Re-identification attacks—A systematic literature review
Jane Henriksen-Bulmer and
Sheridan Jeary
International Journal of Information Management, 2016, vol. 36, issue 6, 1184-1192
Abstract:
The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level.
Keywords: Re-identification; Anonymisation; Anonymization; Systematic literature review (search for similar items in EconPapers)
Date: 2016
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0268401215301262
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:ininma:v:36:y:2016:i:6:p:1184-1192
DOI: 10.1016/j.ijinfomgt.2016.08.002
Access Statistics for this article
International Journal of Information Management is currently edited by Yogesh K. Dwivedi
More articles in International Journal of Information Management from Elsevier
Bibliographic data for series maintained by Catherine Liu ().