Open Access

End User Licence to Open Government Data? A Simulated Penetration Attack on Two Social Survey Datasets


Cite

Agarwal, A., K. Hosanagar, and M.D. Smith. 2011. “Location, Location, Location: An Analysis of Profitability of Position in Online Advertising Markets.” Journal of Marketing Research 48: 1057–1073. Doi: http://dx.doi.org/10.1509/jmr.08.0468.Search in Google Scholar

Backstrom, L., C. Dwork, and J. Kleinberg. 2007. “Wherefore Art Thou r3579x?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography.” In Proceedings of the 16th international conference on World Wide Web, 8–12 May 2007, Banff, AB, Canada. 181–190. Available at: http://dl.acm.org/citation.cfm?id=1242598 (accessed 9 November 2015).10.1145/1242572.1242598Search in Google Scholar

Bar-Ilan, J., K. Keenoy, M. Levene, and E. Yaari. 2009. “Presentation Bias Is Significant in Determining User Preference for Search Results-A User Study.” Journal of the American Society for Information Science and Technology 60: 135–149. Doi: http://dx.doi.org/10.1002/asi.20941.Search in Google Scholar

Boshmaf, Y., I. Muslukhov, K. Beznosov, and M. Ripeanu. 2013. “Design and Analysis of a Social Botnet.” Computer Networks 57: 556–578. Doi: http://dx.doi.org/10.1016/j.comnet.2012.06.006.Search in Google Scholar

El Emam, K., E. Jonker, L. Arbuckle, and B. Malin. 2011. “A Systematic Review of Re-Identification Attacks on Health Data.” PloS one 6(12) : e28071. Doi: http://dx.doi.org/10.1371/journal.pone.0126772.Search in Google Scholar

Elliot, M.J. 2009. “Using Targeted Perturbation of Microdata to Protect Against Intelligent Linkage.” In Proceedings of UNECE Work Session on Statistical Confidentiality, 17–19 December 2007, Manchester. Available at: http://www.unece.org/index.php?id=14503#/ (accessed 14 December 2014).Search in Google Scholar

Elliot, M.J. and A. Dale. 1998. “Disclosure Risk for Microdata Report to the European Union ESP/204 62 361–372.” Available at: https://www.escholar.manchester.ac.uk/uk-ac-man-scw:19b497 (accessed 9 November 2015).Search in Google Scholar

Elliot, M.J. and A. Dale. 1999. “Scenarios of Attack: the Data Intruder’s Perspective on Statistical Disclosure Risk.” Netherlands Official Statistics 14: 6–10. Available at: http://bit.ly/1ScX0cS (accessed 9 November 2015).Search in Google Scholar

Elliot, M.J. and E. Mackey. 2014. “The Social Data Environment.” In Digital Enlightenment Yearbook, edited by K. O’Hara, S.L. David, D. de Roure, and C. M-H. Nguyen. 253–263. Doi: http://dx.doi.org/10.3233/978-1-61499-450-3-253.Search in Google Scholar

Gymrek, M., A.L. McGuire, D. Golan, E. Halperin, and Y. Erlich. 2013. “Identifying Personal Genomes by Surname Inference.” Science 339: 321–324. http://dx.doi.org/10.1126/science.1229566.Search in Google Scholar

Ma, Z.M., G. Pant, and O.R.L. Sheng. 2010. “Examining Organic and Sponsored Search Results: A Vendor Reliability Perspective.” Journal of Computer Information Systems 50: 30–38. Available at: http://bit.ly/1MSpcni (accessed 9 November 2015).Search in Google Scholar

Mackey, E. 2009. A Framework for Understanding Statistical Disclosure Control Processes: A Case Study Using the UK’s Neighbourhood Statistics. PhD Thesis, University of Manchester. Available at: http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.502255 (accessed 9 November 2015).Search in Google Scholar

Mackey, E. and M.J. Elliot. 2010. “The Application of Game Theory to Disclosure Events.” Proceedings of UNECE worksession on Statistical Confidentiality, Bilboa, December 2009. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2009/wp.40.e.pdf (accessed 09/11/2015).Search in Google Scholar

Mackey, E. and M.J. Elliot. 2013. “Understanding the Data Environment.” XRDS 20: 37–39. http://dx.doi.org/10.1145/2508973.Search in Google Scholar

Malin, B. and L. Sweeney. 2004. “How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-Identification to Evaluate and Design Anonymity Protection Systems.” Journal of Biomedical Informatics 37: 179–192. http://dx.doi.org/10.1016/j.jbi.2004.04.005.Search in Google Scholar

Moreno, M.A., A. Grant, L. Kacvinsky, P. Moreno, and M. Fleming. 2012. “Older Adolescents’ Views Regarding Participation in Facebook Research.” Journal of Adolescent Health 51: 439–444. http://dx.doi.org/10.1016/j.jadohealth.2012.02.001.Search in Google Scholar

Müller, W., U. Blien, and H. Wirth. 1995. “Identification Risks of Micro Data. Evidence from Experimental Studies.” Sociological Methods and Research 24: 131–157. http://dx.doi.org/10.1177/0049124195024002001.Search in Google Scholar

Narayanan, A. and V. Shmatikov. 2008. “Robust De-Anonymization of Large Sparse Datasets.” In Proceedings of the 2008 IEEE Symposium on Security and Privacy, 18–21 May 2008, Berkeley/Oakland, CA, USA. 111–125. Doi: http://dx.doi.org/10.1109/SP.2008.33.Search in Google Scholar

Narayanan, A. and V. Shmatikov. 2009. “De-Anonymizing Social Networks.” In Proceedings of the 2009 IEEE Symposium on Security and Privacy, 17–20 May 2009, Berkeley/Oakland, CA, USA. 173–187. Doi: http://dx.doi.org/10.1109/Sp.2009.22.Search in Google Scholar

Obal, M. and W. Kunz. 2013. “Trust Development in E-Services: A Cohort Analysis of Millennials and Baby Boomers.” Journal of Service Management 24: 45–63. Doi: http://dx.doi.org/10.1108/09564231311304189.Search in Google Scholar

Paass, G. 1988. “Disclosure Risk and Disclosure Avoidance for Microdata.” Journal of Business and Economic Statistics 6: 487–500. Doi: http://dx.doi.org/10.1080/07350015.1988.10509697.Search in Google Scholar

Tarantino, E. 2013. “A Simple Model of Vertical Search Engines Foreclosure.” Telecommunications Policy 37: 1–12. Doi: http://dx.doi.org/10.1016/j.telpol.2012.06.002.Search in Google Scholar

Vaughan, L. and M. Thelwall. 2004. “Search Engine Coverage Bias: Evidence and Possible Causes.” Information Processing & Management 40: 693–707. Doi: http://dx.doi.org/10.1016/S0306-4573(03)00063-3.Search in Google Scholar

Vaughan, L.W. and Y.J. Zhang. 2007. “Equal Representation by Search Engines? A Comparison of Websites Across Countries and Domains.” Journal of Computer-Mediated Communication 12: 888–909. Doi: http://dx.doi.org/10.1111/j.1083-6101.2007.00355.x.Search in Google Scholar

Whipple, E.C., K.L. Allgood, and E.M. Larue. 2012. “Third-Year Medical Students’ Knowledge of Privacy and Security Issues Concerning Mobile Devices.” Medical Teacher 34: e532–e548. Doi: http://dx.doi.org/10.3109/0142159X.2012.670319.Search in Google Scholar

eISSN:
2001-7367
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Mathematics, Probability and Statistics