Henriksen-Bulmer, J. and Jeary, S., 2016. Re-Identification Attacks – A Systematic Literature Review. International Journal of Information Management. (In Press)
Full text available as:
IJIM_2015_152_Revision 1_V023Mar16.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial No Derivatives.
The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level. This paper uses a Systematic Literature Review to investigate the depth and extent of this problem as reported in peer reviewed literature. Using a detailed protocol ,seven research portals were explored, 10,873 database entries were searched, from which a subset of 220 papers were selected for further review. From this total, 55 papers were selected as being within scope and to be included in the final review. The main review findings are that 72.7% of all successful re-identification attacks have taken place since 2009. Most attacks use multiple datasets. The majority of them have taken place on global datasets such as social networking data, and have been conducted by US based researchers. Furthermore, the number of datasets can be used as an attribute. Because privacy breaches have security, policy and legal implications (e.g. data protection, Safe Harbor etc.), the work highlights the need for new and improved anonymisation techniques or indeed, a fresh approach to open source publishing.
|Uncontrolled Keywords:||Re-identification, anonymisation, anonymization, systematic literature review Re-identification attacks: a Systematic Literature Review|
|Group:||Faculty of Science & Technology|
|Deposited By:||Unnamed user with email symplectic@symplectic|
|Deposited On:||02 Aug 2016 13:52|
|Last Modified:||02 Aug 2016 13:52|
Downloads per month over past year
|Repository Staff Only -|