Data Access, Data Sharing und Privacy
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Luc Rocher & Julien M. Hendrickx & Yves-Alexandre de Montjoye, 2019. "Estimating the success of re-identifications in incomplete datasets using generative models," Nature Communications, Nature, vol. 10(1), pages 1-9, December.
- Duncan, George & Lambert, Diane, 1989. "The Risk of Disclosure for Microdata," Journal of Business & Economic Statistics, American Statistical Association, vol. 7(2), pages 207-217, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- John R. J. Thompson & Longlong Feng & R. Mark Reesor & Chuck Grace, 2021.
"Know Your Clients’ Behaviours: A Cluster Analysis of Financial Transactions,"
JRFM, MDPI, vol. 14(2), pages 1-29, January.
- John R. J. Thompson & Longlong Feng & R. Mark Reesor & Chuck Grace, 2020. "Know Your Clients' behaviours: a cluster analysis of financial transactions," Papers 2005.03625, arXiv.org, revised May 2020.
- Ron S. Jarmin & John M. Abowd & Robert Ashmead & Ryan Cumings-Menon & Nathan Goldschlag & Michael B. Hawes & Sallie Ann Keller & Daniel Kifer & Philip Leclerc & Jerome P. Reiter & Rolando A. RodrÃgue, 2023.
"An in-depth examination of requirements for disclosure risk assessment,"
Proceedings of the National Academy of Sciences, Proceedings of the National Academy of Sciences, vol. 120(43), pages 2220558120-, October.
- Ron S. Jarmin & John M. Abowd & Robert Ashmead & Ryan Cumings-Menon & Nathan Goldschlag & Michael B. Hawes & Sallie Ann Keller & Daniel Kifer & Philip Leclerc & Jerome P. Reiter & Rolando A. Rodr'igue, 2023. "An In-Depth Examination of Requirements for Disclosure Risk Assessment," Papers 2310.09398, arXiv.org.
- Ron S. Jarmin & John M. Abowd & Robert Ashmead & Ryan Cumings-Menon & Nathan Goldschlag & Michael B. Hawes & Sallie Ann Keller & Daniel Kifer & Philip Leclerc & Jerome P. Reiter & Rolando A. Rodríguez, 2023. "An In-Depth Examination of Requirements for Disclosure Risk Assessment," Working Papers 23-49, Center for Economic Studies, U.S. Census Bureau.
- Natalie Shlomo & Chris Skinner, 2022. "Measuring risk of re‐identification in microdata: State‐of‐the art and new directions," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1644-1662, October.
- Rehse, Dominik & Tremöhlen, Felix, 2020. "Fostering participation in digital public health interventions: The case of digital contact tracing," ZEW Discussion Papers 20-076, ZEW - Leibniz Centre for European Economic Research.
- James Jackson & Robin Mitra & Brian Francis & Iain Dove, 2022. "Using saturated count models for user‐friendly synthesis of large confidential administrative databases," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 185(4), pages 1613-1643, October.
- Miren Gutierrez & John Bryant, 2022. "The Fading Gloss of Data Science: Towards an Agenda that Faces the Challenges of Big Data for Development and Humanitarian Action," Development, Palgrave Macmillan;Society for International Deveopment, vol. 65(1), pages 80-93, March.
- Christine M. O'Keefe & James O. Chipperfield, 2013. "A Summary of Attack Methods and Confidentiality Protection Measures for Fully Automated Remote Analysis Systems," International Statistical Review, International Statistical Institute, vol. 81(3), pages 426-455, December.
- Skinner, Chris J., 2007. "The probability of identification: applying ideas from forensic statistics to disclosure risk assessment," LSE Research Online Documents on Economics 39105, London School of Economics and Political Science, LSE Library.
- Se-Ra Oh & Young-Duk Seo & Euijong Lee & Young-Gab Kim, 2021. "A Comprehensive Survey on Security and Privacy for Electronic Health Data," IJERPH, MDPI, vol. 18(18), pages 1-48, September.
- Sevgi Arca & Rattikorn Hewett, 2021. "Analytics on Anonymity for Privacy Retention in Smart Health Data," Future Internet, MDPI, vol. 13(11), pages 1-20, October.
- Xiao-Bai Li & Sumit Sarkar, 2013. "Class-Restricted Clustering and Microperturbation for Data Privacy," Management Science, INFORMS, vol. 59(4), pages 796-812, April.
- Carlo Giacomo Leo & Maria Rosaria Tumolo & Saverio Sabina & Riccardo Colella & Virginia Recchia & Giuseppe Ponzini & Dimitrios Ioannis Fotiadis & Antonella Bodini & Pierpaolo Mincarone, 2022. "Health Technology Assessment for In Silico Medicine: Social, Ethical and Legal Aspects," IJERPH, MDPI, vol. 19(3), pages 1-13, January.
- S F Roehrig & R Padman & R Krishnan & G T Duncan, 2011. "Exact and heuristic methods for cell suppression in multi-dimensional linked tables," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(2), pages 291-304, February.
- James Steele & Matthew Wade & Robert J. Copeland & Stuart Stokes & Rachel Stokes & Steven Mann, 2021. "The National ReferAll Database: An Open Dataset of Exercise Referral Schemes Across the UK," IJERPH, MDPI, vol. 18(9), pages 1-17, April.
- Heng Xu & Nan Zhang, 2022. "Implications of Data Anonymization on the Statistical Evidence of Disparity," Management Science, INFORMS, vol. 68(4), pages 2600-2618, April.
- Loong Bronwyn & Rubin Donald B., 2017. "Multiply-Imputed Synthetic Data: Advice to the Imputer," Journal of Official Statistics, Sciendo, vol. 33(4), pages 1005-1019, December.
- Tapan K. Nayak & Samson A. Adeshiyan, 2016. "On Invariant Post-randomization for Statistical Disclosure Control," International Statistical Review, International Statistical Institute, vol. 84(1), pages 26-42, April.
- Walter Mãœller & Uwe Blien & Heike Wirth, 1995. "Identification Risks of Microdata," Sociological Methods & Research, , vol. 24(2), pages 131-157, November.
- Anastasia Roukouni & Gonçalo Homem de Almeida Correia, 2020. "Evaluation Methods for the Impacts of Shared Mobility: Classification and Critical Review," Sustainability, MDPI, vol. 12(24), pages 1-22, December.
- Xiao-Bai Li & Sumit Sarkar, 2009. "Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining," Operations Research, INFORMS, vol. 57(6), pages 1496-1509, December.
More about this item
Keywords
Datenschutz; EU-Staaten;NEP fields
This paper has been announced in the following NEP Reports:- NEP-GER-2025-01-20 (German Papers)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:zbw:wikdps:308071. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ZBW - Leibniz Information Centre for Economics (email available below). General contact details of provider: https://www.wik.org/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.