Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Anomymisation

Handbook of Research on Socio-Technical Design and Social Networking Systems
This process involves removing identifiers from the data. This can be done in number of different ways often in combination, these include: Removing variables (The first obvious application of this method is the removal of direct identifiers from the data file.); Global recoding (global recoding consisting in aggregating the values observed in a variable into pre-defined classes, for example, recoding age into five-year age groups); local suppression (which consists in replacing the observed value of one or more variables in a certain record). Anonymization is one solution to minimize the risk of identity disclosure when distributing microdata.
Published in Chapter:
Privacy and the Identity Gap in Socio-Technical Systems
Catherine Heeney (The University of Oxford, UK)
DOI: 10.4018/978-1-60566-264-0.ch008
Abstract
The chapter discusses the traditional expectations about privacy protection and argues that current models for the governance of data do not adequately fulfil these expectations. The traditional models of privacy protection are based on the assumption that strict anomymisation of released statistical data is the way to protect privacy and ensure public trust in the research enterprise. It will be argued that the main barriers to privacy preservation and the perpetuation of public trust are due to the capabilities of information technology on the one hand and the availability of numerous data sources on the other. Furthermore, both types of resource enable certain types of organisation to ‘read’ and categorise other people. The realities of data-processing technologies challenge the dichotomy, present in the legal framework for data-protection, between ‘personal’ and research data. This dichotomy, moreover, is not useful in the protection of informational privacy. The chapter will refer to several examples of uses of data in what are in effect ‘socio-technical systems’, which arguably challenge accepted methods of privacy protection in this area.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR