Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Khaled El Emam, Luk Arbuckle
Building an Anonymization Pipeline
Preface
Audience
Conventions Used in This Book
Using Code Examples
O’Reilly Online Learning
How to Contact Us
Acknowledgments
1. Introduction
Our Motivation in Writing This Book
Getting to Terms
Regulations
States of Data
Anonymization as Data Protection
Approval or Consent
Purpose Specification
Re-Identification Attacks
Risk-Based Anonymization
About This Book
2. Identifiability Spectrum
Legal Landscape
Disclosure Risk
Types of Disclosure
Dimensions of Data Privacy
Re-Identification Science
Defined Population
Direction of Matching
Structure of Data
Re-Identification Risk
Final Thoughts
3. A Practical Risk-Management Framework
Five Safes of Anonymization
Safe Projects
Safe People
Safe Settings
Safe Data
Safe Outputs
Five Safes in Practice
Final Thoughts
4. Identified Data
Requirements Gathering
Use Cases
Data Flows
Data and Data Subjects
From Primary to Secondary Use
Dealing with Direct Identifiers
Dealing with Indirect Identifiers
From Identified to Anonymized
Mixing Identified with Anonymized
Applying Anonymized to Identified
Final Thoughts
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Building an Anonymization Pipeline
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset