By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Noise, Numbers, and the New Normal for U.S. Census Data | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Noise, Numbers, and the New Normal for U.S. Census Data | HackerNoon
Computing

Noise, Numbers, and the New Normal for U.S. Census Data | HackerNoon

News Room
Last updated: 2025/05/22 at 6:33 PM
News Room Published 22 May 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

2. Related Work

3. Theoretical Lenses

3.1. Handoff Model

3.2. Boundary objects

4. Applying the Theoretical Lenses and 4.1 Handoff Triggers: New tech, new threats, new hype

4.2. Handoff Components: Shifting experts, techniques, and data

4.3. Handoff Modes: Abstraction and constrained expertise

4.4 Handoff Function: Interrogating the how and 4.5. Transparency artifacts at the boundaries: Spaghetti at the wall

5. Uncovering the Stakes of the Handoff

5.1. Confidentiality is the tip of the iceberg

5.2. Data Utility

5.3. Formalism

5.4. Transparency

5.5. Participation

6. Beyond the Census: Lessons for Transparency and Participation and 6.1 Lesson 1: The handoff lens is a critical tool for surfacing values

6.2 Lesson 2: Beware objects without experts

6.3 Lesson 3: Transparency and participation should center values and policy

7. Conclusion

8. Research Ethics and Social Impact

8.1. Ethical concerns

8.2. Positionality

8.3. Adverse impact statement

Acknowledgments and References

5.2 Data Utility

The DAS attempts to balance confidentiality with data utility. The goal is to implement confidentiality protections that, in theory, allow a wide range of stakeholders to access and use census data, while ensuring that census takers trust these confidentiality protections enough to disclose their information. But in response to the Bureau’s decision to update the DAS, many stakeholders expressed concerns that the noise added under DP would render Census data unusable for many use cases [130, 137]. Through the handoff lens, we note that the adoption of DP shifted other components of the DAS: in particular, in order to minimize privacy loss under DP, the Bureau reduced the number of published statistics and the number of counts that were held invariant (i.e., not affected by confidentiality protections; recall §4.2.2). The decision to report specific invariant statistics reflect policy decisions about what use cases are most important and where data utility should be preserved above confidentiality – what statistics are understood to be essential for democratic representation, versus those which are malleable. Notably, the Bureau rejected a request from the National Congress of American Indians to keep state-level data for tribal areas invariant [122].

Because Census data are closely tied to the allocation of political and economic resources, decisions about data utility impact the pursuit of values like equity and justice. When the Bureau solicited feedback from data users in the Federal Register, the solicitation and the responses revealed unspoken agreements about data access and utility for a wide range of applications, including state and local government, public health, anti-discrimination efforts, research, and education efforts. Stakeholders had differing epistemic perspectives about what makes data “good enough” to be useful [19]. These ethical and epistemic questions underlie a number of important policy decisions about how the DAS should operationalize and prioritize data utility across different settings. Notably, our analysis highlights a key reframing around utility: the switch to DP and its focus on formalism (§5.3) meant that utility was largely operationalized as accuracy, thus collapsing this epistemic debate.

5.3 Formalism

The shift to DP introduced a formal definition of both privacy and data utility. While SDL methods could be formalized as a series of rules, they did not allow the Bureau to quantify the resulting confidentiality protections. The Bureau highlighted the advantages of formalism, citing provable and externally verifiable guarantees [5] as well as precision in balancing competing values [9].

An extensive literature on quantification in the history and sociology of science examines why the call to numbers has been so powerful, particularly in bureaucratic contexts [35, 37, 46, 101]. Quantitative approaches to ethical questions promise to make political decisions visible [46, 118] and facilitate debate in a common language [35, 37], creating an avenue toward accountability by facilitating participation in democratic deliberation.

The quantification literature cautions that numbers can hide policy decisions beneath a veneer of scientific objectivity, producing legitimacy in highly contested decision-making settings and, at times, foreclosing external intervention [101]. Moreover, the choice to quantify privileges that which is easily measurable [46]. In the context of the DAS, the Bureau called for “pre-specified, objective criteria” [65, p. 2] to compare privacy methodologies. We argue that privileging formally quantifiable confidentiality guarantees led to a sociologically unintuitive conceptualization of privacy [109], and one which does not capture, e.g., notions of data privacy that are dependent on context or social relations [96, 132]. Thus, the Bureau’s decision to formalize privacy harms as reidentification risk–and data utility as (lack of) statistical uncertainty–in accordance with DP were not neutral, but reflect particular assumptions about the values at the center of the DAS.

Authors:

(1) AMINA A. ABDU, University of Michigan, USA;

(2) LAUREN M. CHAMBERS, University of California, Berkeley, USA;

(3) DEIRDRE K. MULLIGAN, University of California, Berkeley, USA;

(4) ABIGAIL Z. JACOBS, University of Michigan, USA.


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Anthropic’s New Model Excels at Reasoning and Planning—and Has the Pokémon Skills to Prove It
Next Article Apple TV+’s The Buccaneers returns with more Bridgerton-style corsets, scandal, and romance
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Finnish tech group ONEiO unveils UK expansion – UKTN
News
Firefox Maker Mozilla Discontinues Pocket and Fakespot to Focus on Browser
News
Mantle And Republic Technologies Forge Strategic Partnership For Institutional mETH Integration | HackerNoon
Computing
Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
Gadget

You Might also Like

Computing

Mantle And Republic Technologies Forge Strategic Partnership For Institutional mETH Integration | HackerNoon

6 Min Read
Computing

ThreatBook Named a Notable Vendor In Global Network Analysis And Visibility (NAV) Independent Report | HackerNoon

4 Min Read
Computing

INE Security Partners With Abadnet Institute For Cybersecurity Training Programs In Saudi Arabia | HackerNoon

5 Min Read
Computing

Why It’s Difficult to Accurately Predict Ethereum Transaction Times | HackerNoon

19 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?