|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn798536017 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr un||||||||| |
008 |
120709s2012 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d IDEBK
|d YDXCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d RECBK
|d OCLCF
|d DEBBG
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d GRG
|d ICG
|d OCLCQ
|d TXC
|d MTU
|d U3G
|d DKC
|d UMR
|d OCLCQ
|d OCLCO
|d VI#
|d OCLCO
|d OCLCL
|
066 |
|
|
|c (S
|
019 |
|
|
|a 865012437
|
020 |
|
|
|a 9781118348222
|
020 |
|
|
|a 1118348222
|
020 |
|
|
|a 9781118348215
|q (electronic bk.)
|
020 |
|
|
|a 1118348214
|q (electronic bk.)
|
028 |
0 |
1 |
|a EB00066744
|b Recorded Books
|
029 |
1 |
|
|a AU@
|b 000052906276
|
029 |
1 |
|
|a DEBBG
|b BV041906236
|
029 |
1 |
|
|a DEBBG
|b BV044166951
|
029 |
1 |
|
|a DEBSZ
|b 397337353
|
029 |
1 |
|
|a DEBSZ
|b 449307786
|
035 |
|
|
|a (OCoLC)798536017
|z (OCoLC)865012437
|
050 |
|
4 |
|a HA34 .H86 2012
|
082 |
0 |
4 |
|a 352.7/52384
|a 352.752384
|
084 |
|
|
|a MAT029000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hundepool, Anco.
|
245 |
1 |
0 |
|a Statistical Disclosure Control.
|
260 |
|
|
|a Hoboken :
|b John Wiley & Sons,
|c 2012.
|
300 |
|
|
|a 1 online resource (306 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rdaft
|
490 |
1 |
|
|a Wiley Series in Survey Methodology
|
505 |
0 |
|
|a Statistical Disclosure Control; Contents; Preface; Acknowledgements; 1 Introduction; 1.1 Concepts and definitions; 1.1.1 Disclosure; 1.1.2 Statistical disclosure control; 1.1.3 Tabular data; 1.1.4 Microdata; 1.1.5 Risk and utility; 1.2 An approach to Statistical Disclosure Control; 1.2.1 Why is confidentiality protection needed?; 1.2.2 What are the key characteristics and uses of the data?; 1.2.3 What disclosure risks need to be protected against?; 1.2.4 Disclosure control methods; 1.2.5 Implementation; 1.3 The chapters of the handbook.
|
505 |
8 |
|
|a 2 Ethics, principles, guidelines and regulations -- a general background; 2.1 Introduction; 2.2 Ethical codes and the new ISI code; 2.2.1 ISI Declaration on Professional Ethics; 2.2.2 New ISI Declaration on Professional Ethics; 2.2.3 European Statistics Code of Practice; 2.3 UNECE principles and guidelines; 2.3.1 UNECE Principles and Guidelines on Confidentiality Aspects of Data Integration; 2.3.2 Future activities on the UNECE principles and guidelines; 2.4 Laws; 2.4.1 Committee on Statistical Confidentiality; 2.4.2 European Statistical System Committee; 3 Microdata; 3.1 Introduction.
|
505 |
8 |
|
|a 3.2 Microdata concepts; 3.2.1 Stage 1: Assess need for confidentiality protection; 3.2.2 Stage 2: Key characteristics and use of microdata; 3.2.3 Stage 3: Disclosure risk; 3.2.4 Stage 4: Disclosure control methods; 3.2.5 Stage 5: Implementation; 3.3 Definitions of disclosure; 3.3.1 Definitions of disclosure scenarios; 3.4 Definitions of disclosure risk; 3.4.1 Disclosure risk for categorical quasi-identifiers; 3.4.2 Notation and assumptions; 3.4.3 Disclosure risk for continuous quasi-identifiers; 3.5 Estimating re-identification risk; 3.5.1 Individual risk based on the sample: Threshold rule.
|
505 |
8 |
|
|a 3.5.2 Estimating individual risk using sampling weights; 3.5.3 Estimating individual risk by Poisson model; 3.5.4 Further models that borrow information from other sources; 3.5.5 Estimating per record risk via heuristics; 3.5.6 Assessing risk via record linkage; 3.6 Non-perturbative microdata masking; 3.6.1 Sampling; 3.6.2 Global recoding; 3.6.3 Top and bottom coding; 3.6.4 Local suppression; 3.7 Perturbative microdata masking; 3.7.1 Additive noise masking; 3.7.2 Multiplicative noise masking; 3.7.3 Microaggregation; 3.7.4 Data swapping and rank swapping; 3.7.5 Data shuffling; 3.7.6 Rounding.
|
505 |
8 |
|
|a 3.7.7 Re-sampling; 3.7.8 PRAM; 3.7.9 MASSC; 3.8 Synthetic and hybrid data; 3.8.1 Fully synthetic data; 3.8.2 Partially synthetic data; 3.8.3 Hybrid data; 3.8.4 Pros and cons of synthetic and hybrid data; 3.9 Information loss in microdata; 3.9.1 Information loss measures for continuous data; 3.9.2 Information loss measures for categorical data; 3.10 Release of multiple files from the same microdata set; 3.11 Software; 3.11.1 æ-argus; 3.11.2 sdcMicro; 3.11.3 IVEware; 3.12 Case studies; 3.12.1 Microdata files at Statistics Netherlands.
|
505 |
8 |
|
|a 3.12.2 The European Labour Force Survey microdata for research purposes.
|
520 |
|
|
|a A reference to answer all your statistical confidentiality questions. This handbook provides technical guidance on statistical disclosure control and on how to approach the problem of balancing the need to provide users with statistical outputs and the need to protect the confidentiality of respondents. Statistical disclosure control is combined with other tools such as administrative, legal and IT in order to define a proper data dissemination strategy based on a risk management approach. The key concepts of statistical disclosure control are presented, along with the methodology and software t.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Mathematics.
|
650 |
|
2 |
|a Mathematics
|
650 |
|
6 |
|a Mathématiques.
|
650 |
|
7 |
|a MATHEMATICS
|x Probability & Statistics
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Mathematics
|2 fast
|
700 |
1 |
|
|a Domingo-Ferrer, Josep.
|
700 |
1 |
|
|a Franconi, Luisa.
|
700 |
1 |
|
|a Giessing, Sarah.
|
700 |
1 |
|
|a Schulte Nordholt, Eric.
|
700 |
1 |
|
|a Spicer, Keith.
|
700 |
1 |
|
|a Wolf, Peter-Paul de,
|d 1967-
|1 https://id.oclc.org/worldcat/entity/E39PBJmDrwxt7HCj4cxxKHyw4q
|
758 |
|
|
|i has work:
|a Statistical Disclosure Control (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGhQDj4W9XrpxXFtcyRqPP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Hundepool, Anco.
|t Statistical Disclosure Control.
|d Hoboken : John Wiley & Sons, ©2012
|z 9781119978152
|
830 |
|
0 |
|a Wiley series in survey methodology.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=952417
|z Texto completo
|
880 |
0 |
0 |
|6 505-00/(S
|a Machine generated contents note:
|g 1.
|t Introduction --
|g 1.1.
|t Concepts and definitions --
|g 1.1.1.
|t Disclosure --
|g 1.1.2.
|t Statistical disclosure control --
|g 1.1.3.
|t Tabular data --
|g 1.1.4.
|t Microdata --
|g 1.1.5.
|t Risk and utility --
|g 1.2.
|t approach to Statistical Disclosure Control --
|g 1.2.1.
|t Why is confidentiality protection needed--
|g 1.2.2.
|t What are the key characteristics and uses of the data--
|g 1.2.3.
|t What disclosure risks need to be protected against--
|g 1.2.4.
|t Disclosure control methods --
|g 1.2.5.
|t Implementation --
|g 1.3.
|t chapters of the handbook --
|g 2.
|t Ethics, principles, guidelines and regulations - a general background --
|g 2.1.
|t Introduction --
|g 2.2.
|t Ethical codes and the new ISI code --
|g 2.2.1.
|t ISI Declaration on Professional Ethics --
|g 2.2.2.
|t New ISI Declaration on Professional Ethics --
|g 2.2.3.
|t European Statistics Code of Practice --
|g 2.3.
|t UNECE principles and guidelines --
|g 2.3.1.
|t UNECE Principles and Guidelines on Confidentiality Aspects of Data Integration --
|g 2.3.2.
|t Future activities on the UNECE principles and guidelines --
|g 2.4.
|t Laws --
|g 2.4.1.
|t Committee on Statistical Confidentiality --
|g 2.4.2.
|t European Statistical System Committee --
|g 3.
|t Microdata --
|g 3.1.
|t Introduction --
|g 3.2.
|t Microdata concepts --
|g 3.2.1.
|t Stage 1: Assess need for confidentiality protection --
|g 3.2.2.
|t Stage 2: Key characteristics and use of microdata --
|g 3.2.3.
|t Stage 3: Disclosure risk --
|g 3.2.4.
|t Stage 4: Disclosure control methods --
|g 3.2.5.
|t Stage 5: Implementation --
|g 3.3.
|t Definitions of disclosure --
|g 3.3.1.
|t Definitions of disclosure scenarios --
|g 3.4.
|t Definitions of disclosure risk --
|g 3.4.1.
|t Disclosure risk for categorical quasi-identifiers --
|g 3.4.2.
|t Notation and assumptions --
|g 3.4.3.
|t Disclosure risk for continuous quasi-identifiers --
|g 3.5.
|t Estimating re-identification risk --
|g 3.5.1.
|t Individual risk based on the sample: Threshold rule --
|g 3.5.2.
|t Estimating individual risk using sampling weights --
|g 3.5.3.
|t Estimating individual risk by Poisson model --
|g 3.5.4.
|t Further models that borrow information from other sources --
|g 3.5.5.
|t Estimating per record risk via heuristics --
|g 3.5.6.
|t Assessing risk via record linkage --
|g 3.6.
|t Non-perturbative microdata masking --
|g 3.6.1.
|t Sampling --
|g 3.6.2.
|t Global recoding --
|g 3.6.3.
|t Top and bottom coding --
|g 3.6.4.
|t Local suppression --
|g 3.7.
|t Perturbative microdata masking --
|g 3.7.1.
|t Additive noise masking --
|g 3.7.2.
|t Multiplicative noise masking --
|g 3.7.3.
|t Microaggregation --
|g 3.7.4.
|t Data swapping and rank swapping --
|g 3.7.5.
|t Data shuffling --
|g 3.7.6.
|t Rounding --
|g 3.7.7.
|t Re-sampling --
|g 3.7.8.
|t PRAM --
|g 3.7.9.
|t MASSC --
|g 3.8.
|t Synthetic and hybrid data --
|g 3.8.1.
|t Fully synthetic data --
|g 3.8.2.
|t Partially synthetic data --
|g 3.8.3.
|t Hybrid data --
|g 3.8.4.
|t Pros and cons of synthetic and hybrid data --
|g 3.9.
|t Information loss in microdata --
|g 3.9.1.
|t Information loss measures for continuous data --
|g 3.9.2.
|t Information loss measures for categorical data --
|g 3.10.
|t Release of multiple files from the same microdata set --
|g 3.11.
|t Software --
|g 3.11.1.
|t μ-ARGUS --
|g 3.11.2.
|t sdcMicro --
|g 3.11.3.
|t IVEware --
|g 3.12.
|t Case studies --
|g 3.12.1.
|t Microdata files at Statistics Netherlands --
|g 3.12.2.
|t European Labour Force Survey microdata for research purposes --
|g 3.12.3.
|t European Structure of Earnings Survey microdata for research purposes --
|g 3.12.4.
|t NHIS-linked mortality data public use file, USA --
|g 3.12.5.
|t Other real case instances --
|g 4.
|t Magnitude tabular data --
|g 4.1.
|t Introduction --
|g 4.1.1.
|t Magnitude tabular data: Basic terminology --
|g 4.1.2.
|t Complex tabular data structures: Hierarchical and linked tables --
|g 4.1.3.
|t Risk concepts --
|g 4.1.4.
|t Protection concepts --
|g 4.1.5.
|t Information loss concepts --
|g 4.1.6.
|t Implementation: Software, guidelines and case study --
|g 4.2.
|t Disclosure risk assessment I: Primary sensitive cells --
|g 4.2.1.
|t Intruder scenarios --
|g 4.2.2.
|t Sensitivity rules --
|g 4.3.
|t Disclosure risk assessment II: Secondary risk assessment --
|g 4.3.1.
|t Feasibility interval --
|g 4.3.2.
|t Protection level --
|g 4.3.3.
|t Singleton and multi cell disclosure --
|g 4.3.4.
|t Risk models for hierarchical and linked tables --
|g 4.4.
|t Non-perturbative protection methods --
|g 4.4.1.
|t Global recoding --
|g 4.4.2.
|t concept of cell suppression --
|g 4.4.3.
|t Algorithms for secondary cell suppression --
|g 4.4.4.
|t Secondary cell suppression in hierarchical and linked tables --
|g 4.5.
|t Perturbative protection methods --
|g 4.5.1.
|t pre-tabular method: Multiplicative noise --
|g 4.5.2.
|t post-tabular method: Controlled tabular adjustment --
|g 4.6.
|t Information loss measures for tabular data --
|g 4.6.1.
|t Cell costs for cell suppression --
|g 4.6.2.
|t Cell costs for CTA --
|g 4.6.3.
|t Information loss measures to evaluate the outcome of table protection --
|g 4.7.
|t Software for tabular data protection --
|g 4.7.1.
|t Empirical comparison of cell suppression algorithms --
|g 4.8.
|t Guidelines: Setting up an efficient table model systematically --
|g 4.8.1.
|t Defining spanning variables --
|g 4.8.2.
|t Response variables and mapping rules --
|g 4.9.
|t Case studies --
|g 4.9.1.
|t Response variables and mapping rules of the case study --
|g 4.9.2.
|t Spanning variables of the case study --
|g 4.9.3.
|t Analysing the tables of the case study --
|g 4.9.4.
|t Software issues of the case study --
|g 5.
|t Frequency tables --
|g 5.1.
|t Introduction --
|g 5.2.
|t Disclosure risks --
|g 5.2.1.
|t Individual attribute disclosure --
|g 5.2.2.
|t Group attribute disclosure --
|g 5.2.3.
|t Disclosure by differencing --
|g 5.2.4.
|t Perception of disclosure risk --
|g 5.3.
|t Methods --
|g 5.3.1.
|t Pre-tabular --
|g 5.3.2.
|t Table re-design --
|g 5.3.3.
|t Post-tabular --
|g 5.4.
|t Post-tabular methods --
|g 5.4.1.
|t Cell suppression --
|g 5.4.2.
|t ABS cell perturbation --
|g 5.4.3.
|t Rounding --
|g 5.5.
|t Information loss --
|g 5.6.
|t Software --
|g 5.6.1.
|t Introduction --
|g 5.6.2.
|t Optimal, first feasible and RAPID solutions --
|g 5.6.3.
|t Protection provided by controlled rounding --
|g 5.7.
|t Case studies --
|g 5.7.1.
|t UK Census --
|g 5.7.2.
|t Australian and New Zealand Censuses --
|g 6.
|t Data access issues --
|g 6.1.
|t Introduction --
|g 6.2.
|t Research data centres --
|g 6.3.
|t Remote execution --
|g 6.4.
|t Remote access --
|g 6.5.
|t Licensing --
|g 6.6.
|t Guidelines on output checking --
|g 6.6.1.
|t Introduction --
|g 6.6.2.
|t General approach --
|g 6.6.3.
|t Rules for output checking --
|g 6.6.4.
|t Organisational/procedural aspects of output checking --
|g 6.6.5.
|t Researcher training --
|g 6.7.
|t Additional issues concerning data access --
|g 6.7.1.
|t Examples of disclaimers --
|g 6.7.2.
|t Output description --
|g 6.8.
|t Case studies --
|g 6.8.1.
|t US Census Bureau Microdata Analysis System --
|g 6.8.2.
|t Remote access at Statistics Netherlands.
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL952417
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 372120
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00066744
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9571136
|
994 |
|
|
|a 92
|b IZTAP
|