1991
DOI: 10.1214/ss/1177011681
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Access to Microdata While Protecting Confidentiality: Prospects for the Future

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
72
0

Year Published

1995
1995
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 138 publications
(77 citation statements)
references
References 18 publications
1
72
0
Order By: Relevance
“…We describe this in Section 2.3 and use it in the empirical part. An alternative solution is in the use of synthetic data and a related notion of differential privacy, for example, Dwork and Nissim (2004), Dwork (2006), and Abowd and Vilhuber (2008), as well as Duncan and Lambert (1986), Duncan and Mukherjee (1991), Duncan and Pearson (1991), Fienberg (1994Fienberg ( , 2001, and Duncan, Fienberg, Krishnan, Padman, and Roehrig (2001), Abowd and Woodcock (2001), Kinney, Reiter, Reznek, Miranda, Jarmin, andAbowd (2011), andHu, Reiter, andWang (2014), among others.…”
Section: Related Literaturementioning
confidence: 99%
“…We describe this in Section 2.3 and use it in the empirical part. An alternative solution is in the use of synthetic data and a related notion of differential privacy, for example, Dwork and Nissim (2004), Dwork (2006), and Abowd and Vilhuber (2008), as well as Duncan and Lambert (1986), Duncan and Mukherjee (1991), Duncan and Pearson (1991), Fienberg (1994Fienberg ( , 2001, and Duncan, Fienberg, Krishnan, Padman, and Roehrig (2001), Abowd and Woodcock (2001), Kinney, Reiter, Reznek, Miranda, Jarmin, andAbowd (2011), andHu, Reiter, andWang (2014), among others.…”
Section: Related Literaturementioning
confidence: 99%
“…In technical terms disclosure limitation involves manipulating or masking a data matrix. Following important work by Cox (1980), Dalenius and Reiss (1982), Roberts (1986), Dalenius (1986), and Duncan and Lambert (1986), Duncan and Pearson (1991) provide a clear and accessible description of the methods available for the reduction of disclosure risk. More recent monographic treatments by de Waal (1996, 2001) and Doyle et al (2001) update the framework to emphasize disclosure risk assessment and administrative alternatives to statistical solutions.…”
Section: Disclosure Limitation Basicsmentioning
confidence: 99%
“…These practices --briefly introduced and documented in this paper --constitute the starting point for all assessments of disclosure risk and implementations of disclosure limitation strategies. Those who work on data sharing are well advised to use those procedures as an explicit checklist, starting with the work of the Subcommittee on Disclosure Avoidance Techniques (1978Techniques ( , 1994, continuing with the work of Duncan and Pearson (1991), and including the recent recommendations from Armstrong, Rushton, and Zimmerman (1999); Doyle et al (2001);and Willenbor and de Waal (2001). The Checklist on Disclosure Potential of Proposed Data Releases (Interagency Confidentiality and Data Access Group 1999) is a starting point for the verification of these processes, which our research on best practices is designed to complement and enhance.…”
Section: Best Practices and Recommendationsmentioning
confidence: 99%
“…With more and more sensitive and confidential information stored, shared and manipulated at digital level [3], individuals and organisations expect appropriate measures to ensure privacy of such information. Recent research indicates that the protection of users' privacy has become crucial for organisations in order to maintain a high standard of services and retain competitive advantage [4].…”
Section: Introductionmentioning
confidence: 99%