1 / 7

SuperSTAR functionality allows its users

With respect to the publication on the Internet non-personal micro databases of All-Russia Population Censuses of 2002 and 2010. SuperSTAR functionality allows its users.

Download Presentation

SuperSTAR functionality allows its users

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. With respect to the publication on the Internet non-personal micro databases of All-Russia Population Censuses of 2002 and 2010

  2. SuperSTAR functionality allows its users • to work out a discretionary table layout regarding any measures of the program of the All-Russia Population Census of 2010; • to form the results of the census form concerning any territorial units, including human settlements; • to generate data tables of the All-Russia Population Census of 2010 in comparison with the results of the All-Russia Population Census of 2002; • to form inquiries with overlapping features of various objects (e.g. households and dwellings, individuals and households, etc.); • to provide the data in the form of tables and graphs; • to export the generated table in MS Excel, xml or csv formats; and diagrams in png or pdf.

  3. Types of providing information Arbitrary tables Diagrams

  4. Methods of protection of confidential data on population, applied by various statistical services Supressing Generalization Obfuscation (perturbation) withholding of information by replacing the reported values ​​with some other safe value. It uses a random rounding (perturbation) or controlled adjustment of the table the most vulnerable / closed values ​​are not included in the report and replaced with another character suppression of some of the values by including only the most common values ​​in a report (for example, the data only up to the level of the Russian Federation without the specification up to the level of the village)

  5. PROTECTION OF PERSONAL DATA In Rosstat • blocking access to the primary data • concealment of information, on which the respondent can be identified, in the tables Example of a table formed without the application of algorithms of personal data protection (conventional data) Example of a table formed with the application of the algorithms of personal data protection (conventional data)

  6. An example of table “A Husband’s and Wife's Ages”

  7. Thank you for your attention!

More Related