{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:29:38Z","timestamp":1648859378099},"reference-count":23,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Unc. Fuzz. Knowl. Based Syst."],"published-print":{"date-parts":[[2011,8]]},"abstract":"<jats:p> As more and more organizations collect, store, and release large amounts of personal information, it is increasingly important for the organizations to conduct privacy risk assessment so as to comply with various emerging privacy laws and meet information providers' demands. Existing statistical database security and inference control solutions may not be appropriate for protecting privacy in many new uses of data as these methods tend to be either less or over-restrictive in disclosure limitation or are prohibitively complex in practice. We address a fundamental question in privacy risk assessment which asks: how to accurately derive bounds for protected information from inaccurate released information or, more particularly, from bounds of released information. We give an explicit formula for calculating such bounds from bounds, which we call square bounds or S-bounds. Classic F-bounds in statistics become a special case of S-bounds when all released bounds retrograde to exact values. We propose a recursive algorithm to extend our S-bounds results from two dimensions to high dimensions. To assess privacy risk for a protected database of personal information given some bounds of released information, we define typical privacy disclosure measures. For each type of disclosure, we investigate the distribution patterns of privacy breaches as well as effective and efficient controls that can be used to eliminate privacy risk, both based on our S-bounds results. <\/jats:p>","DOI":"10.1142\/s0218488511007180","type":"journal-article","created":{"date-parts":[[2011,6,30]],"date-time":"2011-06-30T14:42:52Z","timestamp":1309444972000},"page":"685-715","source":"Crossref","is-referenced-by-count":1,"title":["PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS"],"prefix":"10.1142","volume":"19","author":[{"given":"YINGJIU","family":"LI","sequence":"first","affiliation":[{"name":"School of Information Systems, Singapore Management University, 80 Stamford Road, Singapore 178902, Singapore"}]},{"given":"HAIBING","family":"LU","sequence":"additional","affiliation":[{"name":"Department of Operations &amp; Management Information Systems, Leavey School of Business, Santa Clara University, Santa Clara, California 95053-0382, USA"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1143464"},{"key":"rf2","volume-title":"Engaging privacy and information technology in a digital age","year":"2007"},{"key":"rf3","volume-title":"Dilemmas of privacy and surveillance: Challenges of techological change","year":"2007"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1126\/science.305.5681.168"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025671023941"},{"key":"rf13","volume-title":"Les Probabilities, Associ\u00e9es a un Syst\u00e8me d' \u00c9v\u00e9nments Compatibles et D\u00e9pendants","author":"Fr\u00e9chet M.","year":"1940"},{"key":"rf15","unstructured":"C. E.\u00a0Bonferroni, Teoria Statistica delle Classi e Calcolo delle Probabilit\u00e1\u00a08 (Publicazioni del R. Instituto Superiore di Scienze Economiche e Commerciali di Firenze, Florence, Italy, 1936)\u00a0pp. 1\u201362."},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.97.22.11885"},{"key":"rf19","first-page":"363","volume":"18","author":"Dobra A.","journal-title":"Statistical Journal of the United States"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(02)00392-0"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1145\/320613.320617"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1145\/319540.319555"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1145\/1994.383392"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.10.1399"},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1980.10477481"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1145\/319540.319558"},{"key":"rf34","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320068"},{"key":"rf37","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"rf38","first-page":"574","volume":"8","author":"Chin F. Y. L.","journal-title":"IEEE Trans. Software Eng."},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(84)90025-2"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1145\/5925.5928"},{"key":"rf61","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.12.1710"}],"container-title":["International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218488511007180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T03:12:09Z","timestamp":1565147529000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218488511007180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":23,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2011,8]]}},"alternative-id":["10.1142\/S0218488511007180"],"URL":"https:\/\/doi.org\/10.1142\/s0218488511007180","relation":{},"ISSN":["0218-4885","1793-6411"],"issn-type":[{"value":"0218-4885","type":"print"},{"value":"1793-6411","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]}}}