• Anonymity (redirect from Anonymisation)
    Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does...
    49 KB (6,114 words) - 23:07, 14 August 2024
  • District Court, highlight the shortcomings of "Anonymisation" in today's big data world. Anonymisation reflects an outdated approach to data protection...
    10 KB (1,140 words) - 12:56, 9 August 2024
  • characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to...
    32 KB (3,782 words) - 07:34, 20 April 2024
  • Thumbnail for Printer tracking dots
    Schönfeld, Dagmar; Strufe, Thorsten (June 14, 2018). "Forensic Analysis and Anonymisation of Printed Documents". Proceedings of the 6th ACM Workshop on Information...
    16 KB (1,620 words) - 23:42, 8 July 2024
  • Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced...
    19 KB (2,523 words) - 21:00, 8 July 2024
  • K-anonymity (redirect from K-anonymisation)
    k-anonymity is a property possessed by certain anonymized data. The term k-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in...
    16 KB (1,849 words) - 06:41, 30 July 2024
  • Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information...
    26 KB (3,164 words) - 16:05, 12 August 2024
  • as personal data, personally identifiable information, anonymisation and pseudo-anonymisation which lack sufficient and detailed enough meanings when...
    15 KB (1,644 words) - 21:54, 14 March 2024
  • Thumbnail for Mark Shuttleworth
    by default. A year earlier, in 2012, Shuttleworth had defended the anonymisation method used. He later reversed the decision, and no current Ubuntu version...
    22 KB (1,996 words) - 21:14, 24 May 2024
  • Thumbnail for Tor (network)
    Broersma, Matthew (26 August 2015). "IBM Tells Companies To Block Tor Anonymisation Network". TechWeekEurope UK. Archived from the original on 10 September...
    188 KB (16,225 words) - 14:56, 17 August 2024
  • Thumbnail for General Data Protection Regulation
    information (as an alternative to the other option of complete data anonymisation). An example is encryption, which renders the original data unintelligible...
    124 KB (12,663 words) - 08:19, 3 August 2024
  • Thumbnail for Census in Australia
    responded. The ABS protects personal information primarily through anonymisation of data. Personal information is stored separately from other census...
    49 KB (4,859 words) - 07:09, 9 July 2024
  • Thumbnail for Data Protection Act 1998
    Anonymised or aggregated data was less regulated by the Act, provided the anonymisation or aggregation had not been done reversibly. Individuals could have...
    27 KB (2,845 words) - 22:06, 9 May 2024
  • restrictions on access. These can then be contrasted with choices about data anonymisation to present a linear representation of data access options. This presentation...
    21 KB (2,243 words) - 20:48, 22 July 2024
  • Thumbnail for Retroshare
    calls (since version 0.6.0); Tor and I2P networks support, for further anonymisation (since version 0.6.0). The core of the Retroshare software is based...
    13 KB (1,254 words) - 01:04, 20 April 2024
  • 03868 [cs.CR]. "Privacy-enhancing technologies (PETs)" (PDF). Draft anonymisation, pseudonymisation and privacy-enhancing technologies guidance. Information...
    46 KB (4,349 words) - 12:43, 23 July 2024
  • Design & Anonymisation Techniques in Action: Case Study of Ma3tch Technology Balboni, P. & Macenaite, M. (2013) Privacy by design and anonymisation techniques...
    6 KB (507 words) - 08:11, 23 August 2022
  • experiences in between.: 177  He also wanted to map the progressive anonymisation of the contemporaries (mitwelt), which was a measurement of increasing...
    29 KB (3,413 words) - 08:40, 3 December 2023
  • Thumbnail for Digital Markets Act
    by end users on online search engines of the gatekeeper, subject to anonymisation for the query, click and view data that constitutes personal data; This...
    122 KB (12,064 words) - 21:31, 3 August 2024
  • characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to...
    59 KB (6,673 words) - 22:51, 14 July 2024
  • network monitoring infrastructure, and to develop the appropriate data anonymisation tools for prohibiting unauthorised access or tampering of the original...
    4 KB (463 words) - 19:20, 11 March 2022
  • It was intended largely as a transitional measure whilst consent or anonymisation procedures were developed, and this was reinforced by the need to review...
    4 KB (425 words) - 02:52, 25 April 2022
  • "anonymous" data using computers and information from other sources. A true anonymisation is thus not given. The questions about belonging to a religious society...
    21 KB (2,688 words) - 01:10, 16 May 2024
  • Thumbnail for Mobile positioning data
    in place to safeguard users' privacy, such as data pseduonymisation/anonymisation, whereby a subscriber's personal identity code can be modified or data...
    26 KB (3,222 words) - 10:18, 1 June 2024
  • The question of whether barnardisation may fall short of the complete anonymisation of data, and the status of barnardised data under the complex provisions...
    14 KB (1,672 words) - 16:42, 12 May 2024
  • the law on the national archives. The amendment would result in the anonymisation of personal data of people working for and victims of the Yugoslav-era...
    5 KB (417 words) - 17:32, 2 January 2024
  • (2016-09-25). "CryptoPAn 0.1.0". rubygems.org. "NetSniff / IP Address Anonymisation Modes / Crypto-PAn". 2007-06-26. Retrieved 2018-09-07. "Documentation...
    9 KB (1,151 words) - 11:51, 30 December 2023