Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy
GJ Matthews, O Harel - Statistics Surveys, 2011 - projecteuclid.org
There is an ever increasing demand from researchers for access to useful microdata files.
However, there are also growing concerns regarding the privacy of the individuals contained …
However, there are also growing concerns regarding the privacy of the individuals contained …
Choice and chance: A conceptual model of paths to information security compromise
S Ransbotham, S Mitra - Information Systems Research, 2009 - pubsonline.informs.org
No longer the exclusive domain of technology experts, information security is now a
management issue. Through a grounded approach using interviews, observations, and …
management issue. Through a grounded approach using interviews, observations, and …
Dare to share: Protecting sensitive knowledge with data sanitization
A Amiri - Decision Support Systems, 2007 - Elsevier
Data sanitization is a process that is used to promote sharing of transactional databases
among organizations while alleviating concerns of individual organizations by preserving …
among organizations while alleviating concerns of individual organizations by preserving …
Current state of information security research in IS
H Zafar, JG Clark - … of the Association for Information Systems, 2009 - aisel.aisnet.org
The importance of information security in a pervasive networked environment is undeniable,
yet there is a lack of research in this area. In this study we conduct a comprehensive survey …
yet there is a lack of research in this area. In this study we conduct a comprehensive survey …
[HTML][HTML] A polynomial-time approximation to optimal multivariate microaggregation
J Domingo-Ferrer, F Sebé, A Solanas - Computers & Mathematics with …, 2008 - Elsevier
Microaggregation is a family of methods for statistical disclosure control (SDC) of microdata
(records on individuals and/or companies), that is, for masking microdata so that they can be …
(records on individuals and/or companies), that is, for masking microdata so that they can be …
From free to fee: Monetizing digital content through expected utility-based recommender systems
This study proposes a novel framework for designing business rule analytics to assist
businesses offering digital content in effectively converting free-only users (FOUs) into …
businesses offering digital content in effectively converting free-only users (FOUs) into …
Maximizing accuracy of shared databases when concealing sensitive patterns
S Menon, S Sarkar… - Information Systems …, 2005 - pubsonline.informs.org
The sharing of databases either within or across organizations raises the possibility of
unintentionally revealing sensitive relationships contained in them. Recent advances in data …
unintentionally revealing sensitive relationships contained in them. Recent advances in data …
Privacy and big data
S Menon, S Sarkar - MIS Quarterly, 2016 - JSTOR
Scalability and privacy form two critical dimensions that will eventually determine the extent
of the success of big data analytics. We present scalable approaches to address privacy …
of the success of big data analytics. We present scalable approaches to address privacy …
Privacy protection in data mining: A perturbation approach for categorical data
XB Li, S Sarkar - Information Systems Research, 2006 - pubsonline.informs.org
To respond to growing concerns about privacy of personal information, organizations that
use their customers' records in data-mining activities are forced to take actions to protect the …
use their customers' records in data-mining activities are forced to take actions to protect the …
How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack
Purpose Cyber-attacks that generate technical disruptions in organisational operations and
damage the reputation of organisations have become all too common in the contemporary …
damage the reputation of organisations have become all too common in the contemporary …