U.S. flag

An official website of the United States government

Skip Header


Using Uncertainty Intervals to Analyze Confidentiality Rules for Magnitude Data in Tables

Written by:
RRS2006-04

Abstract

Protecting the confidentiality of survey respondent data is related to the notion of data user uncertainty in various ways. The source of uncertainty that is most frequently exploited by agencies in formulating protection rules for tabular data is the fact that there is often more than one respondent (e.g., a company) contributing to a given table cell value. Agencies are required to protect these individual contributions. The uncertainty in a data user’s mind about how the published cell value is distributed among the contributions is often sufficient to protect them. This “cell value distributional uncertainty” may be the most exploited source of uncertainty, but it is by no means the only one. Data user uncertainty about respondent contributions is created through many of the procedures involved in the design of a survey and in processing the collected data. It is usually possible to express a given data user’s uncertainty about a particular respondent’s contribution to a particular cell as a finite interval. The interval may be derived from inequalities associated with the table’s additivity or it may be based on “knowledge models” that describe, for example, the data user’s prior (approximate) knowledge of respondent contributions or sampling weights. We call such intervals “uncertainty intervals”. Sometimes the knowledge models may allow a probability distribution to be defined on the uncertainty interval. The major thesis of this paper is that uncertainty intervals can be used as a means of unifying the description of many of these sources of uncertainty. We show how uncertainty intervals can unify the description of several formulas and algorithms that are frequently used during the process of protecting data, e.g., those related to the p% rule, sliding and two-sided protection, cell value rounding, and weights applied to the underlying microdata. In future work, the author hopes to extend this approach to additional sources of uncertainty.

Page Last Revised - October 28, 2021
Is this page helpful?
Thumbs Up Image Yes Thumbs Down Image No
NO THANKS
255 characters maximum 255 characters maximum reached
Thank you for your feedback.
Comments or suggestions?

Top

Back to Header