2014
DOI: 10.1007/978-3-642-54568-9_24
|View full text |Cite
|
Sign up to set email alerts
|

Are On-Line Personae Really Unlinkable?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…This simple example shows that only removing identifiable information from a dataset might not be sufficient to guarantee anonymization. Anonymized data can be re-identified by linking the data by means of other data sources [45,19]. Therefore, before disclosing a dataset containing highly sensitive information, data owners often transform it to reduce the risk that its records can be re-identified.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…This simple example shows that only removing identifiable information from a dataset might not be sufficient to guarantee anonymization. Anonymized data can be re-identified by linking the data by means of other data sources [45,19]. Therefore, before disclosing a dataset containing highly sensitive information, data owners often transform it to reduce the risk that its records can be re-identified.…”
Section: Problem Statementmentioning
confidence: 99%
“…However, this in itself may not solve the problem, since removing unique identifiers might not be sufficient to guarantee data anonymity [49]. In fact, anonymized data could be de-anonymized through cross-referencing with data gathered from other sources [33,45]. Moreover, the application of machine learning techniques to anonymized data might still lead to the disclosure of sensitive and confidential information about data subjects, thanks to the power of current predictive models.…”
Section: Introductionmentioning
confidence: 99%
“…(3) We introduce a set of metrics to express the relationship between the partial and the actual user profile. (4) We profile third-party http calls sent by Facebook tracking services and compare this to the the user actual profile. (5) We model user online footprints as a graph of the actions generated by each user and analyse the resulting graph structure, identifying known malicious trackers.…”
Section: Contributionmentioning
confidence: 99%
“…For example, to personalise their services or offer tailored advertising, web applications could use tracking services that identify a user through different networks [4] [5]. These tracking services usually combine information from different profiles that users create, for example their Gmail address or their Facebook or LinkedIn accounts.…”
Section: State Of the Artmentioning
confidence: 99%
“…For example, to personalise their services or offer tailored advertising, web applications could use tracking services that identify a user through different networks [2] [3]. These tracking services usually combine information from different profiles that users create, for example their Gmail address or their Facebook or LinkedIn accounts.…”
Section: Introductionmentioning
confidence: 99%