2014
DOI: 10.1111/j.1740-9713.2014.00763.x
|View full text |Cite
|
Sign up to set email alerts
|

Keeping Watch

Abstract: Brian Tarran investigates the role of statistical models in the ongoing fight against hackers, crackers and assorted cyber attackers – those who are intent on stealing our personal data from computer networks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Aggarwal and Yu [22] and the Institute of Medicine [7] provide examples of approaches to achieve anonymity of personal health information, including the following:

Transformation of data sets using data reduction techniques such as generalisation of the data by grouping of values into categories, and suppression/masking of data where specific values or whole records are removed from the dataset. Data perturbation techniques can also be applied, whereby random noise is added to the true values.

Diversity/closeness models have been developed with the aim of transforming data to ensure that specific individuals cannot be identified within public databases [23]. These provide a guarantee of a pre-specified level of anonymity based on non-uniqueness of records within the transformed data.
…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Aggarwal and Yu [22] and the Institute of Medicine [7] provide examples of approaches to achieve anonymity of personal health information, including the following:

Transformation of data sets using data reduction techniques such as generalisation of the data by grouping of values into categories, and suppression/masking of data where specific values or whole records are removed from the dataset. Data perturbation techniques can also be applied, whereby random noise is added to the true values.

Diversity/closeness models have been developed with the aim of transforming data to ensure that specific individuals cannot be identified within public databases [23]. These provide a guarantee of a pre-specified level of anonymity based on non-uniqueness of records within the transformed data.
…”
Section: Introductionmentioning
confidence: 99%
“…Diversity/closeness models have been developed with the aim of transforming data to ensure that specific individuals cannot be identified within public databases [23]. These provide a guarantee of a pre-specified level of anonymity based on non-uniqueness of records within the transformed data.…”
Section: Introductionmentioning
confidence: 99%
“…This reflects discussions in the context of ‘big data’. However, it is clear that current anonymisation methods are imperfect and that re-identification is possible [23]. …”
Section: Introductionmentioning
confidence: 99%