{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:07:07Z","timestamp":1764850027373,"version":"3.46.0"},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"value":"9781643686387","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,2]]},"abstract":"<jats:p>This paper proposes a pragmatic exploration to facilitate the categorisation of personal data as anonymous, quasi-anonymous, or pseudonymous, emphasising contextualised threat modelling and proportionality over binary thresholds. Using an integrated legal analysis and system-level threat model, we map legal criteria to the design features and assess whether a privacy-preserving system like DROPS can credibly achieve anonymisation under the GDPR. This allows us to evaluate the discrepancy between the technical realities of maximising anonymisation techniques and the requirements for anonymisation stipulated by the EU data protection law corpus. The distinguishing feature of this paper is its grounding of the legal analysis in the technical architecture, thereby bridging the gap between abstract regulation and system-level design. This demonstration has the potential to serve as a model for enhancing data protection measures, particularly for entities that handle high-risk or otherwise sensitive data and for regulators to issue new concrete guidance on anonymisation.<\/jats:p>","DOI":"10.3233\/faia251589","type":"book-chapter","created":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:04:58Z","timestamp":1764849898000},"source":"Crossref","is-referenced-by-count":0,"title":["How Anonymous Is Anonymous? A Techno-Legal Exploration"],"prefix":"10.3233","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8135-4202","authenticated-orcid":false,"given":"Stephanie","family":"von Maltzan","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology and FIZ Karlsruhe"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1717-1524","authenticated-orcid":false,"given":"Daniel","family":"Vogel","sequence":"additional","affiliation":[{"name":"University of Bonn and Lamarr Institute"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2913-5270","authenticated-orcid":false,"given":"Marc","family":"Ohm","sequence":"additional","affiliation":[{"name":"University of Bonn and Lamarr Institute"},{"name":"Fraunhofer FKIE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9253-1524","authenticated-orcid":false,"given":"Florian","family":"Idelberger","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology and FIZ Karlsruhe"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Legal Knowledge and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA251589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:04:58Z","timestamp":1764849898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA251589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"ISBN":["9781643686387"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia251589","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,2]]}}}