Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy

GJ Matthews, O Harel - Statistics Surveys, 2011 - projecteuclid.org
There is an ever increasing demand from researchers for access to useful microdata files.
However, there are also growing concerns regarding the privacy of the individuals contained …

Choice and chance: A conceptual model of paths to information security compromise

S Ransbotham, S Mitra - Information Systems Research, 2009 - pubsonline.informs.org
No longer the exclusive domain of technology experts, information security is now a
management issue. Through a grounded approach using interviews, observations, and …

Dare to share: Protecting sensitive knowledge with data sanitization

A Amiri - Decision Support Systems, 2007 - Elsevier
Data sanitization is a process that is used to promote sharing of transactional databases
among organizations while alleviating concerns of individual organizations by preserving …

Current state of information security research in IS

H Zafar, JG Clark - … of the Association for Information Systems, 2009 - aisel.aisnet.org
The importance of information security in a pervasive networked environment is undeniable,
yet there is a lack of research in this area. In this study we conduct a comprehensive survey …

[HTML][HTML] A polynomial-time approximation to optimal multivariate microaggregation

J Domingo-Ferrer, F Sebé, A Solanas - Computers & Mathematics with …, 2008 - Elsevier
Microaggregation is a family of methods for statistical disclosure control (SDC) of microdata
(records on individuals and/or companies), that is, for masking microdata so that they can be …

From free to fee: Monetizing digital content through expected utility-based recommender systems

D Lee, K Nam, I Han, K Cho - Information & Management, 2022 - Elsevier
This study proposes a novel framework for designing business rule analytics to assist
businesses offering digital content in effectively converting free-only users (FOUs) into …

Maximizing accuracy of shared databases when concealing sensitive patterns

S Menon, S Sarkar… - Information Systems …, 2005 - pubsonline.informs.org
The sharing of databases either within or across organizations raises the possibility of
unintentionally revealing sensitive relationships contained in them. Recent advances in data …

Privacy and big data

S Menon, S Sarkar - MIS Quarterly, 2016 - JSTOR
Scalability and privacy form two critical dimensions that will eventually determine the extent
of the success of big data analytics. We present scalable approaches to address privacy …

Privacy protection in data mining: A perturbation approach for categorical data

XB Li, S Sarkar - Information Systems Research, 2006 - pubsonline.informs.org
To respond to growing concerns about privacy of personal information, organizations that
use their customers' records in data-mining activities are forced to take actions to protect the …

How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack

D Boakye, D Sarpong, D Meissner… - Information Technology & …, 2024 - emerald.com
Purpose Cyber-attacks that generate technical disruptions in organisational operations and
damage the reputation of organisations have become all too common in the contemporary …