113
Views
0
CrossRef citations to date
0
Altmetric
General

Differentially Private Methods for Releasing Results of Stability Analyses

ORCID Icon & ORCID Icon
Pages 180-191 | Received 15 Nov 2022, Accepted 19 Aug 2023, Published online: 27 Sep 2023

References

  • Amitai, G., and Reiter, J. (2018), “Differentially Private Posterior Summaries for Linear Regression Coefficients,” Journal of Privacy and Confidentiality, 8. DOI: 10.29012/jpc.683.
  • Baggerley, K. R., and Coombes, K. A. (2009), “Deriving Chemosensitvity from Cell Lines: Forensic Bioinformatics and Reproducible Research in High-Throughput Biology,” Annals of Applied Statistics, 3, 1309–1334.
  • Barrientos, A. F., Bolton, A., Balmat, T., Reiter, J. P., de Figueiredo, J. M., Machanavajjhala, A., Chen, Y., Kneifel, C., and DeLong, M. (2018), “Providing Access to Confidential Research Data Through Synthesis and Verification: An Application to Data on Employees of the U.S. Federal Government,” The Annals of Applied Statistics, 12, 1124–1156. DOI: 10.1214/18-AOAS1194.
  • Barrientos, A. F., Reiter, J. P., Machanavajjhala, A., and Chen, Y. (2019), “Differentially Private Significance Tests for Regression Coefficients,” Journal of Computational and Graphical Statistics, 28, 440–453. DOI: 10.1080/10618600.2018.1538881.
  • Barrientos, A. F., Williams, A. R., Snoke, J., and Bowen, C. M. (2022), “A Feasibility Study of Differentially Private Summary Statistics and Regression Analyses for Administrative Tax Data,” https://arxiv.org/pdf/2110.12055.pdf.
  • Bettis, R. A., Helfat, C. E., and Shaver, J. M. (2016), “The Necessity, Logic, and Forms of Replication,” Strategic Management Journal, 37, 2193–2203. DOI: 10.1002/smj.2580.
  • Duvendack, M., Palmer-Jones, R. W., and Reed, W. R. (2015), “Replications in Economics: A Progress Report,” Econ Journal Watch, 12, 164–191.
  • Dwork, C., and Roth, A. (2014), “The Algorithmic Foundations of Differential Privacy,” Foundations and Trends in Theoretical Computer Science (Vol. 9), pp. 211–407, Delft: Now Publishers. DOI: 10.1561/0400000042.
  • Dwork, C., and Ullman, J. (2018), “The Fienberg Problem: How to Allow Human Interactive Data Analysis in the Age of Differential Privacy,” Journal of Privacy and Confidentiality, 8. DOI: 10.29012/jpc.687.
  • Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006), “Calibrating Noise to Sensitivity in Private Data Analysis,” in Theory of Cryptography Conference (TCC 2006), eds. S. Halevi and T. Rabin, pp. 265–284, Berlin: Springer.
  • Freese, J., and Peterson, D. (2017), “Replication in Social Science,” Annual Review of Sociology, 43, 147–165. DOI: 10.1146/annurev-soc-060116-053450.
  • Freese, J., and Powell, B. (2001), “Making Love Out of Nothing at All? Null Findings and the Trivers-Willard Hypothesis,” American Journal of Sociology, 106, 1776–1788. DOI: 10.1086/321304.
  • Haan, K. (2023), “Average Salary by Age in 2023,” Forbes Magazine. Available at https://www.forbes.com/advisor/business/average-salary-by-age/.
  • Hawes, M. B. (2020), “Implementing Differential Privacy: Seven Lessons from the 2020 United States Census,” Harvard Data Science Review, 2. https://hdsr.mitpress.mit.edu/pub/dgg03vo6.
  • Hoeppner, S. (2019), “A Note on Replication Analysis,” International Review of Law and Economics, 59, 98–102. DOI: 10.1016/j.irle.2019.05.004.
  • Kanazawa, S. (2001), “Comment: Why We Love Our Children,” American Journal of Sociology, 106, 1761–1776. DOI: 10.1086/321305.
  • Karr, A. F., Kohnen, C. N., Oganian, A., Reiter, J. P., and Sanil, A. P. (2006), “A Framework for Evaluating the Utility of Data Altered to Protect Confidentiality,” The American Statistician, 60, 224–232. DOI: 10.1198/000313006X124640.
  • Knol, M. J., Pestman, W. R., and Grobbee, D. E. (2011), “The (mis)use of Overlap of Confidence Intervals to Assess Effect Modification,” European Journal of Epidemiology, 26, 253–254. DOI: 10.1007/s10654-011-9563-8.
  • Maghsoodloo, S., and Huang, C.-Y. (2010), “Comparing the Overlapping of Two Independent Confidence Intervals with a Single Confidence Interval for Two Normal Population Parameters,” Journal of Statistical Planning and Inference, 140, 3295–3305. DOI: 10.1016/j.jspi.2010.04.057.
  • McClure, D. R., and Reiter, J. P. (2012), “Towards Providing Automated Feedback on the Quality of Inferences from Synthetic Datasets,” Journal of Privacy and Confidentiality, 4. DOI: 10.29012/jpc.v4i1.616.
  • Nissim, K., Raskhodnikova, S., and Smith, A. (2007), “Smooth Sensitivity and Sampling in Private Data Analysis,” in Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75–84. DOI: 10.1145/1250790.1250803.
  • Pollet, T. V., and Nettle, D. (2010), “No Evidence for the Generalized Trivers-Willard Hypothesis from British and Rural Guatemalan Data,” Journal of Evolutionary Psychology, 8, 57–74. DOI: 10.1556/JEP.8.2010.1.5.
  • Raghunathan, T. E., Reiter, J. P., and Rubin, D. B. (2003), “Multiple Imputation for Statistical Disclosure Limitation,” Journal of Official Statistics, 19, 1–16.
  • Steegen, S., Tuerlinckx, F., Gelman, A., and Vanpaemel, W. (2016), “Increasing Transparency through a Multiverse Analysis,” Perspectives on Psychological Science, 11, 702–712. DOI: 10.1177/1745691616658637.
  • Steven, R., Sarah, F., Matthew, S., Danika, B., Grace, C., Stephanie, R., and Megan, S. (2023), “Ipums usa: Version 13.0 [dataset],” Minneapolis, MN: IPUMS. DOI: 10.18128/D010.V13.0.
  • Wheeler, M. W., Park, R. M., and Bailer, A. J. (2006), “Comparing Median Lethal Concentration Values Using Confidence Interval Overlap or Ratio Tests,” Environmental Toxicology and Chemistry: An International Journal, 25, 1441–1444. DOI: 10.1897/05-320r.1.
  • Yang, C. (2022), “A Differentially Private Bayesian Approach to Replication Analysis,” MS thesis, Department of Statistical Science, Duke University.
  • Yu, B., and Kumbier, K. (2020), “Veridical Data Science,” Proceedings of the National Academy of Sciences, 117, 3920–3929. DOI: 10.1073/pnas.1901326117.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.