scispace - formally typeset
Open AccessPosted Content

Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization

TLDR
It is necessary to respond to the surprising failure of anonymization, and this Article provides the tools to do so.
Abstract
Computer scientists have recently undermined our faith in the privacy-protecting power of anonymization, the name for techniques for protecting the privacy of individuals in large databases by deleting information like names and social security numbers. These scientists have demonstrated they can often 'reidentify' or 'deanonymize' individuals hidden in anonymized data with astonishing ease. By understanding this research, we will realize we have made a mistake, labored beneath a fundamental misunderstanding, which has assured us much less privacy than we have assumed. This mistake pervades nearly every information privacy law, regulation, and debate, yet regulators and legal scholars have paid it scant attention. We must respond to the surprising failure of anonymization, and this Article provides the tools to do so.

read more

Citations
More filters
Book

The Black Box Society: The Secret Algorithms That Control Money and Information

TL;DR: The Black Box Society argues that we all need to be able to do so and to set limits on how big data affects our lives as mentioned in this paper. But who connects the dots about what firms are doing with this information?
Journal ArticleDOI

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy

TL;DR: Cathy O’Neil’s Weapons of Math Destruction is a timely reminder of the power and perils of predictive algorithms and model-driven decision processes and speaks forcefully to the cultural moment the authors share.
Journal ArticleDOI

Privacy in the digital age: a review of information privacy research in information systems

TL;DR: A critical analysis of the literature reveals that information privacy is a multilevel concept, but rarely studied as such, and calls for research on information privacy to use a broader diversity of sampling populations and to publish more design and action research in journal articles that can result in IT artifacts for protection or control of information privacy.
Journal ArticleDOI

Wireless Sensor Networks for Healthcare

TL;DR: This review presents representative applications in the healthcare domain and describes the challenges they introduce to wireless sensor networks due to the required level of trustworthiness and the need to ensure the privacy and security of medical data.
Journal ArticleDOI

The Economics of Privacy

TL;DR: The authors summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy, focusing on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the tradeoffs associated with the privacy and the sharing of personal data.
References
More filters
Journal ArticleDOI

Security-control methods for statistical databases: a comparative study

TL;DR: This paper recommends directing future research efforts toward developing new methods that prevent exact disclosure and provide statistical-disclosure control, while at the same time do not suffer from the bias problem and the 0/1 query-set-size problem.
Proceedings Article

Replacing personally-identifying information in medical records, the Scrub system.

TL;DR: A new approach to locating and replacing personally-identifying information in medical records that extends beyond straight search-and-replace procedures is defined, and techniques for minimizing risk to patient confidentiality are provided.
Posted Content

Examined Lives: Informational Privacy and the Subject as Object

TL;DR: In this article, the authors argue that the debate about data privacy protection should be grounded in an appreciation of the conditions necessary for individuals to develop and exercise autonomy in fact, and that meaningful autonomy requires a degree of freedom from monitoring, scrutiny, and categorization by others.