marginal
tables
The Disclosure Risk Problem
Type IV: Table linkage
The Disclosure Risk Problem:
Other data types
• Network data
• Qualitative data
• Genomics Data
• Stream Data
• Mixed data – Jigsaw identification
Summary
• Statistical disclosure is a complex topic
 Still an active research field
• As researchers using sensitive/personal data
you will need to:
 Be aware of the issues and considerations of
statistical disclosure
 Be able to make principled judgements about the
disclosiveness of your output

More Related Content

Viewers also liked

Creative research methods: Transformative research frameworks
Creative research methods: Transformative research frameworksCreative research methods: Transformative research frameworks
Creative research methods: Transformative research frameworksUniversity of Southampton
 
Video stimulated reflection, recall and dialogue-introduction to methods
Video stimulated reflection, recall and dialogue-introduction to methodsVideo stimulated reflection, recall and dialogue-introduction to methods
Video stimulated reflection, recall and dialogue-introduction to methodsUniversity of Southampton
 
Examples of automated_zone_design_in_practice
Examples of automated_zone_design_in_practiceExamples of automated_zone_design_in_practice
Examples of automated_zone_design_in_practiceUniversity of Southampton
 
Creative research methods: Arts-based methods
Creative research methods: Arts-based methodsCreative research methods: Arts-based methods
Creative research methods: Arts-based methodsUniversity of Southampton
 
Creative research methods: Research using technology
Creative research methods: Research using technologyCreative research methods: Research using technology
Creative research methods: Research using technologyUniversity of Southampton
 
An introduction to Jupyter Notebooks for Social Science research
An introduction to Jupyter Notebooks for Social Science researchAn introduction to Jupyter Notebooks for Social Science research
An introduction to Jupyter Notebooks for Social Science researchUniversity of Southampton
 
Introduction to Structural Equation Modeling
Introduction to Structural Equation ModelingIntroduction to Structural Equation Modeling
Introduction to Structural Equation ModelingUniversity of Southampton
 
Goodness of fit statistics poisson regression
Goodness of fit statistics poisson regressionGoodness of fit statistics poisson regression
Goodness of fit statistics poisson regressionUniversity of Southampton
 

Viewers also liked (19)

Creative research methods: Transformative research frameworks
Creative research methods: Transformative research frameworksCreative research methods: Transformative research frameworks
Creative research methods: Transformative research frameworks
 
Principles of automated_zone_design_methods
Principles of automated_zone_design_methodsPrinciples of automated_zone_design_methods
Principles of automated_zone_design_methods
 
Introduction to az_tool_software
Introduction to az_tool_softwareIntroduction to az_tool_software
Introduction to az_tool_software
 
Video stimulated reflection, recall and dialogue-introduction to methods
Video stimulated reflection, recall and dialogue-introduction to methodsVideo stimulated reflection, recall and dialogue-introduction to methods
Video stimulated reflection, recall and dialogue-introduction to methods
 
Introduction automated zone design
Introduction automated zone designIntroduction automated zone design
Introduction automated zone design
 
Examples of automated_zone_design_in_practice
Examples of automated_zone_design_in_practiceExamples of automated_zone_design_in_practice
Examples of automated_zone_design_in_practice
 
Creative research methods: Arts-based methods
Creative research methods: Arts-based methodsCreative research methods: Arts-based methods
Creative research methods: Arts-based methods
 
Research ethics: Ethical theories
Research ethics: Ethical theoriesResearch ethics: Ethical theories
Research ethics: Ethical theories
 
Research Ethics: Ethical practice
Research Ethics: Ethical practiceResearch Ethics: Ethical practice
Research Ethics: Ethical practice
 
Creative research methods: Research using technology
Creative research methods: Research using technologyCreative research methods: Research using technology
Creative research methods: Research using technology
 
Research ethics: Ethical principles
Research ethics: Ethical principlesResearch ethics: Ethical principles
Research ethics: Ethical principles
 
An introduction to Jupyter Notebooks for Social Science research
An introduction to Jupyter Notebooks for Social Science researchAn introduction to Jupyter Notebooks for Social Science research
An introduction to Jupyter Notebooks for Social Science research
 
Introduction to Data Linkage
Introduction to Data LinkageIntroduction to Data Linkage
Introduction to Data Linkage
 
Confirmatory Factor Analysis
Confirmatory Factor AnalysisConfirmatory Factor Analysis
Confirmatory Factor Analysis
 
Key ideas, terms and concepts in SEM
Key ideas, terms and concepts in SEMKey ideas, terms and concepts in SEM
Key ideas, terms and concepts in SEM
 
Introduction to Structural Equation Modeling
Introduction to Structural Equation ModelingIntroduction to Structural Equation Modeling
Introduction to Structural Equation Modeling
 
Goodness of fit statistics poisson regression
Goodness of fit statistics poisson regressionGoodness of fit statistics poisson regression
Goodness of fit statistics poisson regression
 
Poisson regression models for count data
Poisson regression models for count dataPoisson regression models for count data
Poisson regression models for count data
 
Diagnostic in poisson regression models
Diagnostic in poisson regression modelsDiagnostic in poisson regression models
Diagnostic in poisson regression models
 

Similar to Statistical discolosure control

Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Michael Torres
 
Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Michael Brodie
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Privacy Preserving by Anonymization Approach
Privacy Preserving by Anonymization ApproachPrivacy Preserving by Anonymization Approach
Privacy Preserving by Anonymization Approachrahulmonikasharma
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentationRodonoghue72
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptxVITNetflix
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)Duke Network Analysis Center
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguardsdnac
 
The Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurityThe Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurityTyrone Grandison
 
Differential privacy and applications to location privacy
Differential privacy and applications to location privacyDifferential privacy and applications to location privacy
Differential privacy and applications to location privacyPôle Systematic Paris-Region
 
NIST Privacy Engineering Working Group - Risk Model
NIST Privacy Engineering Working Group  - Risk ModelNIST Privacy Engineering Working Group  - Risk Model
NIST Privacy Engineering Working Group - Risk ModelDavid Sweigert
 
LAK16 keynote Learning Analytics: Utopia or Dystopia
LAK16 keynote Learning Analytics: Utopia or DystopiaLAK16 keynote Learning Analytics: Utopia or Dystopia
LAK16 keynote Learning Analytics: Utopia or DystopiaPaul Kirschner
 

Similar to Statistical discolosure control (20)

Cp34550555
Cp34550555Cp34550555
Cp34550555
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
 
G0953643
G0953643G0953643
G0953643
 
Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Privacy Preserving by Anonymization Approach
Privacy Preserving by Anonymization ApproachPrivacy Preserving by Anonymization Approach
Privacy Preserving by Anonymization Approach
 
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdfSFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards
 
The Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurityThe Role of Audit Analysis in CyberSecurity
The Role of Audit Analysis in CyberSecurity
 
Differential privacy and applications to location privacy
Differential privacy and applications to location privacyDifferential privacy and applications to location privacy
Differential privacy and applications to location privacy
 
NIST Privacy Engineering Working Group - Risk Model
NIST Privacy Engineering Working Group  - Risk ModelNIST Privacy Engineering Working Group  - Risk Model
NIST Privacy Engineering Working Group - Risk Model
 
LAK16 keynote Learning Analytics: Utopia or Dystopia
LAK16 keynote Learning Analytics: Utopia or DystopiaLAK16 keynote Learning Analytics: Utopia or Dystopia
LAK16 keynote Learning Analytics: Utopia or Dystopia
 

More from University of Southampton

Generating SPSS training materials in StatJR
Generating SPSS training materials in StatJRGenerating SPSS training materials in StatJR
Generating SPSS training materials in StatJRUniversity of Southampton
 
Introduction to the Stat-JR software package
Introduction to the Stat-JR software packageIntroduction to the Stat-JR software package
Introduction to the Stat-JR software packageUniversity of Southampton
 
Multi level modelling- random coefficient models | Ian Brunton-Smith
Multi level modelling- random coefficient models | Ian Brunton-SmithMulti level modelling- random coefficient models | Ian Brunton-Smith
Multi level modelling- random coefficient models | Ian Brunton-SmithUniversity of Southampton
 
Multi level modelling - random intercept models | Ian Brunton Smith
Multi level modelling - random intercept models | Ian Brunton SmithMulti level modelling - random intercept models | Ian Brunton Smith
Multi level modelling - random intercept models | Ian Brunton SmithUniversity of Southampton
 
Introduction to multilevel modelling | Ian Brunton-Smith
Introduction to multilevel modelling | Ian Brunton-SmithIntroduction to multilevel modelling | Ian Brunton-Smith
Introduction to multilevel modelling | Ian Brunton-SmithUniversity of Southampton
 
Biosocial research:How to use biological data in social science research?
Biosocial research:How to use biological data in social science research?Biosocial research:How to use biological data in social science research?
Biosocial research:How to use biological data in social science research?University of Southampton
 
Integrating biological and social research data - Michaela Benzeval
Integrating biological and social research data - Michaela BenzevalIntegrating biological and social research data - Michaela Benzeval
Integrating biological and social research data - Michaela BenzevalUniversity of Southampton
 
Teaching research methods: pedagogy of methods learning
Teaching research methods: pedagogy of methods learningTeaching research methods: pedagogy of methods learning
Teaching research methods: pedagogy of methods learningUniversity of Southampton
 
Introduction to spatial interaction modelling
Introduction to spatial interaction modellingIntroduction to spatial interaction modelling
Introduction to spatial interaction modellingUniversity of Southampton
 

More from University of Southampton (20)

Introduction to Survey Data Quality
Introduction to Survey Data Quality  Introduction to Survey Data Quality
Introduction to Survey Data Quality
 
Generating SPSS training materials in StatJR
Generating SPSS training materials in StatJRGenerating SPSS training materials in StatJR
Generating SPSS training materials in StatJR
 
Introduction to the Stat-JR software package
Introduction to the Stat-JR software packageIntroduction to the Stat-JR software package
Introduction to the Stat-JR software package
 
Multi level modelling- random coefficient models | Ian Brunton-Smith
Multi level modelling- random coefficient models | Ian Brunton-SmithMulti level modelling- random coefficient models | Ian Brunton-Smith
Multi level modelling- random coefficient models | Ian Brunton-Smith
 
Multi level modelling - random intercept models | Ian Brunton Smith
Multi level modelling - random intercept models | Ian Brunton SmithMulti level modelling - random intercept models | Ian Brunton Smith
Multi level modelling - random intercept models | Ian Brunton Smith
 
Introduction to multilevel modelling | Ian Brunton-Smith
Introduction to multilevel modelling | Ian Brunton-SmithIntroduction to multilevel modelling | Ian Brunton-Smith
Introduction to multilevel modelling | Ian Brunton-Smith
 
Biosocial research:How to use biological data in social science research?
Biosocial research:How to use biological data in social science research?Biosocial research:How to use biological data in social science research?
Biosocial research:How to use biological data in social science research?
 
Integrating biological and social research data - Michaela Benzeval
Integrating biological and social research data - Michaela BenzevalIntegrating biological and social research data - Michaela Benzeval
Integrating biological and social research data - Michaela Benzeval
 
Teaching research methods: pedagogy hooks
Teaching research methods: pedagogy hooksTeaching research methods: pedagogy hooks
Teaching research methods: pedagogy hooks
 
Teaching research methods: pedagogy of methods learning
Teaching research methods: pedagogy of methods learningTeaching research methods: pedagogy of methods learning
Teaching research methods: pedagogy of methods learning
 
Data quality: total survey error
Data quality: total survey errorData quality: total survey error
Data quality: total survey error
 
better off living with parents
better off living with parentsbetter off living with parents
better off living with parents
 
Multilevel models:random coefficient models
Multilevel models:random coefficient modelsMultilevel models:random coefficient models
Multilevel models:random coefficient models
 
Multilevel models:random intercept models
Multilevel models:random intercept modelsMultilevel models:random intercept models
Multilevel models:random intercept models
 
Introduction to multilevel modelling
Introduction to multilevel modellingIntroduction to multilevel modelling
Introduction to multilevel modelling
 
How to write about research methods
How to write about research methodsHow to write about research methods
How to write about research methods
 
How to write about research methods
How to write about research methodsHow to write about research methods
How to write about research methods
 
Introduction to spatial interaction modelling
Introduction to spatial interaction modellingIntroduction to spatial interaction modelling
Introduction to spatial interaction modelling
 
Cognitive interviewing
Cognitive interviewingCognitive interviewing
Cognitive interviewing
 
Survey questions and measurement error
Survey questions and measurement errorSurvey questions and measurement error
Survey questions and measurement error
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Statistical discolosure control

  • 1. Statistical Disclosure Control Basic Concepts Professor Mark Elliot
  • 2. Outline • What is a statistical disclosure • How might statistical disclosure happen?
  • 3. Privacy, confidentiality and disclosure Privacy Confidentiality Disclosure Control
  • 4. What is Statistical Disclosure Control (SDC)? Statistical disclosure control (SDC) is the practice of reducing the risk of: finding people (or other entities) in data: Re-identification and/or associating data with a person (or entity): Association
  • 5. What is Statistical Disclosure Control (SDC)? Need to strike the right balance between maximising data utility (including meeting customer requirements) and management of confidentiality risk.
  • 6. Statistical disclosure is itself an active research area • Sub fields • Disclosure risk assessment • Disclosure control methodology • Measurement of analytical validity • Data Environment Analysis • All data types • Typically Microdata and Aggregate data • Business and Personal data • Intentional and Consequential data
  • 7. How might a disclosure happen? • Imagine you are a “data intruder” – What would you need to do in order to identify information about individuals within anonymised data? – What might be your motivations? • In what other ways might a statistical disclosure happen other than malicious intrusion?
  • 8. The Disclosure Risk Problem: Type I: Identification Name Address Sex Age .. Income .. ..Sex Age .. ID variables Key variables Target variables Identification file Target file
  • 9. The Disclosure Risk Problem Type II: Attribution High Medium Low T otal Professors 0 100 50 150 Pop stars 100 50 5 155 T otal 100 150 55 305 Income levels for two occupations
  • 10. The Disclosure Risk Problem: Type III: Subtraction High Medium Low T otal Professors 1 100 50 151 Pop Stars 100 50 5 155 T otal 101 150 55 306 Income levels for two occupations
  • 11. The Disclosure Risk Problem Type III: After subtraction High Medium Low T otal Professors 0 100 50 150 Pop Stars 100 50 5 155 T otal 100 150 55 305 Income levels for two occupations
  • 12. The Disclosure Risk Problem Type IV: Table linkage
  • 13.  Original cell counts can be recovered from the marginal tables The Disclosure Risk Problem Type IV: Table linkage
  • 14. The Disclosure Risk Problem: Other data types • Network data • Qualitative data • Genomics Data • Stream Data • Mixed data – Jigsaw identification
  • 15. Summary • Statistical disclosure is a complex topic  Still an active research field • As researchers using sensitive/personal data you will need to:  Be aware of the issues and considerations of statistical disclosure  Be able to make principled judgements about the disclosiveness of your output