Anonymity (redirect from Anonymisation)
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does...
50 KB (6,112 words) - 17:22, 24 September 2024
Data anonymization (redirect from Data anonymisation)
District Court, highlight the shortcomings of "Anonymisation" in today's big data world. Anonymisation reflects an outdated approach to data protection...
10 KB (1,162 words) - 18:21, 19 August 2024
Adversarial stylometry (redirect from Authorship anonymisation)
characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to...
32 KB (3,782 words) - 07:34, 20 April 2024
Pseudonymization (redirect from Pseudo-anonymisation)
Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced...
19 KB (2,523 words) - 13:20, 27 August 2024
Schönfeld, Dagmar; Strufe, Thorsten (June 14, 2018). "Forensic Analysis and Anonymisation of Printed Documents". Proceedings of the 6th ACM Workshop on Information...
16 KB (1,618 words) - 23:38, 3 October 2024
K-anonymity (redirect from K-anonymisation)
k-anonymity is a property possessed by certain anonymized data. The term k-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in...
16 KB (1,849 words) - 06:41, 30 July 2024
Data re-identification (redirect from De-anonymisation)
Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information...
26 KB (3,165 words) - 01:13, 9 October 2024
as personal data, personally identifiable information, anonymisation and pseudo-anonymisation which lack sufficient and detailed enough meanings when...
15 KB (1,646 words) - 18:05, 19 August 2024
information (as an alternative to the other option of complete data anonymisation). An example is encryption, which renders the original data unintelligible...
121 KB (12,529 words) - 15:54, 16 October 2024
by default. A year earlier, in 2012, Shuttleworth had defended the anonymisation method used. He later reversed the decision, and no current Ubuntu version...
22 KB (2,002 words) - 16:34, 25 September 2024
Broersma, Matthew (26 August 2015). "IBM Tells Companies To Block Tor Anonymisation Network". TechWeekEurope UK. Archived from the original on 10 September...
168 KB (14,047 words) - 19:00, 16 October 2024
calls (since version 0.6.0); Tor and I2P networks support, for further anonymisation (since version 0.6.0). The core of the Retroshare software is based...
13 KB (1,256 words) - 13:36, 30 August 2024
responded. The ABS protects personal information primarily through anonymisation of data. Personal information is stored separately from other census...
49 KB (4,859 words) - 07:09, 9 July 2024
restrictions on access. These can then be contrasted with choices about data anonymisation to present a linear representation of data access options. This presentation...
21 KB (2,243 words) - 20:48, 22 July 2024
Anonymised or aggregated data was less regulated by the Act, provided the anonymisation or aggregation had not been done reversibly. Individuals could have...
27 KB (2,845 words) - 22:06, 9 May 2024
experiences in between.: 177 He also wanted to map the progressive anonymisation of the contemporaries (mitwelt), which was a measurement of increasing...
29 KB (3,423 words) - 16:08, 6 October 2024
Design & Anonymisation Techniques in Action: Case Study of Ma3tch Technology Balboni, P. & Macenaite, M. (2013) Privacy by design and anonymisation techniques...
6 KB (507 words) - 08:11, 23 August 2022
03868 [cs.CR]. "Privacy-enhancing technologies (PETs)" (PDF). Draft anonymisation, pseudonymisation and privacy-enhancing technologies guidance. Information...
45 KB (4,302 words) - 18:33, 9 October 2024
by end users on online search engines of the gatekeeper, subject to anonymisation for the query, click and view data that constitutes personal data; This...
124 KB (12,256 words) - 14:32, 16 October 2024
characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to...
59 KB (6,673 words) - 09:36, 7 October 2024
It was intended largely as a transitional measure whilst consent or anonymisation procedures were developed, and this was reinforced by the need to review...
4 KB (425 words) - 02:52, 25 April 2022
network monitoring infrastructure, and to develop the appropriate data anonymisation tools for prohibiting unauthorised access or tampering of the original...
4 KB (460 words) - 03:13, 27 September 2024
(2016-09-25). "CryptoPAn 0.1.0". rubygems.org. "NetSniff / IP Address Anonymisation Modes / Crypto-PAn". 2007-06-26. Retrieved 2018-09-07. "Documentation...
9 KB (1,151 words) - 11:51, 30 December 2023
The question of whether barnardisation may fall short of the complete anonymisation of data, and the status of barnardised data under the complex provisions...
14 KB (1,672 words) - 16:42, 12 May 2024
in place to safeguard users' privacy, such as data pseduonymisation/anonymisation, whereby a subscriber's personal identity code can be modified or data...
26 KB (3,222 words) - 10:18, 1 June 2024
"anonymous" data using computers and information from other sources. A true anonymisation is thus not given. The questions about belonging to a religious society...
21 KB (2,688 words) - 01:10, 16 May 2024
the law on the national archives. The amendment would result in the anonymisation of personal data of people working for and victims of the Yugoslav-era...
5 KB (417 words) - 17:32, 2 January 2024