{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:05:50Z","timestamp":1776107150411,"version":"3.50.1"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission Horizon 2020","award":["732027"],"award-info":[{"award-number":["732027"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>Anonymization is viewed as a solution to over-exposure of personal information in a data-driven society. Yet how organizations apply anonymization techniques to data for regulatory, ethical or commercial reasons remains underexplored. We investigate how such measures are applied in organizations, asking whether anonymization practices are used, what approaches are considered practical and adequate, and how decisions are made to protect the privacy of data subjects while preserving analytical value. Our findings demonstrate that anonymization is applied to data far less pervasively than expected. Organizations that do employ anonymization often view their practices as sensitive and resort to anonymity by obscurity alongside technical means. Rather than being a purely technical question of applying the right algorithms, anonymization in practice is a complex socio-technical process that relies on multi-stakeholder collaborations. Organizational decision-making about appropriate approaches and the management of responsibility can result in workarounds necessary to negotiate the technical complexity.<\/jats:p>","DOI":"10.1145\/3274335","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T21:21:27Z","timestamp":1541107287000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Going Beyond Obscurity"],"prefix":"10.1145","volume":"2","author":[{"given":"Viktor","family":"Hargitai","sequence":"first","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Irina","family":"Shklovski","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Andrzej","family":"Wasowski","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.022"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2836041.2836044"},{"key":"e_1_2_1_4_1","first-page":"701","article-title":"Fool's Gold: An Illustrated Critique of Differential Privacy","volume":"16","author":"Bambauer Jane","year":"2013","unstructured":"Jane Bambauer, Krishnamurty Muralidhar, and Rathindra Sarathy. 2013. Fool's Gold: An Illustrated Critique of Differential Privacy. Vanderbilt Journal of Entertainment and Technology Law, Vol. 16 (2013), 701. http:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/vanep16&id=733&div=&collection=","journal-title":"Vanderbilt Journal of Entertainment and Technology Law"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-008-9079-2"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864381"},{"key":"e_1_2_1_7_1","unstructured":"Ann Cavoukian and Khaled El Emam. 2011. Dispelling the myths surrounding de-identification: Anonymization remains a strong tool for protecting privacy. Information and Privacy Commissioner of Ontario Canada."},{"key":"e_1_2_1_8_1","unstructured":"Kathy Charmaz. 2014. Constructing Grounded Theory. SAGE."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280695"},{"key":"e_1_2_1_11_1","volume-title":"Mainack Mondal, Fabr\u00edcio Benevenuto, and Krishna P Gummadi.","author":"Correa Denzil","year":"2015","unstructured":"Denzil Correa, Leandro Ara\u00fajo Silva, Mainack Mondal, Fabr\u00edcio Benevenuto, and Krishna P Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.. In ICWSM. 71--80."},{"key":"e_1_2_1_12_1","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"Dalenius Tore","year":"1986","unstructured":"Tore Dalenius. 1986. Finding a needle in a haystack or identifying anonymous census records. Journal of official statistics, Vol. 2, 3 (1986), 329.","journal-title":"Journal of official statistics"},{"key":"e_1_2_1_13_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific reports","author":"De Montjoye Yves-Alexandre","year":"2013","unstructured":"Yves-Alexandre De Montjoye, C\u00e9sar A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, Vol. 3 (2013), 1376."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.97"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_16_1","unstructured":"Nathan Eagle. 2009. Engineering a common good: fair use of aggregated anonymized behavioral data. In First international forum on the application and management of personal electronic information."},{"key":"e_1_2_1_17_1","volume-title":"The Anonymisation Decision - Making Framework. UKAN","author":"Elliot Mark","unstructured":"Mark Elliot, Elaine Mackey, Kieron O'Hara, and Caroline Tudor. 2016. The Anonymisation Decision - Making Framework. UKAN, University of Manchester."},{"key":"e_1_2_1_18_1","volume-title":"431 DATA PROTECTION REPORT Fieldwork","author":"Eurobarometer Special","year":"2015","unstructured":"Special Eurobarometer. 2015. 431 DATA PROTECTION REPORT Fieldwork: March 2015, Publication: June 2015."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_2_1_20_1","volume-title":"Wired (June 13","author":"Greenberg Andy","year":"2016","unstructured":"Andy Greenberg. 2016. Apple's 'differential privacy' is about collecting your data -- but not your data. Wired (June 13, 2016) (June 2016). https:\/\/www.wired.com\/2016\/06\/apples-differential-privacy-collecting-data\/ Retrieved February 13, 2018 from"},{"key":"e_1_2_1_21_1","volume-title":"How One of Apple's Key Privacy Safeguards Falls Short. Wired (Sept","author":"Greenberg Andy","year":"2017","unstructured":"Andy Greenberg. 2017. How One of Apple's Key Privacy Safeguards Falls Short. Wired (Sept. 2017). https:\/\/www.wired.com\/story\/apple-differential-privacy-shortcomings\/ Retrieved February 13, 2018 from"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068787"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235866.3235870"},{"key":"e_1_2_1_25_1","unstructured":"Waltraut Kotschy. 2016. The new General Data Protection Regulation-Is there sufficient pay-off for taking the trouble to anonymize or pseudonymize data."},{"key":"e_1_2_1_26_1","volume-title":"Engineering Culture: Control and Commitment in a High-tech Corporation","author":"Kunda Gideon","year":"1992","unstructured":"Gideon Kunda. 1992. Engineering Culture: Control and Commitment in a High-tech Corporation. Temple University Press. lc91008652"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_2_1_28_1","volume-title":"The Premise, the Proposed Solutions, and the Open Challenges. Philosophy & Technology","author":"Lepri Bruno","year":"2017","unstructured":"Bruno Lepri, Nuria Oliver, Emmanuel Letouz\u00e9, Alex Pentland, and Patrick Vinck. 2017. Fair, Transparent, and Accountable Algorithmic Decision-making Processes: The Premise, the Proposed Solutions, and the Open Challenges. Philosophy & Technology (2017)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1214\/11-SS074"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-011-9133-3"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1075\/li.30.1.03nad"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235956"},{"key":"e_1_2_1_33_1","volume-title":"No silver bullet: De-identification still doesn't work. White Paper","author":"Narayanan Arvind","year":"2014","unstructured":"Arvind Narayanan and Edward W Felten. 2014. No silver bullet: De-identification still doesn't work. White Paper (2014), 1--8."},{"key":"e_1_2_1_34_1","volume-title":"Felten","author":"Narayanan Arvind","year":"2016","unstructured":"Arvind Narayanan, Joanna Huey, and Edward W. Felten. 2016. A Precautionary Approach to Big Data Privacy. In Data Protection on the Move. Springer, Dordrecht, 357--385."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_36_1","first-page":"1701","article-title":"Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization","volume":"57","author":"Ohm Paul","year":"2010","unstructured":"Paul Ohm. 2010. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review, Vol. 57 (2010), 1701. http:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/uclalr57&id=1713&div=&collection=","journal-title":"UCLA Law Review"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_1"},{"key":"e_1_2_1_38_1","unstructured":"Article 29 Data Protection Working Party. 2014. Opinion 05\/2014 on Anonymisation Techniques. http:\/\/www.pdpjournals.com\/docs\/88197.pdf"},{"key":"e_1_2_1_39_1","unstructured":"OPAL Project. 2018. About OPAL - OPAL Project. http:\/\/www.opalproject.org\/about-us\/ Retrieved February 13 2018 from"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_2_1_41_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46","volume":"59","author":"Protection Regulation General Data","year":"2016","unstructured":"General Data Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46. Official Journal of the European Union (OJ), Vol. 59 (2016), 1--88.","journal-title":"Official Journal of the European Union (OJ)"},{"key":"e_1_2_1_42_1","first-page":"703","article-title":"Anonymization and Risk","volume":"91","author":"Rubinstein Ira S.","year":"2016","unstructured":"Ira S. Rubinstein and Woodrow Hartzog. 2016. Anonymization and Risk . Washington Law Review, Vol. 91 (2016), 703. http:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/washlr91&id=719&div=&collection=","journal-title":"Washington Law Review"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.92"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979108"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/782686.782694"},{"key":"e_1_2_1_46_1","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Health (San Francisco), Vol. 671 (2000), 1--34.","journal-title":"Health (San Francisco)"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_48_1","first-page":"163","article-title":"A model for when disclosure helps security: What is different about computer and network security","volume":"3","author":"Swire Peter P","year":"2004","unstructured":"Peter P Swire. 2004. A model for when disclosure helps security: What is different about computer and network security. J. on Telecomm. & High Tech. L., Vol. 3 (2004), 163.","journal-title":"J. on Telecomm. & High Tech. L."},{"key":"e_1_2_1_49_1","volume-title":"Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. arXiv:1709.02753 {cs} (Sept","author":"Tang Jun","year":"2017","unstructured":"Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. 2017. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. arXiv:1709.02753 {cs} (Sept. 2017). http:\/\/arxiv.org\/abs\/1709.02753 arXiv: 1709.02753."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0126"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.144"},{"key":"e_1_2_1_53_1","volume-title":"Looking to comply with GDPR? Here's a primer on anonymization and pseudonymization","author":"Wes Matt","year":"2017","unstructured":"Matt Wes. 2017. Looking to comply with GDPR? Here's a primer on anonymization and pseudonymization. International Association of Privacy Professionals (2017). https:\/\/iapp.org\/news\/a\/looking-to-comply-with-gdpr-heres-a-primer-on-anonymization-and-pseudonymization\/ Retrieved February 13, 2018 from"},{"key":"e_1_2_1_54_1","unstructured":"Philipp Winter and Stefan Lindskog. 2012. How the Great Firewall of China is Blocking Tor. In Free and Open Communications on the Internet. USENIX."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:07Z","timestamp":1750207447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274335"}},"subtitle":["Organizational Approaches to Data Anonymization"],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":54,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1145\/3274335"],"URL":"https:\/\/doi.org\/10.1145\/3274335","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"2018-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}