The University of Southampton
University of Southampton Institutional Repository

Appendix 3. Practical examples of some anonymisation techniques

Appendix 3. Practical examples of some anonymisation techniques
Appendix 3. Practical examples of some anonymisation techniques
In this annex, we will set out a few examples of the anonymisation of data, to indicate the range of techniques available to the information manager. The aim is not to provide a manual of anonymisation, but to give a flavour of the field, and of the variety of the options. We do not pretend that this is an exhaustive list of methods, or that the methods we have chosen are applicable to all anonymisation problems. We try to keep the language as accessible as possible; however, some of these techniques are statistically quite complex, which in some cases is inevitably reflected in the descriptions.
Anonymisation, data reduction, data perturbation, data sharing
80-103
Information Commissioner's Office
Yang, Mu
5b63ff7c-7560-423e-ac2c-e8e19396da7c
Sassone, Vladimiro
df7d3c83-2aa0-4571-be94-9473b07b03e7
O'Hara, Kieron
0a64a4b1-efb5-45d1-a4c2-77783f18f0c4
Yang, Mu
5b63ff7c-7560-423e-ac2c-e8e19396da7c
Sassone, Vladimiro
df7d3c83-2aa0-4571-be94-9473b07b03e7
O'Hara, Kieron
0a64a4b1-efb5-45d1-a4c2-77783f18f0c4

Yang, Mu, Sassone, Vladimiro and O'Hara, Kieron (2012) Appendix 3. Practical examples of some anonymisation techniques. In, Anonymisation: Managing Data Protection Risk Code of Practice. Wilmslow, GB. Information Commissioner's Office, pp. 80-103.

Record type: Book Section

Abstract

In this annex, we will set out a few examples of the anonymisation of data, to indicate the range of techniques available to the information manager. The aim is not to provide a manual of anonymisation, but to give a flavour of the field, and of the variety of the options. We do not pretend that this is an exhaustive list of methods, or that the methods we have chosen are applicable to all anonymisation problems. We try to keep the language as accessible as possible; however, some of these techniques are statistically quite complex, which in some cases is inevitably reflected in the descriptions.

Text
anonymisation_code.pdf - Version of Record
Download (2MB)

More information

Published date: November 2012
Keywords: Anonymisation, data reduction, data perturbation, data sharing
Organisations: Web & Internet Science

Identifiers

Local EPrints ID: 345821
URI: http://eprints.soton.ac.uk/id/eprint/345821
PURE UUID: 407a82d0-4da1-4e5e-9390-04add262f937
ORCID for Kieron O'Hara: ORCID iD orcid.org/0000-0002-9051-4456

Catalogue record

Date deposited: 05 Dec 2012 13:33
Last modified: 15 Mar 2024 03:09

Export record

Contributors

Author: Mu Yang
Author: Vladimiro Sassone
Author: Kieron O'Hara ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×