{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:40:25Z","timestamp":1772768425022,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K032208\/1"],"award-info":[{"award-number":["EP\/K032208\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Review"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1016\/j.clsr.2018.02.001","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T10:01:20Z","timestamp":1519812080000},"page":"204-221","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":26,"title":["Functional anonymisation: Personal data and the data environment"],"prefix":"10.1016","volume":"34","author":[{"given":"Mark","family":"Elliot","sequence":"first","affiliation":[]},{"given":"Kieron","family":"O'Hara","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Raab","sequence":"additional","affiliation":[]},{"given":"Christine M.","family":"O'Keefe","sequence":"additional","affiliation":[]},{"given":"Elaine","family":"Mackey","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Dibben","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Gowans","sequence":"additional","affiliation":[]},{"given":"Kingsley","family":"Purdam","sequence":"additional","affiliation":[]},{"given":"Karen","family":"McCullagh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2018.02.001_bib0010","author":"Arrington"},{"key":"10.1016\/j.clsr.2018.02.001_bib0015","author":"Article 29 Working Party"},{"key":"10.1016\/j.clsr.2018.02.001_bib0020","series-title":"The cost of privacy: destruction of data-mining utility in anonymized data publishing","author":"Brickell","year":"2008"},{"key":"10.1016\/j.clsr.2018.02.001_bib0025","author":"Cavoukian"},{"key":"10.1016\/j.clsr.2018.02.001_bib0030","author":"Cavoukian"},{"issue":"3","key":"10.1016\/j.clsr.2018.02.001_bib0035","first-page":"329","article-title":"Finding a needle in a haystack","volume":"2","author":"Dalenius","year":"1986","journal-title":"J Off Stat"},{"key":"10.1016\/j.clsr.2018.02.001_bib0040","author":"Department for Digital, Culture, Media and Sport"},{"key":"10.1016\/j.clsr.2018.02.001_bib0045","series-title":"Methodological developments in data linkage","first-page":"36","article-title":"Chapter 3: The data linkage environment","author":"Dibben","year":"2015"},{"key":"10.1016\/j.clsr.2018.02.001_bib0050","series-title":"Statistical confidentiality: principles and practice","author":"Duncan","year":"2011"},{"key":"10.1016\/j.clsr.2018.02.001_bib0055","series-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.clsr.2018.02.001_bib0060","series-title":"Ontology alignment: bridging the semantic gap","author":"Ehrig","year":"2007"},{"issue":"Spring","key":"10.1016\/j.clsr.2018.02.001_bib0065","first-page":"6","article-title":"Scenarios of attack: the data adversary's perspective on statistical disclosure risk","volume":"14","author":"Elliot","year":"1999","journal-title":"Neth Off Stat"},{"key":"10.1016\/j.clsr.2018.02.001_bib0070","series-title":"Privacy in statistical databases","first-page":"138","article-title":"Data environment analysis and the key variable mapping system","author":"Elliot","year":"2010"},{"key":"10.1016\/j.clsr.2018.02.001_bib0075","series-title":"The anonymisation decision-making framework","author":"Elliot","year":"2016"},{"issue":"2","key":"10.1016\/j.clsr.2018.02.001_bib0080","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1515\/jos-2016-0019","article-title":"End user licence to open government data? A simulated penetration attack on two social survey datasets","volume":"32","author":"Elliot","year":"2016","journal-title":"J Off Stat"},{"key":"10.1016\/j.clsr.2018.02.001_bib0085","series-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","author":"EU","year":"1995"},{"key":"10.1016\/j.clsr.2018.02.001_bib0090","author":"EU","year":"2016"},{"issue":"2","key":"10.1016\/j.clsr.2018.02.001_bib0095","first-page":"333","article-title":"The value of modest privacy protections in a hyper social world","volume":"12","author":"Hartzog","year":"2014","journal-title":"Colo Technol Law J"},{"issue":"1","key":"10.1016\/j.clsr.2018.02.001_bib0100","first-page":"1","article-title":"The case for online obscurity","volume":"101","author":"Hartzog","year":"2013","journal-title":"Calif Law Rev"},{"issue":"1","key":"10.1016\/j.clsr.2018.02.001_bib0105","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1089\/big.2013.1506","article-title":"Broad data: exploring the emerging web of data","volume":"1","author":"Hendler","year":"2013","journal-title":"Big Data"},{"key":"10.1016\/j.clsr.2018.02.001_bib0110","author":"Horowitz"},{"key":"10.1016\/j.clsr.2018.02.001_bib0115","series-title":"Statistical disclosure control","author":"Hundepool","year":"2012"},{"key":"10.1016\/j.clsr.2018.02.001_bib0120","author":"ICO"},{"key":"10.1016\/j.clsr.2018.02.001_bib0130","author":"Mackey"},{"issue":"1","key":"10.1016\/j.clsr.2018.02.001_bib0135","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/2508973","article-title":"Understanding the data environment","volume":"20","author":"Mackey","year":"2013","journal-title":"XRDS"},{"key":"10.1016\/j.clsr.2018.02.001_bib0140","doi-asserted-by":"crossref","first-page":"305","DOI":"10.2307\/2983043","article-title":"The case for samples of anonymized records from the 1991 census","volume":"154","author":"Marsh","year":"1991","journal-title":"J Roy Stat Soc Ser A"},{"key":"10.1016\/j.clsr.2018.02.001_bib0145","author":"McCallister"},{"issue":"2","key":"10.1016\/j.clsr.2018.02.001_bib0150","first-page":"369","article-title":"It's about time: privacy, information life cycles, and the right to be forgotten","volume":"16","author":"Meg Leta Ambrose","year":"2013","journal-title":"Stanford Technol Law Rev"},{"issue":"2\u20133","key":"10.1016\/j.clsr.2018.02.001_bib0155","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1561\/1800000010","article-title":"The foundations for provenance on the Web","volume":"2","author":"Moreau","year":"2010","journal-title":"Found Trends Web Sci"},{"key":"10.1016\/j.clsr.2018.02.001_bib0160","series-title":"Privacy in statistical databases","first-page":"200","article-title":"Does differential privacy protect Terry Gross' Privacy?","author":"Muralidhar","year":"2010"},{"key":"10.1016\/j.clsr.2018.02.001_bib0165","series-title":"Robust de-anonymization of large sparse datasets","author":"Narayanan","year":"2008"},{"issue":"6","key":"10.1016\/j.clsr.2018.02.001_bib0170","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1743546.1743558","article-title":"Myths and fallacies of \u201cpersonally identifiable information","volume":"53","author":"Narayanan","year":"2010","journal-title":"Commun ACM"},{"key":"10.1016\/j.clsr.2018.02.001_bib0175","series-title":"Privacy in context: technology, policy, and the integrity of social life","author":"Nissenbaum","year":"2010"},{"key":"10.1016\/j.clsr.2018.02.001_bib0180","first-page":"1327","article-title":"The myth of the superuser","volume":"41","author":"Ohm","year":"2008","journal-title":"Univ Calif Davis Law Rev"},{"key":"10.1016\/j.clsr.2018.02.001_bib0185","first-page":"1701","article-title":"Broken promises of privacy: responding to the surprising failure of anonymization","volume":"57","author":"Ohm","year":"2010","journal-title":"UCLA Law Rev"},{"issue":"3","key":"10.1016\/j.clsr.2018.02.001_bib0190","doi-asserted-by":"crossref","first-page":"178","DOI":"10.21552\/EDPL\/2015\/3\/5","article-title":"The right to be forgotten: its potential role in a coherent privacy regime","volume":"1","author":"O'Hara","year":"2015","journal-title":"Eur Data Prot Law Rev"},{"key":"10.1016\/j.clsr.2018.02.001_bib0195","author":"O'Hara"},{"key":"10.1016\/j.clsr.2018.02.001_bib0200","doi-asserted-by":"crossref","first-page":"3081","DOI":"10.1002\/sim.6543","article-title":"Individual privacy versus public good: protecting confidentiality' health research","volume":"34","author":"O'Keefe","year":"2015","journal-title":"Stat Med"},{"key":"10.1016\/j.clsr.2018.02.001_bib0205","author":"O'Keefe"},{"issue":"3","key":"10.1016\/j.clsr.2018.02.001_bib0210","doi-asserted-by":"crossref","DOI":"10.2966\/scrip.110314.245","article-title":"Share and share alike? An examination of trust, anonymisation and data sharing with particular reference to an exploratory research project investigating attitudes to sharing personal data with the public sector","volume":"11","author":"Oswald","year":"2014","journal-title":"SCRIPTed"},{"issue":"4","key":"10.1016\/j.clsr.2018.02.001_bib0215","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1080\/07350015.1988.10509697","article-title":"Disclosure risk and disclosure avoidance for microdata","volume":"6","author":"Paass","year":"1988","journal-title":"J Bus Econ Stat"},{"key":"10.1016\/j.clsr.2018.02.001_bib0220","series-title":"Politik und die regulierung von information","first-page":"129","article-title":"Privacy, Social Values and the Public Interest","author":"Raab","year":"2012"},{"key":"10.1016\/j.clsr.2018.02.001_bib0225","series-title":"Legislating privacy: technology, social values, and public policy","author":"Regan","year":"1995"},{"issue":"2","key":"10.1016\/j.clsr.2018.02.001_bib0230","first-page":"703","article-title":"Anonymization and risk","volume":"91","author":"Rubinstein","year":"2016","journal-title":"Wash Law Rev"},{"key":"10.1016\/j.clsr.2018.02.001_bib0235","first-page":"1814","article-title":"The PII problem: privacy and a new concept of Personally Identifiable Information","volume":"86","author":"Schwartz","year":"2011","journal-title":"New York University Quarterly Review of Law"},{"issue":"2","key":"10.1016\/j.clsr.2018.02.001_bib0240","doi-asserted-by":"crossref","first-page":"97","DOI":"10.21552\/EDPL\/2015\/2\/4","article-title":"The proposed data protection regulation and its potential impact on social sciences research in the UK","volume":"1","author":"Stevens","year":"2015","journal-title":"Eur Data Prot Law Rev"},{"key":"10.1016\/j.clsr.2018.02.001_bib0245","series-title":"Uniqueness of Simple Demographics in the U.S. Population","author":"Sweeney","year":"2000"},{"key":"10.1016\/j.clsr.2018.02.001_bib0250","author":"Tockar"}],"container-title":["Computer Law &amp; Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364918300116?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364918300116?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T15:04:56Z","timestamp":1742742296000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364918300116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["S0267364918300116"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2018.02.001","relation":{},"ISSN":["2212-473X"],"issn-type":[{"value":"2212-473X","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Functional anonymisation: Personal data and the data environment","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Review","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.clsr.2018.02.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Mark Elliot, Kieron O'Hara, Charles Raab, Christine M. O'Keefe, Elaine Mackey, Chris Dibben, Heather Gowans, Kingsley Purdam, Karen McCullagh","name":"copyright","label":"Copyright"}]}}