{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:42:03Z","timestamp":1742974923440,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402529"},{"type":"electronic","value":"9783319402536"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40253-6_5","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T19:00:31Z","timestamp":1467226831000},"page":"77-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models"],"prefix":"10.1007","author":[{"given":"Min Cherng","family":"Lee","sequence":"first","affiliation":[]},{"given":"Robin","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Lazaridis","sequence":"additional","affiliation":[]},{"given":"An Chow","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yong Kheng","family":"Goh","sequence":"additional","affiliation":[]},{"given":"Wun-She","family":"Yap","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"issue":"422","key":"5_CR1","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1080\/01621459.1993.10476321","volume":"88","author":"JH Albert","year":"1993","unstructured":"Albert, J.H., Chib, S.: Bayesian analysis of binary and polychotomous response data. J. Am. Stat. Assoc. 88(422), 669\u2013679 (1993)","journal-title":"J. Am. Stat. Assoc."},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-25955-8_2","volume-title":"Privacy in Statistical Databases","author":"SE Fienberg","year":"2004","unstructured":"Fienberg, S.E., McIntyre, J.: Data swapping: variations on a theme by Dalenius and Reiss. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 14\u201329. Springer, Heidelberg (2004)"},{"issue":"2","key":"5_CR3","first-page":"383","volume":"9","author":"WA Fuller","year":"1993","unstructured":"Fuller, W.A.: Masking procedures for microdata disclosure limitation. J. Official Stat. 9(2), 383\u2013406 (1993)","journal-title":"J. Official Stat."},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-87471-3_19","volume-title":"Privacy in Statistical Databases","author":"J Drechsler","year":"2008","unstructured":"Drechsler, J., Reiter, J.P.: Accounting for intruder uncertainty due to sampling when estimating identification disclosure risks in partially synthetic data. In: Domingo-Ferrer, J., Sayg\u0131n, Y. (eds.) PSD 2008. LNCS, vol. 5262, pp. 227\u2013238. Springer, Heidelberg (2008)"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1007608224229","volume":"40","author":"T-S Lim","year":"2000","unstructured":"Lim, T.-S., Loh, W.-Y., Shih, Y.-S.: A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Mach. Learn. 40(3), 203\u2013228 (2000)","journal-title":"Mach. Learn."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csda.2015.08.004","volume":"95","author":"MC Lee","year":"2016","unstructured":"Lee, M.C., Mitra, R.: Multiply imputing missing values in data sets with measurement scales using a sequence of generalised linear models. Comput. Stat. Data Anal. 95, 24\u201338 (2016)","journal-title":"Comput. Stat. Data Anal."},{"issue":"2","key":"5_CR7","first-page":"407","volume":"9","author":"RJA Little","year":"1993","unstructured":"Little, R.J.A.: Statistical analysis of masked data. J. Official Stat. 9(2), 407\u2013426 (1993)","journal-title":"J. Official Stat."},{"key":"5_CR8","first-page":"181","volume":"29","author":"JP Reiter","year":"2003","unstructured":"Reiter, J.P.: Inference for partially synthetic, public use microdata sets. Surv. Method. 29, 181\u2013188 (2003)","journal-title":"Surv. Method."},{"issue":"3","key":"5_CR9","first-page":"441","volume":"21","author":"JP Reiter","year":"2005","unstructured":"Reiter, J.P.: Using CART to generate partially synthetic public use microdata. J. Official Stat. 21(3), 441\u2013461 (2005)","journal-title":"J. Official Stat."},{"issue":"1","key":"5_CR10","first-page":"99","volume":"1","author":"JP Reiter","year":"2009","unstructured":"Reiter, J.P., Mitra, R.: Estimating risks of identification disclosure in partially synthetic data. J. Priv. Confidentiality 1(1), 99\u2013110 (2009)","journal-title":"J. Priv. Confidentiality"},{"issue":"2","key":"5_CR11","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Statistical disclosure limitation. J. Official Stat. 9(2), 461\u2013468 (1993)","journal-title":"J. Official Stat."},{"key":"5_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821862","volume-title":"Analysis of incomplete multivariate data","author":"JL Schafer","year":"1997","unstructured":"Schafer, J.L.: Analysis of incomplete multivariate data. Chapman & Hall\/CRC, London (1997)"},{"key":"5_CR13","series-title":"Lecture Notes in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L Willenborg","year":"2001","unstructured":"Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics. Springer, New York (2001)"},{"issue":"1","key":"5_CR14","first-page":"111","volume":"1","author":"M-J Woo","year":"2009","unstructured":"Woo, M.-J., Reiter, J.P., Oganian, A., Karr, A.F.: Global measures of data utility for microdata masked for disclosure limitation. J. Priv. Confidentiality 1(1), 111\u2013124 (2009)","journal-title":"J. Priv. Confidentiality"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40253-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T04:47:10Z","timestamp":1608007630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40253-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402529","9783319402536"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40253-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}