Cargando…

Statistical Disclosure Control.

A reference to answer all your statistical confidentiality questions. This handbook provides technical guidance on statistical disclosure control and on how to approach the problem of balancing the need to provide users with statistical outputs and the need to protect the confidentiality of responde...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hundepool, Anco
Otros Autores: Domingo-Ferrer, Josep, Franconi, Luisa, Giessing, Sarah, Schulte Nordholt, Eric, Spicer, Keith, Wolf, Peter-Paul de, 1967-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, 2012.
Colección:Wiley series in survey methodology.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn798536017
003 OCoLC
005 20240329122006.0
006 m o d
007 cr un|||||||||
008 120709s2012 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d IDEBK  |d YDXCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d RECBK  |d OCLCF  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCQ  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d GRG  |d ICG  |d OCLCQ  |d TXC  |d MTU  |d U3G  |d DKC  |d UMR  |d OCLCQ  |d OCLCO  |d VI#  |d OCLCO  |d OCLCL 
066 |c (S 
019 |a 865012437 
020 |a 9781118348222 
020 |a 1118348222 
020 |a 9781118348215  |q (electronic bk.) 
020 |a 1118348214  |q (electronic bk.) 
028 0 1 |a EB00066744  |b Recorded Books 
029 1 |a AU@  |b 000052906276 
029 1 |a DEBBG  |b BV041906236 
029 1 |a DEBBG  |b BV044166951 
029 1 |a DEBSZ  |b 397337353 
029 1 |a DEBSZ  |b 449307786 
035 |a (OCoLC)798536017  |z (OCoLC)865012437 
050 4 |a HA34 .H86 2012 
082 0 4 |a 352.7/52384  |a 352.752384 
084 |a MAT029000  |2 bisacsh 
049 |a UAMI 
100 1 |a Hundepool, Anco. 
245 1 0 |a Statistical Disclosure Control. 
260 |a Hoboken :  |b John Wiley & Sons,  |c 2012. 
300 |a 1 online resource (306 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft 
490 1 |a Wiley Series in Survey Methodology 
505 0 |a Statistical Disclosure Control; Contents; Preface; Acknowledgements; 1 Introduction; 1.1 Concepts and definitions; 1.1.1 Disclosure; 1.1.2 Statistical disclosure control; 1.1.3 Tabular data; 1.1.4 Microdata; 1.1.5 Risk and utility; 1.2 An approach to Statistical Disclosure Control; 1.2.1 Why is confidentiality protection needed?; 1.2.2 What are the key characteristics and uses of the data?; 1.2.3 What disclosure risks need to be protected against?; 1.2.4 Disclosure control methods; 1.2.5 Implementation; 1.3 The chapters of the handbook. 
505 8 |a 2 Ethics, principles, guidelines and regulations -- a general background; 2.1 Introduction; 2.2 Ethical codes and the new ISI code; 2.2.1 ISI Declaration on Professional Ethics; 2.2.2 New ISI Declaration on Professional Ethics; 2.2.3 European Statistics Code of Practice; 2.3 UNECE principles and guidelines; 2.3.1 UNECE Principles and Guidelines on Confidentiality Aspects of Data Integration; 2.3.2 Future activities on the UNECE principles and guidelines; 2.4 Laws; 2.4.1 Committee on Statistical Confidentiality; 2.4.2 European Statistical System Committee; 3 Microdata; 3.1 Introduction. 
505 8 |a 3.2 Microdata concepts; 3.2.1 Stage 1: Assess need for confidentiality protection; 3.2.2 Stage 2: Key characteristics and use of microdata; 3.2.3 Stage 3: Disclosure risk; 3.2.4 Stage 4: Disclosure control methods; 3.2.5 Stage 5: Implementation; 3.3 Definitions of disclosure; 3.3.1 Definitions of disclosure scenarios; 3.4 Definitions of disclosure risk; 3.4.1 Disclosure risk for categorical quasi-identifiers; 3.4.2 Notation and assumptions; 3.4.3 Disclosure risk for continuous quasi-identifiers; 3.5 Estimating re-identification risk; 3.5.1 Individual risk based on the sample: Threshold rule. 
505 8 |a 3.5.2 Estimating individual risk using sampling weights; 3.5.3 Estimating individual risk by Poisson model; 3.5.4 Further models that borrow information from other sources; 3.5.5 Estimating per record risk via heuristics; 3.5.6 Assessing risk via record linkage; 3.6 Non-perturbative microdata masking; 3.6.1 Sampling; 3.6.2 Global recoding; 3.6.3 Top and bottom coding; 3.6.4 Local suppression; 3.7 Perturbative microdata masking; 3.7.1 Additive noise masking; 3.7.2 Multiplicative noise masking; 3.7.3 Microaggregation; 3.7.4 Data swapping and rank swapping; 3.7.5 Data shuffling; 3.7.6 Rounding. 
505 8 |a 3.7.7 Re-sampling; 3.7.8 PRAM; 3.7.9 MASSC; 3.8 Synthetic and hybrid data; 3.8.1 Fully synthetic data; 3.8.2 Partially synthetic data; 3.8.3 Hybrid data; 3.8.4 Pros and cons of synthetic and hybrid data; 3.9 Information loss in microdata; 3.9.1 Information loss measures for continuous data; 3.9.2 Information loss measures for categorical data; 3.10 Release of multiple files from the same microdata set; 3.11 Software; 3.11.1 æ-argus; 3.11.2 sdcMicro; 3.11.3 IVEware; 3.12 Case studies; 3.12.1 Microdata files at Statistics Netherlands. 
505 8 |a 3.12.2 The European Labour Force Survey microdata for research purposes. 
520 |a A reference to answer all your statistical confidentiality questions. This handbook provides technical guidance on statistical disclosure control and on how to approach the problem of balancing the need to provide users with statistical outputs and the need to protect the confidentiality of respondents. Statistical disclosure control is combined with other tools such as administrative, legal and IT in order to define a proper data dissemination strategy based on a risk management approach. The key concepts of statistical disclosure control are presented, along with the methodology and software t. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Mathematics. 
650 2 |a Mathematics 
650 6 |a Mathématiques. 
650 7 |a MATHEMATICS  |x Probability & Statistics  |x General.  |2 bisacsh 
650 7 |a Mathematics  |2 fast 
700 1 |a Domingo-Ferrer, Josep. 
700 1 |a Franconi, Luisa. 
700 1 |a Giessing, Sarah. 
700 1 |a Schulte Nordholt, Eric. 
700 1 |a Spicer, Keith. 
700 1 |a Wolf, Peter-Paul de,  |d 1967-  |1 https://id.oclc.org/worldcat/entity/E39PBJmDrwxt7HCj4cxxKHyw4q 
758 |i has work:  |a Statistical Disclosure Control (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGhQDj4W9XrpxXFtcyRqPP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hundepool, Anco.  |t Statistical Disclosure Control.  |d Hoboken : John Wiley & Sons, ©2012  |z 9781119978152 
830 0 |a Wiley series in survey methodology. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=952417  |z Texto completo 
880 0 0 |6 505-00/(S  |a Machine generated contents note:  |g 1.  |t Introduction --  |g 1.1.  |t Concepts and definitions --  |g 1.1.1.  |t Disclosure --  |g 1.1.2.  |t Statistical disclosure control --  |g 1.1.3.  |t Tabular data --  |g 1.1.4.  |t Microdata --  |g 1.1.5.  |t Risk and utility --  |g 1.2.  |t approach to Statistical Disclosure Control --  |g 1.2.1.  |t Why is confidentiality protection needed--  |g 1.2.2.  |t What are the key characteristics and uses of the data--  |g 1.2.3.  |t What disclosure risks need to be protected against--  |g 1.2.4.  |t Disclosure control methods --  |g 1.2.5.  |t Implementation --  |g 1.3.  |t chapters of the handbook --  |g 2.  |t Ethics, principles, guidelines and regulations - a general background --  |g 2.1.  |t Introduction --  |g 2.2.  |t Ethical codes and the new ISI code --  |g 2.2.1.  |t ISI Declaration on Professional Ethics --  |g 2.2.2.  |t New ISI Declaration on Professional Ethics --  |g 2.2.3.  |t European Statistics Code of Practice --  |g 2.3.  |t UNECE principles and guidelines --  |g 2.3.1.  |t UNECE Principles and Guidelines on Confidentiality Aspects of Data Integration --  |g 2.3.2.  |t Future activities on the UNECE principles and guidelines --  |g 2.4.  |t Laws --  |g 2.4.1.  |t Committee on Statistical Confidentiality --  |g 2.4.2.  |t European Statistical System Committee --  |g 3.  |t Microdata --  |g 3.1.  |t Introduction --  |g 3.2.  |t Microdata concepts --  |g 3.2.1.  |t Stage 1: Assess need for confidentiality protection --  |g 3.2.2.  |t Stage 2: Key characteristics and use of microdata --  |g 3.2.3.  |t Stage 3: Disclosure risk --  |g 3.2.4.  |t Stage 4: Disclosure control methods --  |g 3.2.5.  |t Stage 5: Implementation --  |g 3.3.  |t Definitions of disclosure --  |g 3.3.1.  |t Definitions of disclosure scenarios --  |g 3.4.  |t Definitions of disclosure risk --  |g 3.4.1.  |t Disclosure risk for categorical quasi-identifiers --  |g 3.4.2.  |t Notation and assumptions --  |g 3.4.3.  |t Disclosure risk for continuous quasi-identifiers --  |g 3.5.  |t Estimating re-identification risk --  |g 3.5.1.  |t Individual risk based on the sample: Threshold rule --  |g 3.5.2.  |t Estimating individual risk using sampling weights --  |g 3.5.3.  |t Estimating individual risk by Poisson model --  |g 3.5.4.  |t Further models that borrow information from other sources --  |g 3.5.5.  |t Estimating per record risk via heuristics --  |g 3.5.6.  |t Assessing risk via record linkage --  |g 3.6.  |t Non-perturbative microdata masking --  |g 3.6.1.  |t Sampling --  |g 3.6.2.  |t Global recoding --  |g 3.6.3.  |t Top and bottom coding --  |g 3.6.4.  |t Local suppression --  |g 3.7.  |t Perturbative microdata masking --  |g 3.7.1.  |t Additive noise masking --  |g 3.7.2.  |t Multiplicative noise masking --  |g 3.7.3.  |t Microaggregation --  |g 3.7.4.  |t Data swapping and rank swapping --  |g 3.7.5.  |t Data shuffling --  |g 3.7.6.  |t Rounding --  |g 3.7.7.  |t Re-sampling --  |g 3.7.8.  |t PRAM --  |g 3.7.9.  |t MASSC --  |g 3.8.  |t Synthetic and hybrid data --  |g 3.8.1.  |t Fully synthetic data --  |g 3.8.2.  |t Partially synthetic data --  |g 3.8.3.  |t Hybrid data --  |g 3.8.4.  |t Pros and cons of synthetic and hybrid data --  |g 3.9.  |t Information loss in microdata --  |g 3.9.1.  |t Information loss measures for continuous data --  |g 3.9.2.  |t Information loss measures for categorical data --  |g 3.10.  |t Release of multiple files from the same microdata set --  |g 3.11.  |t Software --  |g 3.11.1.  |t μ-ARGUS --  |g 3.11.2.  |t sdcMicro --  |g 3.11.3.  |t IVEware --  |g 3.12.  |t Case studies --  |g 3.12.1.  |t Microdata files at Statistics Netherlands --  |g 3.12.2.  |t European Labour Force Survey microdata for research purposes --  |g 3.12.3.  |t European Structure of Earnings Survey microdata for research purposes --  |g 3.12.4.  |t NHIS-linked mortality data public use file, USA --  |g 3.12.5.  |t Other real case instances --  |g 4.  |t Magnitude tabular data --  |g 4.1.  |t Introduction --  |g 4.1.1.  |t Magnitude tabular data: Basic terminology --  |g 4.1.2.  |t Complex tabular data structures: Hierarchical and linked tables --  |g 4.1.3.  |t Risk concepts --  |g 4.1.4.  |t Protection concepts --  |g 4.1.5.  |t Information loss concepts --  |g 4.1.6.  |t Implementation: Software, guidelines and case study --  |g 4.2.  |t Disclosure risk assessment I: Primary sensitive cells --  |g 4.2.1.  |t Intruder scenarios --  |g 4.2.2.  |t Sensitivity rules --  |g 4.3.  |t Disclosure risk assessment II: Secondary risk assessment --  |g 4.3.1.  |t Feasibility interval --  |g 4.3.2.  |t Protection level --  |g 4.3.3.  |t Singleton and multi cell disclosure --  |g 4.3.4.  |t Risk models for hierarchical and linked tables --  |g 4.4.  |t Non-perturbative protection methods --  |g 4.4.1.  |t Global recoding --  |g 4.4.2.  |t concept of cell suppression --  |g 4.4.3.  |t Algorithms for secondary cell suppression --  |g 4.4.4.  |t Secondary cell suppression in hierarchical and linked tables --  |g 4.5.  |t Perturbative protection methods --  |g 4.5.1.  |t pre-tabular method: Multiplicative noise --  |g 4.5.2.  |t post-tabular method: Controlled tabular adjustment --  |g 4.6.  |t Information loss measures for tabular data --  |g 4.6.1.  |t Cell costs for cell suppression --  |g 4.6.2.  |t Cell costs for CTA --  |g 4.6.3.  |t Information loss measures to evaluate the outcome of table protection --  |g 4.7.  |t Software for tabular data protection --  |g 4.7.1.  |t Empirical comparison of cell suppression algorithms --  |g 4.8.  |t Guidelines: Setting up an efficient table model systematically --  |g 4.8.1.  |t Defining spanning variables --  |g 4.8.2.  |t Response variables and mapping rules --  |g 4.9.  |t Case studies --  |g 4.9.1.  |t Response variables and mapping rules of the case study --  |g 4.9.2.  |t Spanning variables of the case study --  |g 4.9.3.  |t Analysing the tables of the case study --  |g 4.9.4.  |t Software issues of the case study --  |g 5.  |t Frequency tables --  |g 5.1.  |t Introduction --  |g 5.2.  |t Disclosure risks --  |g 5.2.1.  |t Individual attribute disclosure --  |g 5.2.2.  |t Group attribute disclosure --  |g 5.2.3.  |t Disclosure by differencing --  |g 5.2.4.  |t Perception of disclosure risk --  |g 5.3.  |t Methods --  |g 5.3.1.  |t Pre-tabular --  |g 5.3.2.  |t Table re-design --  |g 5.3.3.  |t Post-tabular --  |g 5.4.  |t Post-tabular methods --  |g 5.4.1.  |t Cell suppression --  |g 5.4.2.  |t ABS cell perturbation --  |g 5.4.3.  |t Rounding --  |g 5.5.  |t Information loss --  |g 5.6.  |t Software --  |g 5.6.1.  |t Introduction --  |g 5.6.2.  |t Optimal, first feasible and RAPID solutions --  |g 5.6.3.  |t Protection provided by controlled rounding --  |g 5.7.  |t Case studies --  |g 5.7.1.  |t UK Census --  |g 5.7.2.  |t Australian and New Zealand Censuses --  |g 6.  |t Data access issues --  |g 6.1.  |t Introduction --  |g 6.2.  |t Research data centres --  |g 6.3.  |t Remote execution --  |g 6.4.  |t Remote access --  |g 6.5.  |t Licensing --  |g 6.6.  |t Guidelines on output checking --  |g 6.6.1.  |t Introduction --  |g 6.6.2.  |t General approach --  |g 6.6.3.  |t Rules for output checking --  |g 6.6.4.  |t Organisational/procedural aspects of output checking --  |g 6.6.5.  |t Researcher training --  |g 6.7.  |t Additional issues concerning data access --  |g 6.7.1.  |t Examples of disclaimers --  |g 6.7.2.  |t Output description --  |g 6.8.  |t Case studies --  |g 6.8.1.  |t US Census Bureau Microdata Analysis System --  |g 6.8.2.  |t Remote access at Statistics Netherlands. 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL952417 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 372120 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00066744 
938 |a YBP Library Services  |b YANK  |n 9571136 
994 |a 92  |b IZTAP