7,484 research outputs found

    processing RESTRICTED DATA and FORMERLY RESTRICTED DATA,

    Get PDF
    1. Purpose. This instruction establishes standard administrative policy fo

    Facilitating Access to Restricted Data

    Get PDF
    The decision to allow users access to restricted and protected data is based on the development of trust in the user by data repositories. In this article, I propose a model of the process of trust development at restricted data repositories, a model which emphasizes the increasing levels of trust dependent on prior interactions between repositories and users. I find that repositories develop trust in their users through the interactions of four dimensions – promissory, experience, competence, and goodwill – that consider distinct types of researcher expertise and the role of a researcher’s reputation in the trust process. However, the processes used by repositories to determine a level of trust corresponding to data access are inconsistent and do not support the sharing of trusted users between repositories to maximize efficient yet secure access to restricted research data. I highlight the role of a researcher’s reputation as an important factor in trust development and trust transference, and discuss the implications of modelling the restricted data access process as a process of trust development

    Addressing Challenges of Restricted Data Access

    Full text link
    Standardizing Data Access, Sharing, and Use Agreements Workshop at Harvard Universityhttp://deepblue.lib.umich.edu/bitstream/2027.42/156407/1/Levenstein Harvard-Microsoft DUA workshop March 2020.pdfDescription of Levenstein Harvard-Microsoft DUA workshop March 2020.pdf : PresentationSEL

    Improved Generalization Guarantees in Restricted Data Models

    Get PDF
    Differential privacy is known to protect against threats to validity incurred due to adaptive, or exploratory, data analysis -- even when the analyst adversarially searches for a statistical estimate that diverges from the true value of the quantity of interest on the underlying population. The cost of this protection is the accuracy loss incurred by differential privacy. In this work, inspired by standard models in the genomics literature, we consider data models in which individuals are represented by a sequence of attributes with the property that where distant attributes are only weakly correlated. We show that, under this assumption, it is possible to "re-use" privacy budget on different portions of the data, significantly improving accuracy without increasing the risk of overfitting.Comment: 13 pages, published in FORC 202

    Thirty Years of Cometary Spectroscopy from McDonald Observatory

    Full text link
    We report on the results of a spectroscopic survey of 130 comets that was conducted at McDonald observatory from 1980 through 2008. Some of the comets were observed on only one night, while others were observed repeatedly. For 20 of these comets, no molecules were detected. For the remaining 110 comets, some emission from CN, OH, NH, C3_{3}, C2_{2}, CH, and NH2_{2} molecules were observed on at least one occasion. We converted the observed molecular column densities to production rates using a Haser (1957) model. We defined a restricted data set of comets that had at least 3 nights of observations. The restricted data set consists of 59 comets. We used ratios of production rates to study the trends in the data. We find two classes of comets: typical and carbon-chain depleted comets. Using a very strict definition of depleted comets, requiring C2_{2} \underline{and} C3_{3} to both be depleted, we find 9% of our restricted data set comets to be depleted. Using a more relaxed definition that requires only C2_{2} to be below a threshold (similar to other researchers), we find 25% of the comets are depleted. Two-thirds of the depleted comets are Jupiter Family comets, while one-third are Long Period comets. 37% of the Jupiter Family comets are depleted, while 18.5% of the Long Period comets are depleted. We compare our results with other studies and find good agreement.Comment: Accepted for Icarus; 15 figures, 9 tables (some multi-page and in landscape mode

    International access to restricted data: A principles-based standards approach

    Get PDF
    Cross-border access to restricted government microdata for research has made relatively little progress. Recent developments are notable as exceptions. This paper argues that the situation is made more complex by the lack of a common general frame of reference for comparing objectives and concerns; this reinforces the risk-aversion in government organisations. Attempts to develop general international data access strategies therefore collapse to sui generis bilateral agreements of limited strategic value. One way forward is to decouple implementation from strategic principles. A principles-based risk-assessment framework, using popular multiple-component data security models, allows decisions about access to focus on objectives; similarly, secure facilities could be developed to standards independent of dataset-specific negotiations. In an international context, proposals for classification systems are easier to agree than specific multilateral implementations. Moreover, a principles-based approach can be aligned with organisational goals, allowing countries to signal strategic intentions to others without the need for explicit commitment. The paper uses examples from the UK, US and cross-European projects to show how such principles-based standards have worked on a within-country basis and may help to resolve immediate practical issues. © 2013 - IOS Press and the authors. All rights reserved

    Distress Dependence and Financial Stability

    Get PDF
    This paper defines a set of systemic financial stability indicators which measure distress dependence among the financial institutions in a system, thereby allowing to analyze stability from three complementary perspectives: common distress in the system, distress between specific banks, and cascade effects associated with a specific bank. Our approach defines the banking system as a portfolio of banks and infers the system’s multivariate density (BSMD) from which the proposed measures are estimated. The BSMD embeds the banks’ default inter-dependence structure that captures linear and non-linear distress dependencies among the banks in the system, and its changes at different times of the economic cycle. The BSMD is recovered using the CIMDO-approach, a new approach that, in the presence of restricted data, improves density specification without explicitly imposing parametric forms that, under restricted data sets, are difficult to model. Thus, the proposed measures can be constructed from a very limited set of publicly available data and can be provided for a wide range of both developing and developed countries.

    Use Cases for Differential Privacy with Tiered Access to Restricted Data

    Full text link
    2020 OpenDP Community Meeting, Use Cases Workshophttp://deepblue.lib.umich.edu/bitstream/2027.42/156408/1/OpenDP Use Cases workshop May 14, 2020.pdfDescription of OpenDP Use Cases workshop May 14, 2020.pdf : PresentationSEL
    corecore