Already a member?

Sign In

Conference Presentations 2014

  • IASSIST 2014-Aligning Data and Research Infrastructure, Toronto
    Host Institution: University of Toronto, Ryerson University, and York University

3K: Enhancing Restricted Access (Wed, 2014-06-04)
Chair:Amy Pienta

  • Reduced disclosure risk of aging data
    Arne Wolters (UK Data Archives, University of Essex)
    Jo Wathan (University of Manchester)


    This paper argues that, using the UK census data from 1961-1981 as a case study, the age of data limits the availability of matching data, and the disclosure risk through spontaneous recognition. Dissemination of data from which individual identity can be deduced from the data, by themselves or with published information is prohibited under the Statistics and Registration Service Act (SRSA) in the UK, and by similar legislation elsewhere. Disclosure can arise from matching data on common keys, spontaneous recognition of oneself, acquaintances or of those in the spotlight. Disclosure also arises by recognizing identifiable combinations of characteristics known to the intruder. Contributing factors to the reduced disclosure risk are: (i) mortality of data subjects, using the English Life Tables, this paper estimates mortality rates for data subjects in the UK census data; (ii) lack of availability of matching data, by law organisation are limited in time they can keep personal data; (iii) memory loss, forgetting one’s own past, as well as that of other data subject; (iv) churn, the tendency for data to become outdated as circumstances of data subjects change. Arguably, the contributing factors above are independent and their effect on disclosure risk therefore additive.

  • Data archives and the ethics of research data
    Laurence Holton (The London School of Economics and Political Science)
    Katharina Kinder-Kurlanda (GESIS – Leibniz Institute for the Social Sciences)


    In this paper we investigate the effect of different legal requirements and attitudes towards data protection, intellectual property, and ethical review processes and procedures in Germany and the UK to illustrate the divergence in regulation. We especially focus on formal and informal ways of data sharing across disciplines and countries, highlighting paths to ethical and responsible data sharing. Data archives often provide discipline specialized research data management support services. An aspect of support is addressing legal data protection requirements, intellectual property standards, and ethical research practices. Researchers encounter laws concerning data protection and intellectual property throughout the data-lifecycle, but established research practices can clash with new legal frameworks (see debate over the proposed reform of European Union data protection rules). Likewise, changing public attitudes to research and notions of consent can affect conceptions of what constitutes ethical research. Archives can help researchers navigate an environment which simultaneously pushes data sharing, and consideration of the individual’s right to privacy and protection. However, doing so often requires negotiating the gaps and contradictions of different national laws, research cultures, and funding environments.

  • Building a cross border data access system for improved scholarship and policy: the case of the German IAB network of RDCs
    Joerg Heining (Institute for Employment Research (IAB))
    Warren Brown (Cornell University)
    Bill Block (Cornell University)
    Stefan Bender (Institute for Employment Research (IAB))


    The Research Data Centre (FDZ) of the German Federal Employment Agency (BA) at the Institute for Employment Research (IAB) provides data on individuals, households and establishments, as well as data that comprise both establishment and personal information. The FDZ data originate from three different sources. From the notification process of the social security system and the internal procedures of the Federal Employment Agency process-generated data are obtained. Furthermore, the IAB acquires data by conducting own surveys. The use of weakly anonymous data is subject to restrictions concerning data protection legislation. Due to these regulations the data can be analyzed only via on-site use. For this purpose, the FDZ provides separate workplaces for guest researchers in Nuremberg and further locations in Germany and in the USA. As this network of research data centers is built out it is with the expectation that improved access to restricted data managed with a high degree of data security will yield benefits to policy makers as well as to scholars. The benefits and the means for documenting these benefits is a central focus of the paper.

  • Advancing access to restricted data: compliance, regulations, continuous monitoring….Oh my!!
    Janet Heslop (Cornell University, Cornell Institute of Social and Economic Research (CISER))


    In this session I will demonstrate the restricted access research computing infrastructure (CRADC- Cornell Restricted Access Data Center) that CISER (Cornell Institute of Social and Economic Research) has built to serve Cornell social science researchers and their collaborators worldwide. Based upon a local private-cloud service running on state-of-the-art computing systems that provides researchers (individual or teams) an environment where they can perform basic-to-complex highly secure computing tasks. The private-cloud service is accessible via remote access according to the researcher’s data provider agreement. In this presentation I will show how and why CRADC’s clientele continues to grow exponentially; discuss compliancy, regulations and standards based upon a specific data provider agreement; and review the need for continuous monitoring. Topics will additionally provide a description of the infrastructure, the value of shared economies of scale, the straightforward access to restricted data, and the administration/support services required to keep CRADC known as “the gateway to restricted data” at Cornell University.


4L: Panel: Encouraging Access to Confidential Data (Thu, 2014-06-05)
Moderator: Roxanne Silberman

  • Proposed revisions to the "Common Rule" for protection of human subjects
    George Alter (University of Michigan ICPSR)
  • Encouraging access to confidential research data
    Katharina Kinder-Kurlanda (GESIS- Leibniz Institute for the Social Sciences)
    Larence Horton (London School of Economics and Political Science)

4M: Energizing the DDI Standard through Tools (Thu, 2014-06-05)
Moderator: Marcel hebing

  • Introduction to the DDI developers community
    Johan Fihn (Swedish National Data Service (SND))
    Marcel Hebing (DIW Berlin – German Institute for Economic Research)
  • Using the Canard Questionnaire Suite to produce and publish DDI metadata
    Samuel Spenser (Australian Institute of Health and Welfare)
  • A first look on the generic DDI-L version of the Rogatus Survey/Case Management System
    Ingo Barkow (DIPF/TBA21)
  • Updates on the XSLT stylesheets for DDI
    Johan Fihn (Swedish National Data Service (SND))
    Olof Olsson (Swedish National Data Service (SND))
    Jannik Jensen (Danish Data Archive)
    Akira Olsbanning (Swedish National Data Service (SND))
  • IASSIST Quarterly

    Publications Special issue: A pioneer data librarian
    Welcome to the special volume of the IASSIST Quarterly (IQ (37):1-4, 2013). This special issue started as exchange of ideas between Libbie Stephenson and Margaret Adams to collect


  • Resources


    A space for IASSIST members to share professional resources useful to them in their daily work. Also the IASSIST Jobs Repository for an archive of data-related position descriptions. more...

  • community

    • LinkedIn
    • Facebook
    • Twitter

    Find out what IASSISTers are doing in the field and explore other avenues of presentation, communication and discussion via social networking and related online social spaces. more...