LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Desai, T.; Ritchie, F.; Welpton, R. (2016)
Publisher: University of the West of England
Languages: English
Types: Research
Subjects:
What is the best way of managing access to sensitive data? This is not a straightforward question, as it involves the interaction of legal, technical, statistical and, above all, human components to produce a solution. This paper introduces a modelling tool designed to simplify and structure such decision-making.\ud The Five Safes model is a popular framework for designing, describing and evaluating access systems for data, used by data providers, data users, and regulators. The model integrates analysis of opportunities, constraints, costs and benefits of different approaches, taking account of the level of data anonymisation, the likely users, the scope for training, the environment through which data are accessed, and the statistical outputs derived from data use.\ud Up to now this model has largely been described indirectly in other papers which have used it as a framing device. This paper focuses specifically on the framework, discusses usage, and demonstrates where it sits with other data and risk management tools. The aim is to provide a practical guide to the effective planning and management of access to research data.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • ASA (2009) Statistical disclosure limitation: balancing data confidentiality and data access. Accessed 13.8.2014. http://slideplayer.us/slide/709029/
    • Bailey M. (2012) “Workshop on security at the Cyberborder”, Security at the Cyberborder Workshop Report, Summaries pp56-60 https://scholarworks.iu.edu/dspace/bitstream/handle/2022/14070/Cyberborder-ReportFinal.pdf
    • Brandt M. (2010) Decentralised Access to EU-Microdata Sets, final report to Eurostat on grant agreement no. 61102.2008.001-2008.828, Eurostat, 2010. http://www.crosportal.eu/sites/default/files//Final%20report%20DA.pdf
    • Brandt M., Franconi L., Guerke C., Hundepool A., Lucarelli M. , Mol J., Ritchie F., Seri G. and Welpton R. (2010) Guidelines for the checking of output based on microdata research, Final report of ESSnet sub-group on output SDC, Eurostat http://neon.vb.cbs.nl/casc/ESSnet/guidelines_on_outputchecking.pdf
    • Bujnowska A. and Museux J-M. (2012) “The Future of Access to European Confidential Data for Scientific Purposes”, Work session on Statistical Data Confidentiality 2011, Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2011/43_Eurostat. pdf
    • Camden M. (2014) "Confidentiality for integrated data” in Work session on statistical data confidentiality 2013; Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2013/Topic_3_NZ.p df
    • Corti L., van den Eyden V., Bishop L., and Woollard M. (2014) Managing and sharing research data: a guide to good practice. London: Sage Publications Ltd
    • Desai T. (2012) “Maximising Returns to Government Investment in Data”, presentation to IASSIST 2012, Vancouver. http://www.iassistdata.org/downloads/2012/2012_f2_desai.pdf
    • Desai T. and Ritchie F. (2010) "Effective researcher management", in Work session on statistical data confidentiality 2009; Eurostat. http://www.unece.org/stats/documents/ece/ces/ge.46/2009/wp.15.e.pdf
    • Eurostat (2014) Treatment of Statistical Confidentiality: Introductory module. Course notes. Eurostat.
    • Eurostat (2016) Confidential data: self-study guide for researchers, forthcoming.
    • Evans, P. and Ritchie, F. (2009) UK Company Statistics Reconciliation Project: final report, Report for the Department of Business Enterprise and Regulatory Reform; URN 09/599
    • Guardian (2015) “Public bodies are releasing confidential personal data by accident, activists say “. Guardian Newspapers Ltd 15th July. http://www.theguardian.com/technology/2015/jul/15/confidential-personal-data-releaseaccident-councils-nhs-police-government
    • Hafner, H.-P. (2008) Die Qualität der Angriffsdatenbank für die Matchingexperimente mit den Daten des KSE-Panels 1999 - 2002. Mimeo. IAB
    • Hafner H-P., Lenz R. and Ritchie F. (2014) CIS Anonymisation: proposed methodological improvements. CIS2010 Anonymisation Report, deliverable D2. Eurostat, April.
    • Hafner H-P., Lenz R. and Ritchie F. (2015) User-focused threat identification for anonymised microdata. Department of Economics working Paper 15/03, Bristol Business School. http://www2.uwe.ac.uk/faculties/BBS/BUS/Research/Economics%20Papers%202015/1503. pdf
    • Hawkins M. (2011) The HMRC data lab, presentation to KAI International Conference on Taxation Analysis & Research, 2 Dec. http://www.esrc.ac.uk/hmrc/images/Session%2012%20The%20HMRC%20Datalab_tcm19- 19599.ppt
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Download from

Cite this article