IDEAS home Printed from https://ideas.repec.org/p/ehl/lserod/39112.html
   My bibliography  Save this paper

Assessing identification risk in survey microdata using log-linear models

Author

Listed:
  • Skinner, Chris J.
  • Shlomo, Natalie

Abstract

This article considers the assessment of the risk of identification of respondents in survey microdata, in the context of applications at the United Kingdom (UK) Office for National Statistics (ONS). The threat comes from the matching of categorical “key“ variables between microdata records and external data sources and from the use of log-linear models to facilitate matching. While the potential use of such statistical models is well established in the literature, little consideration has been given to model specification or to the sensitivity of risk assessment to this specification. In numerical work not reported here, we have found that standard techniques for selecting log-linear models, such as chi-squared goodness-of-fit tests, provide little guidance regarding the accuracy of risk estimation for the very sparse tables generated by typical applications at ONS, for example, tables with millions of cells formed by cross-classifying six key variables, with sample sizes of 10 or 100,000. In this article we develop new criteria for assessing the specification of a log-linear model in relation to the accuracy of risk estimates. We find that, within a class of “reasonable“ models, risk estimates tend to decrease as the complexity of the model increases. We develop criteria that detect “underfitting“ (associated with overestimation of the risk). The criteria may also reveal “overfitting“ (associated with underestimation) although not so clearly, so we suggest employing a forward model selection approach. Our criteria turn out to be related to established methods of testing for overdispersion in Poisson log-linear models. We show how our approach may be used for both file-level and record-level measures of risk. We evaluate the proposed procedures using samples drawn from the 2001 UK Census where the true risks can be determined and show that a forward selection approach leads to good risk estimates. There are several “good“ models between which our approach provides little discrimination. The risk estimates are found to be stable across these models, implying a form of robustness. We also apply our approach to a large survey dataset. There is no indication that increasing the sample size necessarily leads to the selection of a more complex model. The risk estimates for this application display more variation but suggest a suitable upper bound.

Suggested Citation

  • Skinner, Chris J. & Shlomo, Natalie, 2008. "Assessing identification risk in survey microdata using log-linear models," LSE Research Online Documents on Economics 39112, London School of Economics and Political Science, LSE Library.
  • Handle: RePEc:ehl:lserod:39112
    as

    Download full text from publisher

    File URL: http://eprints.lse.ac.uk/39112/
    File Function: Open access version.
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Angela Dale & Mark Elliot, 2001. "Proposals for 2001 samples of anonymized records: An assessment of disclosure risk," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 164(3), pages 427-447.
    2. Duncan, George & Lambert, Diane, 1989. "The Risk of Disclosure for Microdata," Journal of Business & Economic Statistics, American Statistical Association, vol. 7(2), pages 207-217, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Iwona Bąk & Katarzyna Cheba, 2022. "Green Transformation: Applying Statistical Data Analysis to a Systematic Literature Review," Energies, MDPI, vol. 16(1), pages 1-22, December.
    2. Drechsler, Jörg & Reiter, Jerome P., 2011. "An empirical evaluation of easily implemented, nonparametric methods for generating synthetic datasets," Computational Statistics & Data Analysis, Elsevier, vol. 55(12), pages 3232-3243, December.
    3. Cinzia Carota & Maurizio Filippone & Silvia Polettini, 2022. "Assessing Bayesian Semi‐Parametric Log‐Linear Models: An Application to Disclosure Risk Estimation," International Statistical Review, International Statistical Institute, vol. 90(1), pages 165-183, April.
    4. Eurosystem Household Finance and Consumption Network, 2013. "The Eurosystem Household Finance and Consumption Survey - Methodological report," Statistics Paper Series 1, European Central Bank.
    5. Chipperfield James O., 2014. "Disclosure-Protected Inference with Linked Microdata Using a Remote Analysis Server," Journal of Official Statistics, Sciendo, vol. 30(1), pages 123-146, March.
    6. Shlomo, Natalie & Skinner, Chris, 2022. "Measuring risk of re-identification in microdata: state-of-the art and new directions," LSE Research Online Documents on Economics 117168, London School of Economics and Political Science, LSE Library.
    7. James Jackson & Robin Mitra & Brian Francis & Iain Dove, 2022. "Using saturated count models for user‐friendly synthesis of large confidential administrative databases," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1613-1643, October.
    8. Sergio I. Prada & Claudia González-Martínez & Joshua Borton & Johannes Fernandes-Huessy & Craig Holden & Elizabeth Hair & and Tim Mulcahy, 2011. "Avoiding Disclosure of Individually Identifiable Health Information," SAGE Open, , vol. 1(3), pages 21582440114, October.
    9. Prada, Sergio I & Gonzalez, Claudia & Borton, Joshua & Fernandes-Huessy, Johannes & Holden, Craig & Hair, Elizabeth & Mulcahy, Tim, 2011. "Avoiding disclosure of individually identifiable health information: a literature review," MPRA Paper 35463, University Library of Munich, Germany.
    10. Favaro, Stefano & Panero, Francesca & Rigon, Tommaso, 2021. "Bayesian nonparametric disclosure risk assessment," LSE Research Online Documents on Economics 117305, London School of Economics and Political Science, LSE Library.
    11. Christine M. O'Keefe & James O. Chipperfield, 2013. "A Summary of Attack Methods and Confidentiality Protection Measures for Fully Automated Remote Analysis Systems," International Statistical Review, International Statistical Institute, vol. 81(3), pages 426-455, December.
    12. Krenzke Tom & Gentleman Jane F. & Li Jianzhu & Moriarity Chris, 2013. "Addressing Disclosure Concerns and Analysis Demands in a Real-Time Online Analytic System," Journal of Official Statistics, Sciendo, vol. 29(1), pages 99-124, March.
    13. Li‐Chun Zhang & Gustav Haraldsen, 2022. "Secure big data collection and processing: Framework, means and opportunities," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1541-1559, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Skinner, Chris J., 2007. "The probability of identification: applying ideas from forensic statistics to disclosure risk assessment," LSE Research Online Documents on Economics 39105, London School of Economics and Political Science, LSE Library.
    2. C. J. Skinner, 2007. "The probability of identification: applying ideas from forensic statistics to disclosure risk assessment," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 170(1), pages 195-212, January.
    3. Xiao-Bai Li & Jialun Qin, 2017. "Anonymizing and Sharing Medical Text Records," Information Systems Research, INFORMS, vol. 28(2), pages 332-352, June.
    4. Shlomo, Natalie & Skinner, Chris J., 2010. "Assessing the protection provided by misclassification-based disclosure limitation methods for survey microdata," LSE Research Online Documents on Economics 39119, London School of Economics and Political Science, LSE Library.
    5. Natalie Shlomo & Chris Skinner, 2022. "Measuring risk of re‐identification in microdata: State‐of‐the art and new directions," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1644-1662, October.
    6. Sumit Dutta Chowdhury & George T. Duncan & Ramayya Krishnan & Stephen F. Roehrig & Sumitra Mukherjee, 1999. "Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators," Management Science, INFORMS, vol. 45(12), pages 1710-1723, December.
    7. Braathen, Christian & Thorsen, Inge & Ubøe, Jan, 2022. "Adjusting for Cell Suppression in Commuting Trip Data," Discussion Papers 2022/13, Norwegian School of Economics, Department of Business and Management Science.
    8. Gilboa-Freedman, Gail & Smorodinsky, Rann, 2020. "On the properties that characterize privacy," Mathematical Social Sciences, Elsevier, vol. 103(C), pages 59-68.
    9. James Jackson & Robin Mitra & Brian Francis & Iain Dove, 2022. "Using saturated count models for user‐friendly synthesis of large confidential administrative databases," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1613-1643, October.
    10. Shaobo Li & Matthew J. Schneider & Yan Yu & Sachin Gupta, 2023. "Reidentification Risk in Panel Data: Protecting for k -Anonymity," Information Systems Research, INFORMS, vol. 34(3), pages 1066-1088, September.
    11. Kingsley Purdam & Mark Elliot, 2007. "A Case Study of the Impact of Statistical Disclosure Control on Data Quality in the Individual UK Samples of Anonymised Records," Environment and Planning A, , vol. 39(5), pages 1101-1118, May.
    12. George Kokolakis & Dimitris Fouskakis, 2008. "On the Discrepancy Measures for the Optimal Equal Probability Partitioning in Bayesian Multivariate Micro-Aggregation," Journal of Classification, Springer;The Classification Society, vol. 25(2), pages 209-224, November.
    13. Kokolakis, G. & Fouskakis, D., 2009. "Importance partitioning in micro-aggregation," Computational Statistics & Data Analysis, Elsevier, vol. 53(7), pages 2439-2445, May.
    14. Christine M. O'Keefe & James O. Chipperfield, 2013. "A Summary of Attack Methods and Confidentiality Protection Measures for Fully Automated Remote Analysis Systems," International Statistical Review, International Statistical Institute, vol. 81(3), pages 426-455, December.
    15. Xiao-Bai Li & Sumit Sarkar, 2013. "Class-Restricted Clustering and Microperturbation for Data Privacy," Management Science, INFORMS, vol. 59(4), pages 796-812, April.
    16. Xiao-Bai Li & Sumit Sarkar, 2006. "Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data," Information Systems Research, INFORMS, vol. 17(3), pages 254-270, September.
    17. S F Roehrig & R Padman & R Krishnan & G T Duncan, 2011. "Exact and heuristic methods for cell suppression in multi-dimensional linked tables," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(2), pages 291-304, February.
    18. Loong Bronwyn & Rubin Donald B., 2017. "Multiply-Imputed Synthetic Data: Advice to the Imputer," Journal of Official Statistics, Sciendo, vol. 33(4), pages 1005-1019, December.
    19. Tapan K. Nayak & Samson A. Adeshiyan, 2016. "On Invariant Post-randomization for Statistical Disclosure Control," International Statistical Review, International Statistical Institute, vol. 84(1), pages 26-42, April.
    20. Walter Mãœller & Uwe Blien & Heike Wirth, 1995. "Identification Risks of Microdata," Sociological Methods & Research, , vol. 24(2), pages 131-157, November.

    More about this item

    JEL classification:

    • C1 - Mathematical and Quantitative Methods - - Econometric and Statistical Methods and Methodology: General

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ehl:lserod:39112. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: LSERO Manager (email available below). General contact details of provider: https://edirc.repec.org/data/lsepsuk.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.