2014
DOI: 10.1080/13600869.2013.869909
|View full text |Cite
|
Sign up to set email alerts
|

Does fair anonymization exist?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Given their potential to remove data from the scope of data protection rules, and thus free organisations from their data protection obligations, it has been widely noted that there are strong incentives for their use. 101 There is, however, a problem. Over the last 20 years or so, technical critics of anonymisation have demonstrated that conventional, and commonly used, anonymisation techniques are simply not capable of providing cast-iron guarantees of anonymity.…”
Section: Size Limits For Obligations Inmentioning
confidence: 99%
“…Given their potential to remove data from the scope of data protection rules, and thus free organisations from their data protection obligations, it has been widely noted that there are strong incentives for their use. 101 There is, however, a problem. Over the last 20 years or so, technical critics of anonymisation have demonstrated that conventional, and commonly used, anonymisation techniques are simply not capable of providing cast-iron guarantees of anonymity.…”
Section: Size Limits For Obligations Inmentioning
confidence: 99%
“…Fourth, the increasing concern about data leakage [3,4]. Fifth, recent research has questioned the ability of anonymisation techniques to successfully preserve privacy [5][6][7]. Sixth, publishing open government data and the concern of jigsaw re-identification problem regarding private data (transparent government may lead to transparent citizens in terms of their private personal information) [8].…”
Section: Research Motivationmentioning
confidence: 99%
“…Risks of re-identification are often difficult to objectively assess, especially in an era when vast amounts of information about people is available in the public domain (Ramachandran et al 2012). Additionally, these risks evolve over time with new datasets made available and with new computational tools enabling linkage of separate datasets (Alexin 2014). Workshops on data anonymization techniques, online guidance on how to anonymize data as well as checklists for sharing anonymized data will therefore be necessary for any institution wishing to provide services for managed access to restricted data and to manage the associated risks effectively.…”
Section: Guidance On Working With Personal/sensitive Datamentioning
confidence: 99%