7,484 research outputs found
processing RESTRICTED DATA and FORMERLY RESTRICTED DATA,
1. Purpose. This instruction establishes standard administrative policy fo
Facilitating Access to Restricted Data
The decision to allow users access to restricted and protected data is based on the development of trust in the user by data repositories. In this article, I propose a model of the process of trust development at restricted data repositories, a model which emphasizes the increasing levels of trust dependent on prior interactions between repositories and users. I find that repositories develop trust in their users through the interactions of four dimensions – promissory, experience, competence, and goodwill – that consider distinct types of researcher expertise and the role of a researcher’s reputation in the trust process. However, the processes used by repositories to determine a level of trust corresponding to data access are inconsistent and do not support the sharing of trusted users between repositories to maximize efficient yet secure access to restricted research data. I highlight the role of a researcher’s reputation as an important factor in trust development and trust transference, and discuss the implications of modelling the restricted data access process as a process of trust development
Addressing Challenges of Restricted Data Access
Standardizing Data Access, Sharing, and Use Agreements Workshop at Harvard Universityhttp://deepblue.lib.umich.edu/bitstream/2027.42/156407/1/Levenstein Harvard-Microsoft DUA workshop March 2020.pdfDescription of Levenstein Harvard-Microsoft DUA workshop March 2020.pdf : PresentationSEL
Improved Generalization Guarantees in Restricted Data Models
Differential privacy is known to protect against threats to validity incurred
due to adaptive, or exploratory, data analysis -- even when the analyst
adversarially searches for a statistical estimate that diverges from the true
value of the quantity of interest on the underlying population. The cost of
this protection is the accuracy loss incurred by differential privacy. In this
work, inspired by standard models in the genomics literature, we consider data
models in which individuals are represented by a sequence of attributes with
the property that where distant attributes are only weakly correlated. We show
that, under this assumption, it is possible to "re-use" privacy budget on
different portions of the data, significantly improving accuracy without
increasing the risk of overfitting.Comment: 13 pages, published in FORC 202
Thirty Years of Cometary Spectroscopy from McDonald Observatory
We report on the results of a spectroscopic survey of 130 comets that was
conducted at McDonald observatory from 1980 through 2008. Some of the comets
were observed on only one night, while others were observed repeatedly. For 20
of these comets, no molecules were detected. For the remaining 110 comets, some
emission from CN, OH, NH, C, C, CH, and NH molecules were
observed on at least one occasion. We converted the observed molecular column
densities to production rates using a Haser (1957) model. We defined a
restricted data set of comets that had at least 3 nights of observations. The
restricted data set consists of 59 comets. We used ratios of production rates
to study the trends in the data. We find two classes of comets: typical and
carbon-chain depleted comets. Using a very strict definition of depleted
comets, requiring C \underline{and} C to both be depleted, we find
9% of our restricted data set comets to be depleted. Using a more relaxed
definition that requires only C to be below a threshold (similar to other
researchers), we find 25% of the comets are depleted. Two-thirds of the
depleted comets are Jupiter Family comets, while one-third are Long Period
comets. 37% of the Jupiter Family comets are depleted, while 18.5% of the Long
Period comets are depleted. We compare our results with other studies and find
good agreement.Comment: Accepted for Icarus; 15 figures, 9 tables (some multi-page and in
landscape mode
International access to restricted data: A principles-based standards approach
Cross-border access to restricted government microdata for research has made relatively little progress. Recent developments are notable as exceptions. This paper argues that the situation is made more complex by the lack of a common general frame of reference for comparing objectives and concerns; this reinforces the risk-aversion in government organisations. Attempts to develop general international data access strategies therefore collapse to sui generis bilateral agreements of limited strategic value. One way forward is to decouple implementation from strategic principles. A principles-based risk-assessment framework, using popular multiple-component data security models, allows decisions about access to focus on objectives; similarly, secure facilities could be developed to standards independent of dataset-specific negotiations. In an international context, proposals for classification systems are easier to agree than specific multilateral implementations. Moreover, a principles-based approach can be aligned with organisational goals, allowing countries to signal strategic intentions to others without the need for explicit commitment. The paper uses examples from the UK, US and cross-European projects to show how such principles-based standards have worked on a within-country basis and may help to resolve immediate practical issues. © 2013 - IOS Press and the authors. All rights reserved
Distress Dependence and Financial Stability
This paper defines a set of systemic financial stability indicators which measure distress dependence among the financial institutions in a system, thereby allowing to analyze stability from three complementary perspectives: common distress in the system, distress between specific banks, and cascade effects associated with a specific bank. Our approach defines the banking system as a portfolio of banks and infers the system’s multivariate density (BSMD) from which the proposed measures are estimated. The BSMD embeds the banks’ default inter-dependence structure that captures linear and non-linear distress dependencies among the banks in the system, and its changes at different times of the economic cycle. The BSMD is recovered using the CIMDO-approach, a new approach that, in the presence of restricted data, improves density specification without explicitly imposing parametric forms that, under restricted data sets, are difficult to model. Thus, the proposed measures can be constructed from a very limited set of publicly available data and can be provided for a wide range of both developing and developed countries.
Use Cases for Differential Privacy with Tiered Access to Restricted Data
2020 OpenDP Community Meeting, Use Cases Workshophttp://deepblue.lib.umich.edu/bitstream/2027.42/156408/1/OpenDP Use Cases workshop May 14, 2020.pdfDescription of OpenDP Use Cases workshop May 14, 2020.pdf : PresentationSEL
- …