Welcome to the Handbook
About Us
About the Editors
About J-PAL
Foreword
1
Introduction
1.1
The Potential of Administrative Data for Research and Policymaking
1.2
Why is the Analysis of Administrative Data Still Relatively Rare?
1.3
This Handbook
1.4
Further Reading
I Special Topics
2
Physically Protecting Sensitive Data
2.1
Introduction
2.2
Types of Security Threats
2.3
Technical Features of Data Access Mechanisms
2.4
Typical Access Mechanisms
2.5
Five Aspects of Data Access Mechanisms
2.6
Specific Data Access Mechanisms Along the Five Aspects
2.7
Guidance for Data Providers and Researchers
About the Authors
3
Model Data Use Agreements: A Practical Guide
3.1
Overview
3.2
Negotiating the Data Use Request
3.3
Compliance
3.4
Summary
About the Author
Appendix
4
Collaborating with the Institutional Review Board (IRB)
4.1
Introduction
4.2
What is the IRB
4.3
IRBs and International Research
4.4
What an IRB Does Not Do
4.5
What the IRB Will Do to Ensure the Protection of Participants
4.6
Considerations of the IRB
4.7
Strategies for Communicating With the IRB
About the Author
Appendix
5
Balancing Privacy and Data Usability: An Overview of Disclosure Avoidance Methods
5.1
Purpose of Statistical Disclosure Limitation Methods: Definitions and Context
5.2
Methods
5.3
Metrics
5.4
Tools
5.5
Conclusion
About the Authors
Acknowledgements
Disclaimer
6
Designing Access with Differential Privacy
II Case Studies
7
Institute for Employment Research, Germany: Access to Administrative Labor Market Data for International Researchers
7.1
Summary
7.2
Introduction
7.3
Making Data Usable for Research
7.4
Legal and Institutional Framework
7.5
Protection of Sensitive and Personal Data: The Five Safes Framework
7.6
Data Life Cycle and Replicability
7.7
Sustainability and Continued Success
About the Authors
8
Ohio and the Longitudinal Data Archive: Developing Mutually Beneficial Partnerships Between State Government and the Research Community
8.1
Summary
8.2
Introduction
8.3
Making Data Usable for Research
8.4
Legal and Institutional Framework
8.5
Protection of Sensitive and Personal Data: The Five Safes Framework
8.6
Data Life Cycle and Reproducibility
8.7
Sustainability and Continued Success
About the Author
Appendix
9
New Brunswick Institute for Research, Data and Training, University of New Brunswick: A Ten-Year Partnership Between Government and Academia - the Establishment of NB-IRDT
9.1
Summary
9.2
Introduction
9.3
Making Data Usable for Research (#nbirdt-making)
9.4
Legal and Institutional Framework (#nbirdt-framework)
9.5
Legal Framework for Granting Data Access
9.6
Protection of Sensitive and Personal Data: The Five Safes Framework
9.7
Data Life Cycle and Replicability
9.8
Sustainability and Continued Success
About the Authors
10
The Private Capital Research Institute: Making Private Data Accessible in an Opaque Industry
10.1
Summary
10.2
Introduction
10.3
Making Data Useable for Research
10.4
Legal and Institutional Framework
10.5
Protection of Sensitive and Personal Data: The Five Safes Framework
10.6
Data Life Cycle and Replicability
10.7
Sustainability and Continued Success
About the Authors
Acknowledgements
Appendix
11
Aurora Health Care: Using Electronic Medical Records for a Randomized Evaluation of Clinical Decision Support
11.1
Summary
11.2
Introduction
11.3
Legal and Institutional Framework
11.4
Making Data Usable for Research
11.5
Protection of Sensitive and Personal Data: The Five Safes Framework
11.6
Data Life Cycle and Replicability
11.7
Sustainability and Continued Success
About the Authors
Acknowledgements
Appendix
12
The Stanford-SFUSD Partnership: Development of Data-Sharing Structures and Processes
12.1
Summary
12.2
Introduction
12.3
Making Data Usable for Research
12.4
Legal and Institutional Framework
12.5
Protection of Sensitive and Personal Data: The Five Safes Framework
12.6
Data Life Cycle and Replicability
12.7
Sustainability and Continued Success
12.8
Concluding Remarks
About the Authors
Appendix
13
City of Cape Town, South Africa: Aligning Internal Data Capabilities with External Research Partnerships
13.1
Summary
13.2
Introduction
13.3
Making Data Usable for Research
13.4
Legal and Institutional Framework
13.5
Protection of Sensitive and Personal Data: The Five Safes Framework
13.6
Data Life Cycle and Reproducibility
13.7
Sustainability and Continued Success
13.8
Concluding Remarks
Supplemental Materials
About the Authors
Acknowledgements
Appendix
14
Administrative Data in Research at the World Bank: The Case of Development Impact Evaluation (DIME)
14.1
Summary
14.2
Introduction
14.3
Making Data Usable for Research
14.4
Legal and Institutional Framework
14.5
Protection of Sensitive and Personal Data: The Five Safes Framework
14.6
Data Life Cycle and Replicability
14.7
Sustainability and Continued Success
14.8
Concluding Remarks
About the Authors
15
The Use of Administrative Data at the International Monetary Fund
15.1
Summary
15.2
Introduction
15.3
Legal Framework
15.4
Making Data Usable
15.5
Protection of Sensitive and Personal Data: The Five Safes Framework
15.6
Sustainability and Continued Success
15.7
Concluding Remarks
About the Authors
16
Using Administrative Data to Improve Social Protection in Indonesia
16.1
Summary
16.2
The Use of Administrative Data to Implement and Monitor Experimental Treatments
16.3
Using Administrative Data to Measure Outcomes
16.4
Studying the Collection of Administrative Data Itself
16.5
Concluding Remarks
About the Authors
Acknowledgements
Appendix
Evolution of the Handbook and Contributing
Availability
Contributions
Content, Format, and Style Guidelines
Versioning
Case Study Template
Acknowledgements
Third-party Licenses
Fontawesome
Trademarks
References
©️ 2020 Cole, Dhaliwal, Sautmann, Vilhuber
Individual chapters ©️ by their authors.
CC-BY-NC
Handbook on Using Administrative Data for Research and Evidence-based Policy
Foreword
Forthcoming
Daniel Goroff (Alfred P. Sloan Foundation)
Cite this chapter.
Daniel Goroff. 2020. “
Title
.” In: Cole, Dhaliwal, Sautmann, and Vilhuber (eds),
Handbook on Using Administrative Data for Research and Evidence-based Policy
. Accessed at
on
.