메뉴 건너뛰기




Volumn 38, Issue 3, 2014, Pages 679-698

Digression and value concatenation to enable privacy-preserving regression

Author keywords

Anonymization; Data analytics; Data mining; Privacy; Regression; Regression trees

Indexed keywords

DATA HANDLING; DATA MINING; FORESTRY; INFORMATION ANALYSIS; QUALITY CONTROL; REGRESSION ANALYSIS; RISK ASSESSMENT; TREES (MATHEMATICS);

EID: 84944877196     PISSN: 02767783     EISSN: 21629730     Source Type: Journal    
DOI: 10.25300/MISQ/2014/38.3.03     Document Type: Article
Times cited : (22)

References (41)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N. R., and Wortmann, J. C. 1989. "Security-Control Methods for Statistical Databases: A Comparative Study", ACM Computing Surveys (21:4), pp. 515-556.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 4
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
    • Angst, C. M., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion", MIS Quarterly (33:2), pp. 339-370.
    • (2009) MIS Quarterly , vol.33 , Issue.2 , pp. 339-370
    • Angst, C.M.1    Agarwal, R.2
  • 8
    • 75949123863 scopus 로고    scopus 로고
    • Anonymizing bipartite graph data using safe groupings
    • Cormode, G., Srivastava, D., Yu, T., and Zhang, Q. 2010. "Anonymizing Bipartite Graph Data Using Safe Groupings", The VLDB Journal (19:1), pp. 115-139.
    • (2010) The VLDB Journal , vol.19 , Issue.1 , pp. 115-139
    • Cormode, G.1    Srivastava, D.2    Yu, T.3    Zhang, Q.4
  • 9
    • 84944954698 scopus 로고    scopus 로고
    • Decision tree: The obama-clinton divide
    • April 16
    • Cox, A. 2008. "Decision Tree: The Obama-Clinton Divide", The New York Times, April 16 (http://www.nytimes.com/imagepages/2008/04/16/us/20080416-OBAMA-GRAPHIC.html).
    • (2008) The New York Times
    • Cox, A.1
  • 10
    • 0001501223 scopus 로고
    • 'How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use
    • Culnan, M. 1993. "'How Did They Get My Name?': An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS Quarterly (17:3), pp. 341-363.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.1
  • 11
    • 0011153447 scopus 로고    scopus 로고
    • Multivariate regression trees: A new technique for modeling species-environmental relationships
    • De'ath, G. 2002. "Multivariate Regression Trees: A New Technique for Modeling Species-Environmental Relationships", Ecology (83:4), pp. 1105-1117.
    • (2002) Ecology , vol.83 , Issue.4 , pp. 1105-1117
    • De'Ath, G.1
  • 12
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • Denning, D. E., and Schlörer, J. 1983. "Inference Control for Statistical Databases", Computer (16:7), pp. 69-82.
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 13
    • 84893374768 scopus 로고    scopus 로고
    • How companies learn your secrets
    • February 16, p. 10
    • Duhigg, C. 2012. "How Companies Learn Your Secrets", The New York Times Magazine, February 16, p. 10.
    • (2012) The New York Times Magazine
    • Duhigg, C.1
  • 16
    • 82955228457 scopus 로고    scopus 로고
    • A privacy protection technique for publishing data mining models and research data
    • Fu, Y., Chen, Z., Koru, G., and Gangopadhyay, A. 2010. "A Privacy Protection Technique for Publishing Data Mining Models and Research Data", ACM Transactions on Management Information Systems (1:1), Article 7, pp. 7:1-7:20.
    • (2010) ACM Transactions on Management Information Systems , vol.1 , Issue.1 , pp. 71-720
    • Fu, Y.1    Chen, Z.2    Koru, G.3    Gangopadhyay, A.4
  • 19
    • 34247541615 scopus 로고    scopus 로고
    • Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
    • Garfinkel, R., Gopal, R., and Thompson, S. 2007. "Releasing Individually Identifiable Microdata with Privacy Protection against Stochastic Threat: An Application to Health Information", Information Systems Research (18:1), pp. 23-41.
    • (2007) Information Systems Research , vol.18 , Issue.1 , pp. 23-41
    • Garfinkel, R.1    Gopal, R.2    Thompson, S.3
  • 22
    • 0035607552 scopus 로고    scopus 로고
    • The effect of physician advice on alcohol consumption: Count regression with an endogenous treatment effect
    • Kenkel, D. S., and Terza, J. V. 2001. "The Effect of Physician Advice on Alcohol Consumption: Count Regression with an Endogenous Treatment Effect", Journal of Applied Econometrics (16:2), pp. 165-184.
    • (2001) Journal of Applied Econometrics , vol.16 , Issue.2 , pp. 165-184
    • Kenkel, D.S.1    Terza, J.V.2
  • 24
    • 0000964471 scopus 로고
    • Measures of disclosure risk and harm
    • Lambert, D. 1993. "Measures of Disclosure Risk and Harm", Journal of Official Statistics (9:2), pp. 313-331.
    • (1993) Journal of Official Statistics , vol.9 , Issue.2 , pp. 313-331
    • Lambert, D.1
  • 25
    • 51149098991 scopus 로고    scopus 로고
    • Workload-aware anonymization techniques for large-scale datasets
    • Le Fevre, K., De Witt, D. J., and Ramakrishnan, R. 2008. "Workload-Aware Anonymization Techniques for Large-Scale Datasets", ACM Transactions on Database Systems (33:3), Article 17, pp. 17:1-17:47.
    • (2008) ACM Transactions on Database Systems , vol.33 , Issue.3 , pp. 171-1747
    • Le Fevre, K.1    De Witt, D.J.2    Ramakrishnan, R.3
  • 27
    • 73649136135 scopus 로고    scopus 로고
    • Against classification attacks: A decision tree pruning approach to privacy protection in data mining
    • Li, X.-B., and Sarkar, S. 2009. "Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining", Operations Research (57:6), pp. 1496-1509.
    • (2009) Operations Research , vol.57 , Issue.6 , pp. 1496-1509
    • Li, X.-B.1    Sarkar, S.2
  • 28
    • 84865106994 scopus 로고    scopus 로고
    • Protecting privacy against record linkage disclosure: A bounded swapping approach for numeric data
    • Li, X.-B., and Sarkar, S. 2011. "Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data", Information Systems Research (22:4), pp. 774-789.
    • (2011) Information Systems Research , vol.22 , Issue.4 , pp. 774-789
    • Li, X.-B.1    Sarkar, S.2
  • 32
    • 33847045247 scopus 로고    scopus 로고
    • Minimizing information loss and preserving privacy
    • Menon, S., and Sarkar, S. 2007. "Minimizing Information Loss and Preserving Privacy", Management Science (53:1), pp. 102-116.
    • (2007) Management Science , vol.53 , Issue.1 , pp. 102-116
    • Menon, S.1    Sarkar, S.2
  • 35
    • 84896282697 scopus 로고    scopus 로고
    • Don't Build a Database of Ruin
    • August 23
    • Ohm, P. 2012. "Don't Build a Database of Ruin", Harvard Business Review HRB Blog Network, August 23 (http://blogs.hbr.org/cs/2012/08/dont-build-a-database-of-ruin.html).
    • (2012) Harvard Business Review HRB Blog Network
    • Ohm, P.1
  • 37
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • IEEE Computer Society, Washington, DC
    • Samarati, P., and Sweeney, L. 1998. "Protecting Privacy When Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", in Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, Washington, DC.
    • (1998) Proceedings of the IEEE Symposium on Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 38
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: An interdisciplinary review
    • Smith, H. J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review", MIS Quarterly (35:4), pp. 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 41
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • New York: ACM Press
    • Zheleva, E., and Getoor, L. 2009. "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles", in Proceedings of the 18th International Conference on World Wide Web, New York: ACM Press, pp. 531-540.
    • (2009) Proceedings of the 18th International Conference on World Wide Web , pp. 531-540
    • Zheleva, E.1    Getoor, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.