2020
DOI: 10.1007/978-3-030-50316-1_32
|View full text |Cite
|
Sign up to set email alerts
|

Practice and Challenges of (De-)Anonymisation for Data Sharing

Abstract: Personal data is a necessity in many fields for research and innovation purposes, and when such data is shared, the data controller carries the responsibility of protecting the privacy of the individuals contained in their dataset. The removal of direct identifiers, such as full name and address, is not enough to secure the privacy of individuals as shown by de-anonymisation methods in the scientific literature. Data controllers need to become aware of the risks of de-anonymisation and apply the appropriate an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Thereby, private sector organizations can be described as organizations with a majority of private ownership seeking to generate profit and not being owned or controlled by the government. However, existing literature in this field often focuses on examining a single or specific set of barriers, e.g., familiarity, risk, and trust in inter-organizational data sharing (Ibrahim & Nicolaou, 2011), governance challenges of inter-organizational value chains (Choi & Kröschel, 2015), challenges of (de-)anonymization for data sharing (Bampoulidis et al, 2020) or privacy concerns (Cichy et al, 2021), but without taking a holistic view of the barriers.…”
Section: Foundations and Related Workmentioning
confidence: 99%
“…Thereby, private sector organizations can be described as organizations with a majority of private ownership seeking to generate profit and not being owned or controlled by the government. However, existing literature in this field often focuses on examining a single or specific set of barriers, e.g., familiarity, risk, and trust in inter-organizational data sharing (Ibrahim & Nicolaou, 2011), governance challenges of inter-organizational value chains (Choi & Kröschel, 2015), challenges of (de-)anonymization for data sharing (Bampoulidis et al, 2020) or privacy concerns (Cichy et al, 2021), but without taking a holistic view of the barriers.…”
Section: Foundations and Related Workmentioning
confidence: 99%
“…Throughout the review of literature, including those works that were excluded from the meta-analysis (as described earlier), it became clear that a range of privacy management techniques have been employed and proposed with relation to email analysis. The efficacy of these techniques, however, seems highly dependent on the skill and knowledge of the person applying them and the contextual knowledge possessed by the user (Elliot et al 2018;Bampoulidis et al 2020). These methods were collated by their effect on data, to represent five broad types of processes that can be applied to data, each reflecting a different level of privacy consciousness.…”
Section: Analysing Privacy Awarenessmentioning
confidence: 99%
“…Equally, however, the task can be poorly achieved, making the reconstruction of these aspects not only possible but likely. Another factor, one which cannot be accounted for in a standardised way is the skill and knowledge base of the user (Elliot et al 2018;Bampoulidis et al 2020). Even with the more effective applications of privacy protection, there is a risk that a user may be able to re-identify individuals and/or make inferences about groups from surrounding data points (Arbuckle and El Emam 2020).…”
Section: Privacy In Email Analysismentioning
confidence: 99%