Skip to main content

Currently Skimming:

4 Alternative Approaches for Limiting Disclosure Risks and Facilitating Data Access
Pages 29-36

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 29...
... Technical approaches are discussed later in this chapter. Participants representing the research community expressed frustration with some of the standard perturbation methods employed by the large longitudinal surveys.
From page 30...
... Kennickell's use of a multiple imputation technique offers a more sophisticated form of data perturbation, one that could potentially improve data security (and, hence, allow greater accessibility) without seriously compromising modeling utility.
From page 31...
... It is not known how imputation affects error structures of complicated models; what sampling error means in a fully simulated data set; what happens to complex relationships among variables; and, more generally, how researchers will interpret modeling results. One way to begin addressing these questions is to create synthetic versions of existing data sets with known nonlinear relationships or complex interactions and see whether they could have been detected with the simulations.
From page 32...
... While complex longitudinal data increase disclosure risks, it is also more difficult to preserve key relationships and interactions among variables when this type of data is altered. Perturbation, therefore, may be more damaging to analyses that rely on longitudinal data than to those that rely on cross-sectional data.
From page 33...
... established for the purpose by custodians of the data; and (3) controlled remote access, in which users submit their analytical programs electronically to the custodian, who runs them and reviews the outputs for disclosure risk prior to transmission to the users.2 The next chapter reviews workshop presentations that described current and planned restrictedaccess arrangements at various agencies.
From page 34...
... These operational costs can be significant; for instance, Kennickell reported that the Fed does not have the research budget to establish data centers or even licensing agreements. While their multiple imputation program is a major undertaking, it is a less costly method of providing broad 3Ivan Felligi and others believe that if data linkage continues to increase, it may not be possible to safely offer public release files at all.
From page 35...
... For example, there may be ways to improve remote access using rapidly evolving net-based foundations that would allow researchers to run interactive programs externally (see also the discussion of remote access in Chapter 51. More sophisticated linking may also be possible, particularly if methods can be developed to monitor the combinations of variables regularly used by researchers.
From page 36...
... The act sets forth broad criminal prohibition, but only minor criminal sanctions for disclosure of data in violation of regulations. A $100 civil penalty is unlikely to be effective against corporate or even most individual abuses.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.