Anonymisation and the Five Safes
Duration: 23 mins 12 secs
Share this media item:
Embed this media item:
Embed this media item:
About this item
Description: |
O'Keefe, C (CSIRO)
Monday 5th December 2016 - 11:10 to 11:40 |
---|
Created: | 2016-12-13 11:47 |
---|---|
Collection: | Newton Gateway to Mathematics |
Publisher: | Isaac Newton Institute |
Copyright: | O'Keefe, C |
Language: | eng (English) |
Distribution: | World (downloadable) |
Explicit content: | No |
Aspect Ratio: | 16:9 |
Screencast: | No |
Bumper: | UCS Default |
Trailer: | UCS Default |
Abstract: | Agencies and organisations around the world are increasingly seeking to realise the value embodied in their growing data holdings, including by making data available for research and policy analysis. While care is being taken to protect confidentiality in such data releases, there have been some high profile instances of access to some publicly-released data being terminated due to re-identifications or risks of re-identification. In the face of current drivers such as amazing expansion in data use scenarios, as well as growing public concern for privacy, there is a critical need for increased sophistication in planning and describing confidentiality protection. One such approach is the Five Safes framework. |
---|
Available Formats
Format | Quality | Bitrate | Size | |||
---|---|---|---|---|---|---|
MPEG-4 Video | 640x360 | 1.94 Mbits/sec | 337.60 MB | View | Download | |
WebM | 640x360 | 517.86 kbits/sec | 88.00 MB | View | Download | |
iPod Video | 480x270 | 522.01 kbits/sec | 88.70 MB | View | Download | |
MP3 | 44100 Hz | 249.78 kbits/sec | 42.47 MB | Listen | Download | |
Auto * | (Allows browser to choose a format it supports) |