EconPapers    
Economics at your fingertips  
 

Re-identification attacks—A systematic literature review

Jane Henriksen-Bulmer and Sheridan Jeary

International Journal of Information Management, 2016, vol. 36, issue 6, 1184-1192

Abstract: The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level.

Keywords: Re-identification; Anonymisation; Anonymization; Systematic literature review (search for similar items in EconPapers)
Date: 2016
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0268401215301262
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:ininma:v:36:y:2016:i:6:p:1184-1192

DOI: 10.1016/j.ijinfomgt.2016.08.002

Access Statistics for this article

International Journal of Information Management is currently edited by Yogesh K. Dwivedi

More articles in International Journal of Information Management from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:ininma:v:36:y:2016:i:6:p:1184-1192