2022
DOI: 10.1007/s10207-022-00607-5
|View full text |Cite
|
Sign up to set email alerts
|

A systematic overview on methods to protect sensitive data provided for various analyses

Abstract: In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 57 publications
0
3
0
Order By: Relevance
“…Comprehending and protecting sensitive information is the other important training, the information needs to be protected to prevent that data from being misused by third parties for fraud, such as phishing scams and identity theft [38]. Data protection is also essential to help control cybercrimes by ensuring details (specifically banking) and reference report are covered to prevent deception.…”
Section: Resultsmentioning
confidence: 99%
“…Comprehending and protecting sensitive information is the other important training, the information needs to be protected to prevent that data from being misused by third parties for fraud, such as phishing scams and identity theft [38]. Data protection is also essential to help control cybercrimes by ensuring details (specifically banking) and reference report are covered to prevent deception.…”
Section: Resultsmentioning
confidence: 99%
“…Technical safeguards (e.g. anonymization [ 19 ] and encryption [ 20 ]) need to be implemented to ensure data security and data protection [ 21 ]. In addition, because sensitive data are often stored in different formats, reflecting different source systems, prior data harmonization may be required to support sharing and integration of those data [ 22 , 23 ].…”
Section: Introductionmentioning
confidence: 99%
“…This sensitive information may be stolen or leaked by malware that is included in PDF files, which might result in monetary loss, data breaches, or identity theft. Protecting the security and integrity of sensitive data is made easier by finding and eliminating malware from PDF files [8].…”
Section: Introductionmentioning
confidence: 99%