Search results
Results From The WOW.Com Content Network
k-anonymity is an attempt to solve the problem "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful."
Critics of the double-blind review process point out that, despite any editorial effort to ensure anonymity, the process often fails to do so, since certain approaches, methods, writing styles, notations, etc., point to a certain group of people in a research stream, and even to a particular person. [59] [60]
De-anonymization is the reverse process in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source. [3] Generalization and perturbation are the two popular anonymization approaches for relational data. [ 4 ]
An example of application of pseudonymization procedure is creation of datasets for de-identification research by replacing identifying words with words from the same category (e.g. replacing a name with a random name from the names dictionary), [11] [12] [13] however, in this case it is in general not possible to track data back to its origins.
The de-identification process involves masking, generalizing or deleting both direct and indirect identifiers; the definition of this process is not universal. Information in the public domain , even seemingly anonymized, may thus be re-identified in combination with other pieces of available data and basic computer science techniques.
Internet research ethics involves the research ethics of social science, humanities, and scientific research carried out via the Internet. Of particular interest is the example of English Wikipedia and research ethics. [1] The usual view is that private and public spaces become blurred on the Internet.
For example, deindividuation has been found to foster group identification and to induce greater opinion polarization in small groups communicating online. [20] In order to understand effects of factors such as anonymity and reduced cues on group behavior, one needs to take the social and inter-group context into account.
An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural.