Proceedings of the 1985 Public Health Conference on Records and Statistics
Author:
Publisher:
Published: 1986
Total Pages: 538
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author:
Publisher:
Published: 1986
Total Pages: 538
ISBN-13:
DOWNLOAD EBOOKAuthor: National Center for Health Statistics (U.S.)
Publisher:
Published: 1980
Total Pages: 40
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1987-05
Total Pages: 1338
ISBN-13:
DOWNLOAD EBOOKAuthor: United States. Congress. House. Select Committee on Aging. Subcommittee on Retirement Income and Employment
Publisher:
Published: 1987
Total Pages: 116
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1989
Total Pages: 498
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1984
Total Pages: 1246
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1985
Total Pages: 540
ISBN-13:
DOWNLOAD EBOOKAuthor: National Library of Medicine (U.S.)
Publisher:
Published:
Total Pages: 1000
ISBN-13:
DOWNLOAD EBOOKAuthor: George T. Duncan
Publisher: Springer Science & Business Media
Published: 2011-03-22
Total Pages: 205
ISBN-13: 144197802X
DOWNLOAD EBOOKBecause statistical confidentiality embraces the responsibility for both protecting data and ensuring its beneficial use for statistical purposes, those working with personal and proprietary data can benefit from the principles and practices this book presents. Researchers can understand why an agency holding statistical data does not respond well to the demand, “Just give me the data; I’m only going to do good things with it.” Statisticians can incorporate the requirements of statistical confidentiality into their methodologies for data collection and analysis. Data stewards, caught between those eager for data and those who worry about confidentiality, can use the tools of statistical confidentiality toward satisfying both groups. The eight chapters lay out the dilemma of data stewardship organizations (such as statistical agencies) in resolving the tension between protecting data from snoopers while providing data to legitimate users, explain disclosure risk and explore the types of attack that a data snooper might mount, present the methods of disclosure risk assessment, give techniques for statistical disclosure limitation of both tabular data and microdata, identify measures of the impact of disclosure limitation on data utility, provide restricted access methods as administrative procedures for disclosure control, and finally explore the future of statistical confidentiality.