메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A method for evaluating marketer re-identification risk

Author keywords

disclosure control; identity disclosure; privacy; re identification risk

Indexed keywords

DATA SETS; DISCLOSURE CONTROL; IDENTITY DISCLOSURE; PRIVACY; RE-IDENTIFICATION RISK;

EID: 77955821670     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1754239.1754271     Document Type: Conference Paper
Times cited : (15)

References (52)
  • 4
    • 0000072558 scopus 로고
    • Finding a needle in a haystack or identifying anonymous census records
    • T. Dalenius, "Finding a needle in a haystack or identifying anonymous census records," Journal of Official Statistics, vol. 2, pp. 329-336, 1986.
    • (1986) Journal of Official Statistics , vol.2 , pp. 329-336
    • Dalenius, T.1
  • 5
  • 8
    • 34548161843 scopus 로고    scopus 로고
    • Canadian Institutes of Health Research, Canadian Institutes of Health Research
    • Canadian Institutes of Health Research, "CIHR best practices for protecting privacy in health research," Canadian Institutes of Health Research 2005.
    • (2005) CIHR Best Practices for Protecting Privacy in Health Research
  • 11
    • 60049086085 scopus 로고    scopus 로고
    • Privacy Interests in Prescription Records, Part 1: Prescriber Privacy
    • P. Kosseim and K. El Emam, "Privacy Interests in Prescription Records, Part 1: Prescriber Privacy," IEEE Security and Privacy, vol. 7, pp. 72-76, 2009.
    • (2009) IEEE Security and Privacy , vol.7 , pp. 72-76
    • Kosseim, P.1    El Emam, K.2
  • 12
    • 65249152887 scopus 로고    scopus 로고
    • Privacy Interests in Prescription Records, Part 2: Patient Privacy
    • K. El Emam and P. Kosseim, "Privacy Interests in Prescription Records, Part 2: Patient Privacy," IEEE Security and Privacy, vol. 7, pp. 75-78, 2009.
    • (2009) IEEE Security and Privacy , vol.7 , pp. 75-78
    • El Emam, K.1    Kosseim, P.2
  • 22
    • 36749027891 scopus 로고    scopus 로고
    • 2006 e-crime watch survey
    • US Secret Service, Carnegie Mellon University, and Microsoft Corporation
    • CSO Magazine, "2006 e-crime watch survey," US Secret Service, Carnegie Mellon University, and Microsoft Corporation 2006.
    • (2006) CSO Magazine
  • 29
    • 77955796645 scopus 로고    scopus 로고
    • Available at
    • [Available at: http://www.ehealthinformation.ca/dataloss].
  • 31
    • 77955808028 scopus 로고    scopus 로고
    • Alleged LTTE front had voter lists
    • S. Bell, "Alleged LTTE front had voter lists," in National Post, 2006.
    • (2006) National Post
    • Bell, S.1
  • 32
    • 77955785477 scopus 로고    scopus 로고
    • Privacy chief probes how group got voter lists
    • S. Bell, "Privacy chief probes how group got voter lists," in National Post, 2006.
    • (2006) National Post
    • Bell, S.1
  • 33
    • 77955787145 scopus 로고    scopus 로고
    • Voters lists 'most disturbing' items seized in Tamil raids, documents say
    • May 7
    • C. Freeze and C. Clark, "Voters lists 'most disturbing' items seized in Tamil raids, documents say," in Globe and Mail, May 7, 2008.
    • (2008) Globe and Mail
    • Freeze, C.1    Clark, C.2
  • 34
    • 0348062787 scopus 로고    scopus 로고
    • Disclosure risk assessment in statistical microdata protection via advanced record linkage
    • J. Domingo-Ferrer and V. Torra, "Disclosure risk assessment in statistical microdata protection via advanced record linkage," Statistics and Computing, vol. 13, 2003.
    • (2003) Statistics and Computing , vol.13
    • Domingo-Ferrer, J.1    Torra, V.2
  • 37
    • 54949127921 scopus 로고    scopus 로고
    • Assessing identification risk in survey microdata using log-linear models
    • C. Skinner and N. Shlomo, "Assessing identification risk in survey microdata using log-linear models," Journal of the American Statistical Association, vol. 103, pp. 989-1001, 2008.
    • (2008) Journal of the American Statistical Association , vol.103 , pp. 989-1001
    • Skinner, C.1    Shlomo, N.2
  • 40
    • 0001289403 scopus 로고
    • The Moment Generating Function and Negative Integer Moments
    • N. Cressie, A. S. Davis, J. Folks, and G. E. Policello, "The Moment Generating Function and Negative Integer Moments," American Statistician, vol. 35, pp. 148-150, 1981.
    • (1981) American Statistician , vol.35 , pp. 148-150
    • Cressie, N.1    Davis, A.S.2    Folks, J.3    Policello, G.E.4
  • 41
  • 42
    • 33847342133 scopus 로고    scopus 로고
    • Method to assess identifiability in electronic data files
    • H. Howe, A. Lake, and T. Shen, "Method to assess identifiability in electronic data files," American Journal of Epidemiology, vol. 165, pp. 597-601, 2007.
    • (2007) American Journal of Epidemiology , vol.165 , pp. 597-601
    • Howe, H.1    Lake, A.2    Shen, T.3
  • 48
    • 77955830878 scopus 로고    scopus 로고
    • Available at
    • [Available at: http://www.everyclickmatters.com/victim/assessmenttool. html].
  • 50
    • 19144373610 scopus 로고
    • For sale: Your secret medical record for 150
    • L. Rogers and D. Leppard, "For sale: Your secret medical record for 150," in Sunday Times, 1995, p. 2.
    • (1995) Sunday Times , pp. 2
    • Rogers, L.1    Leppard, D.2
  • 51
    • 77955776780 scopus 로고    scopus 로고
    • Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions
    • D. Kravets, "Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions," in Wired, 2008.
    • (2008) Wired
    • Kravets, D.1
  • 52
    • 77955809691 scopus 로고    scopus 로고
    • Hackers Break into Virginia Health Professions Database, Demand Ransom
    • vol. May 4
    • B. Krebs, "Hackers Break Into Virginia Health Professions Database, Demand Ransom," in Washington Post. vol. May 4, 2009.
    • (2009) Washington Post
    • Krebs, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.