Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Safe Sharing For Sensitive Data, Kristi Thompson
Safe Sharing For Sensitive Data, Kristi Thompson
Western Libraries Presentations
This workshop focused on the question of when and how human subjects' data can be safely shared. It introduced the basics of data anonymization and discussed how to tell if a dataset has been de-identified. Case studies of successful anonymization and some spectacular failures were shared
Getting Started Analyzing Data In Spss, Kristi Thompson
Getting Started Analyzing Data In Spss, Kristi Thompson
Western Libraries Presentations
SPSS is a popular package for analyzing data. This session will discuss how to get started on a simple quantitative analysis project using SPSS. Topics covered will include getting summary statistics, creating and modifying variables, creating graphs, running simple analyses, and interpreting SPSS output.
The Mathematics Of Risk: An Introduction To Guaranteed Data De-Identification, Kristi Thompson
The Mathematics Of Risk: An Introduction To Guaranteed Data De-Identification, Kristi Thompson
Western Libraries Presentations
This webinar is devoted to the mathematical and theoretical underpinnings of guaranteed data anonymization. Topics covered include an overview of identifiers and quasi-identifiers, an introduction to k-anonymity, a look at some cases where k-anonymity breaks down, and anonymization hierarchies. The presenter will describe a method to assess a survey dataset for anonymization using standard statistical software and consider the question of "anonymization overkill". Much of the academic material looking at data anonymization is quite abstract and aimed at computer scientists, while material aimed at data curators does not always consider recent developments. This webinar is intended to help bridge the …