You seem to be attempting to access an item that has been removed from the repository.
There is an alternative version of the item you are trying to access:
Yang, Mu, Sassone, Vladimiro and O'Hara, Kieron
(2012)
Appendix 3. Practical examples of some anonymisation techniques.
In,
Anonymisation: Managing Data Protection Risk Code of Practice.
Wilmslow, GB.
Information Commissioner's Office, pp. 80-103.
Contact ePrints Soton: eprints@soton.ac.uk
ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2
This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.