{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:30:49Z","timestamp":1760711449675,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":117,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OAC-2232863"],"award-info":[{"award-number":["OAC-2232863"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690270","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1611-1625","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Qualitative Analysis of Practical De-Identification Guides"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2273-7308","authenticated-orcid":false,"given":"Wentao","family":"Guo","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4875-4888","authenticated-orcid":false,"given":"Aditya","family":"Kishore","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4151-6428","authenticated-orcid":false,"given":"Michelle L.","family":"Mazurek","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"John M. Abowd. 2018. Protecting the Confidentiality of America's Statistics: Adopting Modern Disclosure Avoidance Methods at the Census Bureau. https:\/\/www.census.gov\/newsroom\/blogs\/research-matters\/2018\/08\/protecting_the_confi.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.013"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.17"},{"key":"e_1_3_2_1_5_1","unstructured":"Hal Ali. 2023. Privacy-Preserving Usage Data: Under the Hood. https:\/\/blog.1password.com\/privacy-telemetry-deep-dive\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838344.2838930"},{"key":"e_1_3_2_1_7_1","unstructured":"Apple. [n. d.]. Apple Differential Privacy Technical Overview. https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"ARX: Data Anonymization Tool. https:\/\/arx.deidentifier.org\/.","author":"ARX.","year":"2024","unstructured":"ARX. 2024. ARX: Data Anonymization Tool. https:\/\/arx.deidentifier.org\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_10_1","article-title":"Fool's Gold: An Illustrated Critique of Differential Privacy","volume":"16","author":"Bambauer Jane","year":"2014","unstructured":"Jane Bambauer, Krishnamurty Muralidhar, and Rathindra Sarathy. 2014. Fool's Gold: An Illustrated Critique of Differential Privacy. Vanderbilt Journal of Entertainment and Technology Law, Vol. 16, 4 (2014). https:\/\/scholarship.law.vanderbilt.edu\/jetlaw\/vol16\/iss4\/1\/.","journal-title":"Vanderbilt Journal of Entertainment and Technology Law"},{"key":"e_1_3_2_1_11_1","unstructured":"Thijs Benschop and Matthew Welch. 2021. Statistical Disclosure Control for Microdata: A Practice Guide for sdcMicro. https:\/\/sdcpractice.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3547139"},{"key":"e_1_3_2_1_13_1","volume-title":"Catholic Church Official Resigns after Cellphone Data Used to Track Him on Grindr and to Gay Bars. The Washington Post (July","author":"Boorstein Michelle","year":"2021","unstructured":"Michelle Boorstein, Marisa Iati, and Annys Shin. 2021. Top U. S. Catholic Church Official Resigns after Cellphone Data Used to Track Him on Grindr and to Gay Bars. The Washington Post (July 2021). https:\/\/www.washingtonpost.com\/religion\/2021\/07\/20\/bishop-misconduct-resign-burrill\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Differential Perspectives: Epistemic Disconnects Surrounding the U","author":"Boyd Danah","year":"2022","unstructured":"Danah Boyd and Jayshree Sarathy. 2022. Differential Perspectives: Epistemic Disconnects Surrounding the U. S. Census Bureau's Use of Differential Privacy. Harvard Data Science Review Special Issue 2 (June 2022). https:\/\/hdsr.mitpress.mit.edu\/pub\/3vj5j6i0\/release\/3."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sapharm.2020.07.029"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.09.004"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588765"},{"key":"e_1_3_2_1_18_1","unstructured":"CDC. 2022. 2022 Behavioral Risk Factor Surveillance System. https:\/\/www.cdc.gov\/brfss\/annual_data\/annual_2022.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.05.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833668"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security '22","author":"Cohen Aloni","year":"2022","unstructured":"Aloni Cohen. 2022. Attacks on Deidentification's Defenses. In USENIX Security '22. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/cohen."},{"key":"e_1_3_2_1_22_1","unstructured":"Corporate Finance Institute. [n. d.]. Data Anonymization. https:\/\/corporatefinanceinstitute.com\/resources\/business-intelligence\/data-anonymization\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485252"},{"key":"e_1_3_2_1_24_1","volume-title":"Statistik Tidskrift","volume":"15","author":"Dalenius Tore","year":"1977","unstructured":"Tore Dalenius. 1977. Towards a Methodology for Statistical Disclosure Control. Statistik Tidskrift, Vol. 15 (1977). https:\/\/hdl.handle.net\/1813\/111303."},{"key":"e_1_3_2_1_25_1","volume-title":"Committee on National Statistics, Commission on Behavioral and Social Sciences and Education","author":"Duncan George T.","year":"1993","unstructured":"George T. Duncan, Thomas B. Jabine, Virginia A. de Wolf, Panel on Confidentality and Data Access, Committee on National Statistics, Commission on Behavioral and Social Sciences and Education, National Research Council, and Social Science Research Council. 1993. Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. National Academies Press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In International Colloquium on Automata Languages and Programming (Lecture Notes in Computer Science). https:\/\/doi.org\/10.1007\/11787006_1.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.689"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_30_1","unstructured":"eHealth Queensland. 2021. De-Identification and Anonymisation of Data Guideline."},{"key":"e_1_3_2_1_31_1","volume-title":"The Anonymisation Decision-Making Framework: European Practitioners' Guide","author":"Elliot Mark","unstructured":"Mark Elliot, Elaine Mackey, and Kieron O'Hara. 2020. The Anonymisation Decision-Making Framework: European Practitioners' Guide 2nd ed.). UKAN. https:\/\/eprints.soton.ac.uk\/445373\/.","edition":"2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001600"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1201\/b14764"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab135"},{"key":"e_1_3_2_1_35_1","volume-title":"Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In USENIX Security '14","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In USENIX Security '14. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/fredrikson_matthew."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Simson Garfinkel Barbara Guttman Joseph Near Aref Dajani and Phyllis Singer. 2023. De-Identifying Government Datasets: Techniques and Governance. NIST Special Publication 800--188. https:\/\/csrc.nist.gov\/pubs\/sp\/800\/188\/final.","DOI":"10.6028\/NIST.SP.800-188"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268949"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420211"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0045"},{"key":"e_1_3_2_1_40_1","unstructured":"Google Books Ngram Viewer. 2024. De-Identify Deidentify de-Identification Deidentification. https:\/\/books.google.com\/ngrams\/graph?content=de-identify%2Cdeidentify%2Cde-identification%2Cdeidentification&year_start=1800&case_insensitive=on."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X05279903"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035940"},{"key":"e_1_3_2_1_43_1","unstructured":"John P. Holdren. 2013. Increasing Access to the Results of Federally Funded Scientific Research. https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/microsites\/ostp\/ostp_public_access_memo_2013.pdf."},{"key":"e_1_3_2_1_44_1","unstructured":"Anco Hundepool Ramya Ramaswamy Peter-Paul de Wolf Luisa Franconi Ruth Brand and Josep Domingo. 2021. \u03bc-ARGUS. https:\/\/research.cbs.nl\/casc\/mu.htm."},{"key":"e_1_3_2_1_45_1","unstructured":"ICF. 2022. Protocol for Preparing Non-Public Restricted and Public Access Datasets: Zone of Influence Surveys. https:\/\/github.com\/FTF-Survey-Methods-Toolkit\/Feed-The-Future-Survey-Methods-Toolkit-Baseline\/blob\/main\/4.02%20Protocol%20for%20Preparing%20Datasets\/Protocol%20for%20Preparing%20Non-Public%2C%20Restricted%2C%20and%20Public%20Access%20Datasets_20220405.docx."},{"key":"e_1_3_2_1_46_1","unstructured":"Imperva. [n. d.]. Anonymization. https:\/\/www.imperva.com\/learn\/data-security\/anonymization\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Inter-university Consortium for Political and Social Research. [n. d.]. Guide to Social Science Data Preparation and Archiving. https:\/\/www.icpsr.umich.edu\/files\/deposit\/dataprep.pdf."},{"key":"e_1_3_2_1_48_1","unstructured":"Irish Data Protection Commission. 2019. Guidance on Anonymisation and Pseudonymisation. https:\/\/www.dataprotection.ie\/sites\/default\/files\/uploads\/2022-04\/Anonymisation%20and%20Pseudonymisation%20-%20latest%20April%202022.pdf."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3073062"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/2515245917744281"},{"key":"e_1_3_2_1_51_1","unstructured":"Johns Hopkins University Data Services. 2023. Protecting Human Subject Identifiers. https:\/\/guides.library.jhu.edu\/protecting_identifiers\/overview."},{"key":"e_1_3_2_1_52_1","unstructured":"k2view. 2023. What Is Data Anonymization? Techniques Pros Cons and Use Cases. https:\/\/www.k2view.com\/hubfs\/K2view_Data%20Anonymization.pdf."},{"key":"e_1_3_2_1_53_1","volume-title":"Exploring User-Suitable Metaphors for Differentially Private Data Analyses. In SOUPS '22","author":"Karegar Farzaneh","year":"2022","unstructured":"Farzaneh Karegar, Ala Sarah Alaqra, and Simone Fischer-H\u00fcbner. 2022. Exploring User-Suitable Metaphors for Differentially Private Data Analyses. In SOUPS '22. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/karegar."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"e_1_3_2_1_55_1","unstructured":"Daniel Kifer John M. Abowd Robert Ashmead Ryan Cumings-Menon Philip Leclerc Ashwin Machanavajjhala William Sexton and Pavel Zhuravlev. 2022. Bayesian and Frequentist Semantics for Common Variations of Differential Privacy: Applications to the 2020 Census. http:\/\/arxiv.org\/abs\/2209.03310. arxiv: 2209.03310"},{"key":"e_1_3_2_1_56_1","volume-title":"Brooks","author":"King Nigel","year":"2017","unstructured":"Nigel King and Joanna M. Brooks. 2017. Template Analysis for Business and Management Students. SAGE."},{"key":"e_1_3_2_1_57_1","unstructured":"Sarah Kopper Anja Sautmann and James Turitto. 2020. J-PAL Guide to de-Identifying Data. https:\/\/www.povertyactionlab.org\/sites\/default\/files\/research-resources\/J-PAL-guide-to-deidentifying-data.pdf."},{"key":"e_1_3_2_1_58_1","volume-title":"Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing Attitudes. In SOUPS '22","author":"K\u00fchtreiber Patrick","year":"2022","unstructured":"Patrick K\u00fchtreiber, Viktoriya Pak, and Delphine Reinhardt. 2022. Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing Attitudes. In SOUPS '22. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/kuhtreiber."},{"key":"e_1_3_2_1_59_1","unstructured":"La Trobe University. [n. d.]. Sensitive Data. https:\/\/latrobe.libguides.com\/sensitivedata\/introduction."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01171-5"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2021.3132330"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.3886\/ICPSR38601.V2"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pdig.0000027"},{"key":"e_1_3_2_1_66_1","unstructured":"MC. 2020. Anonymizing Data Sets. https:\/\/towardsdatascience.com\/anonymizing-data-sets-c4602e581a35."},{"key":"e_1_3_2_1_67_1","unstructured":"Millennium Challenge Corporation. 2020. MCC Guidelines for Transparent Reproducible and Ethical Data and Documentation (TREDD). https:\/\/www.mcc.gov\/resources\/doc\/guidance-mcc-guidelines-tredd\/."},{"key":"e_1_3_2_1_68_1","unstructured":"MOSTLY AI. 2023. Data Anonymization in Python. https:\/\/mostly.ai\/blog\/data-anonymization-in-python."},{"key":"e_1_3_2_1_69_1","unstructured":"Soumya Mukherjee Aratrika Mustafi Aleksandra Slavkovi\u0107 and Lars Vilhuber. 2023. Assessing Utility of Differential Privacy for RCTs. http:\/\/arxiv.org\/abs\/2309.14581. arxiv: 2309.14581 [cs econ stat]"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.2478\/jos-2023-0019"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0058"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3202793"},{"volume-title":"Explaining the Epsilon Parameter in Differential Privacy. In USENIX Security '23","author":"Nanayakkara Priyanka","key":"e_1_3_2_1_73_1","unstructured":"Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, and Elissa M. Redmiles. 2023. What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy. In USENIX Security '23. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/nanayakkara."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_3_2_1_76_1","unstructured":"Alondra Nelson. 2022. Ensuring Free Immediate and Equitable Access to Federally Funded Research. https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/08\/08--2022-OSTP-Public-Access-Memo.pdf."},{"key":"e_1_3_2_1_77_1","unstructured":"New South Wales Information and Privacy Commission. 2020. De-Identification of Personal Information. https:\/\/www.ipc.nsw.gov.au\/sites\/default\/files\/2021-03\/Fact_Sheet_De-identification_of_personal_information_May_2020.pdf."},{"key":"e_1_3_2_1_78_1","unstructured":"Office of the Australian Information Commissioner. 2018. De-Identification and the Privacy Act. https:\/\/www.oaic.gov.au\/privacy\/privacy-guidance-for-organisations-and-government-agencies\/handling-personal-information\/de-identification-and-the-privacy-act."},{"key":"e_1_3_2_1_79_1","unstructured":"Office of the Victorian Information Commissioner. 2018. An Introduction to De-Identification. https:\/\/ovic.vic.gov.au\/privacy\/resources-for-organisations\/an-introduction-to-de-identification\/."},{"key":"e_1_3_2_1_80_1","volume-title":"UCLA Law Review","volume":"57","author":"Ohm Paul","year":"2010","unstructured":"Paul Ohm. 2010. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review, Vol. 57 (2010). https:\/\/papers.ssrn.com\/abstract=1450006."},{"key":"e_1_3_2_1_81_1","unstructured":"Okera. 2022. A Practical Guide to Data Anonymization and Soft Deletion. https:\/\/www.okera.com\/wp-content\/uploads\/2022\/06\/Okera_Whitepaper_Practical_Guide_Data_Anonymization_R4--1.pdf."},{"key":"e_1_3_2_1_82_1","unstructured":"Personal Data Protection Commission of Singapore. 2022. Guide to Basic Data Anonymization. https:\/\/www.pdpc.gov.sg\/help-and-resources\/2018\/01\/basic-anonymisation."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.845"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","unstructured":"Portage COVID-19 Working Group Kristi Thompson Erin Clary Lucia Costanzo Beth Knazook Nick Rochlin Felicity Tayler Jane Fry Chantal Ripp Kathy Szigeti Qian Zhang Roger Reka Minglu Wang Rebecca Dickson Mark Leggott and Melanie Parlette-Stewart. 2020. De-Identification Guidance. https:\/\/doi.org\/10.5281\/zenodo.4270551.","DOI":"10.5281\/zenodo.4270551"},{"key":"e_1_3_2_1_85_1","unstructured":"Privitar. 2022. The Top 7 Techniques for De-Identifying Data. https:\/\/www.privitar.com\/wp-content\/uploads\/2022\/09\/P1006-EB-Top-7-De-identification-Techniques-DP.pdf."},{"key":"e_1_3_2_1_86_1","unstructured":"Alfred Rossi Andrew Burt and Sophie Stalla-Bourdillon. 2020. Deidentification 101: A Lawyer's Guide to Masking Encryption and Everything in Between. https:\/\/iapp.org\/news\/a\/de-identification-101-a-lawyers-guide-to-masking-encryption-and-everything-in-between\/."},{"key":"e_1_3_2_1_87_1","unstructured":"Alfred Rossi Andrew Burt and Sophie Stalla-Bourdillon. 2020. Deidentification 201: A Lawyer's Guide to Pseudonymization and Anonymization. https:\/\/iapp.org\/news\/a\/de-identification-201-a-lawyers-guide-to-pseudonymization-and-anonymization\/."},{"key":"e_1_3_2_1_88_1","unstructured":"San Jos\u00e9 State University. [n. d.]. Table of De-Identification Techniques. https:\/\/www.sjsu.edu\/research\/docs\/irb-deidentification-techniques-table.pdf."},{"key":"e_1_3_2_1_89_1","unstructured":"Carles Dur\u00e1 Santonja. 2022. 6 Personal Data Anonymization Techniques You Should Know About. https:\/\/blog.pangeanic.com\/6-personal-data-anonymization-techniques."},{"volume-title":"Guide: Data Masking. https:\/\/satoricyber.com\/data-masking\/data-masking-8-techniques-and-how-to-implement-them-successfully\/.","year":"2022","key":"e_1_3_2_1_90_1","unstructured":"Satori. 2022. Guide: Data Masking. https:\/\/satoricyber.com\/data-masking\/data-masking-8-techniques-and-how-to-implement-them-successfully\/."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyad010"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555762"},{"key":"e_1_3_2_1_93_1","unstructured":"Spanish Data Protection Authority. 2019. k-Anonymity as a Privacy Measure. https:\/\/www.aepd.es\/es\/documento\/nota-tecnica-kanonimidad-en.pdf."},{"key":"e_1_3_2_1_94_1","volume-title":"USENIX Security '22","author":"Stadler Theresa","year":"2022","unstructured":"Theresa Stadler, Bristena Oprisanu, and Carmela Troncoso. 2022. Synthetic Data -- Anonymisation Groundhog Day. In USENIX Security '22. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/stadler."},{"key":"e_1_3_2_1_95_1","unstructured":"Sophie Stalla-Bourdillon. 2023. What Is Data De-Identification and Why Is It Important? https:\/\/www.immuta.com\/blog\/what-is-data-de-identification\/."},{"key":"e_1_3_2_1_96_1","unstructured":"Latanya Sweeney. 2000. Simple Demographics Often Identify People Uniquely. https:\/\/dataprivacylab.org\/projects\/identifiability\/."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_98_1","volume-title":"Statistics Netherlands, and Pascal Heus.","author":"Templ Matthias","year":"2024","unstructured":"Matthias Templ, Bernhard Meindl, Alexander Kowarik, Johannes Gussenbauer, Organisation For Economic Co-Operation And Development, Statistics Netherlands, and Pascal Heus. 2024. sdcMicro. https:\/\/cloud.r-project.org\/web\/packages\/sdcMicro\/index.html."},{"key":"e_1_3_2_1_99_1","unstructured":"The New School Information Security & Privacy Office. 2020. Guidelines for Anonymization & Pseudonymization. https:\/\/ispo.newschool.edu\/guidelines\/anonymization-pseudonymization\/."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14060167"},{"key":"e_1_3_2_1_101_1","unstructured":"Treasury Board of Canada Secretariat. 2023. Privacy Implementation Notice 2023 01: De-Identification. https:\/\/www.canada.ca\/en\/treasury-board-secretariat\/services\/access-information-privacy\/access-information-privacy-notices\/2023-01-de-identification.html."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v15i1.602"},{"key":"e_1_3_2_1_103_1","unstructured":"UK Data Service. [n. d.]. Research Data Management. https:\/\/ukdataservice.ac.uk\/learning-hub\/research-data-management\/."},{"key":"e_1_3_2_1_104_1","unstructured":"University of Groningen. 2023. Data Minimization & De-Identification. https:\/\/www.rug.nl\/digital-competence-centre\/privacy-and-data-protection\/data-protection\/de-identification."},{"key":"e_1_3_2_1_105_1","unstructured":"University of South Carolina Institute for Families in Society. 2018. Guidelines and Methods for De-Identifying Protected Health Information. https:\/\/www.schealthviz.sc.edu\/Data\/Sites\/1\/media\/images\/USC_IFS_PHIDataDeIdentification_18.pdf."},{"key":"e_1_3_2_1_106_1","unstructured":"University of Washington Privacy Office. 2019. Data Anonymization and De-Identification: Challenges and Options. https:\/\/privacy.uw.edu\/wp-content\/uploads\/sites\/7\/2021\/03\/DataAnonymization_Aug2019.pdf."},{"key":"e_1_3_2_1_107_1","unstructured":"U.S. Agency for International Development. 2020. DDL Roadmap for Education Programs. https:\/\/www.edu-links.org\/sites\/default\/files\/media\/file\/DDL%20Roadmap_FINAL_07Aug2020_508.pdf."},{"key":"e_1_3_2_1_108_1","unstructured":"U.S. Department of Health and Human Services Office for Civil Rights. 2012. Guidance Regarding Methods for De-Identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html."},{"key":"e_1_3_2_1_109_1","unstructured":"Niek Van Wettere. 2020. Anonymization Tools and Techniques. https:\/\/zenodo.org\/records\/3843319."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376754"},{"volume-title":"Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes","author":"Votipka Daniel","key":"e_1_3_2_1_111_1","unstructured":"Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, and Michelle Mazurek. 2018. Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. In IEEE S&P '18."},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.024"},{"key":"e_1_3_2_1_113_1","volume-title":"The 2020 Census Suggests That People Live Underwater. There's a Reason. The New York Times (April","author":"Wines Michael","year":"2022","unstructured":"Michael Wines. 2022. The 2020 Census Suggests That People Live Underwater. There's a Reason. The New York Times (April 2022). https:\/\/www.nytimes.com\/2022\/04\/21\/us\/census-data-privacy-concerns.html."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017--9514--4"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00088"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24346"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.3886\/ICPSR03724.V8"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:19:33Z","timestamp":1755843573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":117,"alternative-id":["10.1145\/3658644.3690270","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690270","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}