The Committee on National Statistics of the National Academies of Sciences, Engineering, and Medicine convened a 2-day public workshop from December 11-12, 2019, to discuss the suite of data products the Census Bureau will generate from the 2020 Census. The workshop featured presentations by users of decennial census data products to help the Census Bureau better understand the uses of the data products and the importance of these uses and help inform the Census Bureau's decisions on the final specification of 2020 data products. This publication summarizes the presentation and discussion of the workshop.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2020, held in Tarragona, Spain, in September 2020 under the sponsorship of the UNESCO Chair in Data Privacy. The 25 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized into the following topics: privacy models; microdata protection; protection of statistical tables; protection of interactive and mobility databases; record linkage and alternative methods; synthetic data; data quality; and case studies. The Chapter “Explaining recurrent machine learning models: integral privacy revisited” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2020, held in Tarragona, Spain, in September 2020 under the sponsorship of the UNESCO Chair in Data Privacy. The 25 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized into the following topics: privacy models; microdata protection; protection of statistical tables; protection of interactive and mobility databases; record linkage and alternative methods; synthetic data; data quality; and case studies. The Chapter “Explaining recurrent machine learning models: integral privacy revisited” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Election law plays a critical role in regulating the political arena at a time when Americans are witnessing unprecedented levels of polarization. The Oxford Handbook of American Election Law provides a comprehensive overview of the field, a survey of core themes, and summaries of the most pressing debates. Bringing together 47 leading scholars of election law, the Handbook offers readers a clearly written guide to aid navigation through this complex area, tackling controversial issues and situating them within the field's ongoing scholarly dialogue. Unparalleled in the breadth and depth of its coverage, The Oxford Handbook of American Election Law is an invaluable resource for scholars, students, policymakers, and practitioners.
Statistical agencies, research organizations, companies, and other data stewards that seek to share data with the public face a challenging dilemma. They need to protect the privacy and confidentiality of data subjects and their attributes while providing data products that are useful for their intended purposes. In an age when information on data subjects is available from a wide range of data sources, as are the computational resources to obtain that information, this challenge is increasingly difficult. The Handbook of Sharing Confidential Data helps data stewards understand how tools from the data confidentiality literature—specifically, synthetic data, formal privacy, and secure computation—can be used to manage trade-offs in disclosure risk and data usefulness. Key features: • Provides overviews of the potential and the limitations of synthetic data, differential privacy, and secure computation • Offers an accessible review of methods for implementing differential privacy, both from methodological and practical perspectives • Presents perspectives from both computer science and statistical science for addressing data confidentiality and privacy • Describes genuine applications of synthetic data, formal privacy, and secure computation to help practitioners implement these approaches The handbook is accessible to both researchers and practitioners who work with confidential data. It requires familiarity with basic concepts from probability and data analysis.
This textbook presents the essential tools and core concepts of data science to public officials, policy analysts, and economists among others in order to further their application in the public sector. An expansion of the quantitative economics frameworks presented in policy and business schools, this book emphasizes the process of asking relevant questions to inform public policy. Its techniques and approaches emphasize data-driven practices, beginning with the basic programming paradigms that occupy the majority of an analyst’s time and advancing to the practical applications of statistical learning and machine learning. The text considers two divergent, competing perspectives to support its applications, incorporating techniques from both causal inference and prediction. Additionally, the book includes open-sourced data as well as live code, written in R and presented in notebook form, which readers can use and modify to practice working with data.
Why America's data system is broken, and how to fix it. Why, with data increasingly important, available, valuable and cheap, are the data produced by the American government getting worse and costing more? State and local governments rely on population data from the US Census Bureau; prospective college students and their parents can check data from the National Center for Education Statistics; small businesses can draw on data about employment and wages from the Bureau of Labor Statistics. But often the information they get is out of date or irrelevant, based on surveys--a form of information gathering notorious for low response rates. In A Data Manifesto, Julia Lane argues that bad data is bad for democracy. Her book is a wake-up call to America to fix its broken public data system.
This Handbook intends to inform Data Providers and researchers on how to provide privacy-protected access to, handle, and analyze administrative data, and to link them with existing resources, such as a database of data use agreements (DUA) and templates. Available publicly, the Handbook will provide guidance on data access requirements and procedures, data privacy, data security, property rights, regulations for public data use, data architecture, data use and storage, cost structure and recovery, ethics and privacy-protection, making data accessible for research, and dissemination for restricted access use. The knowledge base will serve as a resource for all researchers looking to work with administrative data and for Data Providers looking to make such data available.
The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power -- certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.