A review of anonymization for healthcare data

IE Olatunji, J Rauch, M Katzensteiner, M Khosla - Big data, 2024 - liebertpub.com
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …

[HTML][HTML] An analytical review of industrial privacy frameworks and regulations for organisational data sharing

SR Ghorashi, T Zia, M Bewong, Y Jiang - Applied Sciences, 2023 - mdpi.com
This study examines the privacy protection challenges in data sharing between
organisations and third-party entities, focusing on changing collaborations in the digital age …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

A taxonomy of attacks on privacy-preserving record linkage

A Vidanage, T Ranbaduge… - … of Privacy and …, 2022 - journalprivacyconfidentiality.org
Record linkage is the process of identifying records that corresponds to the same real-world
entities across different databases. Due to the absence of unique entity identifiers, record …

Privacy in social media: Identification, mitigation and applications

G Beigi, H Liu - arxiv preprint arxiv:1808.02191, 2018 - arxiv.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

Cross-network social user embedding with hybrid differential privacy guarantees

J Ren, L Jiang, H Peng, L Lyu, Z Liu, C Chen… - Proceedings of the 31st …, 2022 - dl.acm.org
Integrating multiple online social networks (OSNs) has important implications for many
downstream social mining tasks, such as user preference modelling, recommendation, and …

Adversary for social good: Leveraging adversarial attacks to protect personal attribute privacy

X Li, L Chen, D Wu - Acm Transactions on Knowledge Discovery from …, 2023 - dl.acm.org
Social media has drastically reshaped the world that allows billions of people to engage in
such interactive environments to conveniently create and share content with the public …

A vulnerability assessment framework for privacy-preserving record linkage

A Vidanage, P Christen, T Ranbaduge… - ACM Transactions on …, 2023 - dl.acm.org
The linkage of records to identify common entities across multiple data sources has gained
increasing interest over the last few decades. In the absence of unique entity identifiers …

Protecting your online persona: a preferential selective encryption approach for enhanced privacy in tweets, images, memes, and metadata

NP Shetty, B Muniyal, A Priyanshu, D Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of online social networking websites has resulted in the growth of online
communities and increased communication among users. However, sharing personal …