{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T14:10:06Z","timestamp":1717510206740},"reference-count":31,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>Commercial organizations and government agencies that gather, store, share and disseminate data are facing increasing concerns over individual privacy and confidentiality. Confidential data is often masked in the database or prior to release to a third party, through methods such as data perturbation. In this study, re-identification risks of three major additive data perturbation techniques were compared using two different record linkage techniques. The results suggest that re-identification risk of Kim's multivariate noise addition method is similar to that of simple noise addition method. The general additive perturbation method (GADP) has the lowest re-identification risk and therefore provides the highest level of protection. The study also suggests that Fuller's method of assessing re-identification risk may be better suited than the probabilistic record-linkage method of Winkler, for numeric data. The results of this study should be help organizations and government agencies choose an appropriate additive perturbation technique.<\/p>","DOI":"10.4018\/jdm.2014040103","type":"journal-article","created":{"date-parts":[[2014,10,29]],"date-time":"2014-10-29T19:57:11Z","timestamp":1414612631000},"page":"52-74","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation"],"prefix":"10.4018","volume":"25","author":[{"given":"Han","family":"Li","sequence":"first","affiliation":[{"name":"School of Business, Minnesota State University Moorhead, Moorhead, MN, USA"}]},{"given":"Krishnamurty","family":"Muralidhar","sequence":"additional","affiliation":[{"name":"Price College of Business, The University of Oklahoma, Norman, OK, USA"}]},{"given":"Rathindra","family":"Sarathy","sequence":"additional","affiliation":[{"name":"Spears School of Business, Oklahoma State University, Stillwater, OK, USA"}]},{"given":"Xin (Robert)","family":"Luo","sequence":"additional","affiliation":[{"name":"Anderson School of Management, The University of New Mexico, Albuquerque, NM, USA"}]}],"member":"2432","reference":[{"key":"jdm.2014040103-0","article-title":"Fool's gold! An illustrated critique of differential privacy.","author":"J. R.Bambauer","year":"2014","journal-title":"Vanderbilt Journal of Entertainment & Technology Law"},{"key":"jdm.2014040103-1","author":"R. E.Burkard","year":"1980","journal-title":"Assignment and matching problems: solution methods with FORTRAN-Programs"},{"key":"jdm.2014040103-2","doi-asserted-by":"publisher","DOI":"10.2307\/2982975"},{"issue":"1","key":"jdm.2014040103-3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm.","volume":"39","author":"A. P.Dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society. Series A (General)"},{"key":"jdm.2014040103-4","first-page":"111","article-title":"A quantitative comparison of disclosure control methods for microdata","author":"J.Domingo-Ferrer","year":"2001","journal-title":"Confidentiality, Disclosure and Data Access: Theory and Practical Applica-tions for Statistical Agencies"},{"key":"jdm.2014040103-5","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"jdm.2014040103-6","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"jdm.2014040103-7","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1969.10501049"},{"issue":"1","key":"jdm.2014040103-8","first-page":"1","article-title":"A model based for disclosure limitation of business micro-data.","volume":"51","author":"L.Franconi","year":"2002","journal-title":"Journal of the Royal Statistical Society Series D"},{"issue":"2","key":"jdm.2014040103-9","first-page":"383","article-title":"Masking procedures for microdata disclosure limitation.","volume":"9","author":"W. A.Fuller","year":"1993","journal-title":"Journal of Official Statistics"},{"issue":"2","key":"jdm.2014040103-10","first-page":"559","article-title":"A method for limiting disclosure in microdata based on random noise and transformation. Paper presented at the Proceedings of the Section on Survey Research Methods, American Statistical Association, Washington D.C. Melville, N., & McQuaid, M. (2012). Generating shareable statistical databases for business value: Multiple imputation with multimodal perturbation.","volume":"23","author":"J.Kim","year":"1986","journal-title":"Information Systems Research"},{"key":"jdm.2014040103-11","author":"R. A.Moore","year":"1996","journal-title":"Analysis of the Kim-Winkler algorithm for masking microdata files - How much masking is necessary and sufficient? Conjectures for the development of a controlla-ble algorithm"},{"key":"jdm.2014040103-12","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.10.1399"},{"key":"jdm.2014040103-13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025610705286"},{"key":"jdm.2014040103-14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488512400296"},{"key":"jdm.2014040103-15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2001.tb00977.x"},{"key":"jdm.2014040103-16","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.4.389.74"},{"issue":"1","key":"jdm.2014040103-17","first-page":"1","article-title":"Evaluating Laplace noise addition to satisfy differential privacy for numeric data.","volume":"4","author":"R.Sarathy","year":"2011","journal-title":"Transactions on Data Privacy"},{"key":"jdm.2014040103-18","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.48.12.1613.439"},{"key":"jdm.2014040103-19","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(91)90047-I"},{"key":"jdm.2014040103-20","doi-asserted-by":"publisher","DOI":"10.1145\/1994.383392"},{"key":"jdm.2014040103-21","unstructured":"United States General Accounting Office. (2001). Record linkage and privacy: Issues in creating new federal research and statistical information. (GAO-01-126SP). Retrieved from http:\/\/www.gao.gov\/new.items\/d01126sp.pdf"},{"key":"jdm.2014040103-22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0121-9"},{"key":"jdm.2014040103-23","unstructured":"Winkler, W. E. (1993). Improved decision rules in the Fellegi-Sunter model of record linkage. Proceedings of the Section on Survey Research Methods. American Statistical Association, 274-279."},{"key":"jdm.2014040103-24","first-page":"467","article-title":"Advanced methods for record linkage.","author":"W. E.Winkler","year":"1995","journal-title":"Proceedings of the American Statistical Association Section on Survey Research Methods"},{"key":"jdm.2014040103-25","first-page":"355","article-title":"Matching and record linkage","author":"W. E.Winkler","year":"1995","journal-title":"Business Survey Methods"},{"key":"jdm.2014040103-26","unstructured":"Winkler, W. E. (1997). Producing public-use microdata that are analytically valid and confiden-tial. Paper presented at the Proceedings of the Section on Survey Research Methods. American Statistical Associa-tion."},{"key":"jdm.2014040103-27","author":"W. E.Winkler","year":"2000","journal-title":"Frequency-based matching in Fellegi-Sunter model of record linkage Research Report Series: Statistical Research Division"},{"key":"jdm.2014040103-28","author":"W. E.Winkler","year":"2000","journal-title":"Using EM algorithm for weight computation in the Fellegi-Sunter Model of Record Linkage: Statistical Research Division, Washing-ton"},{"key":"jdm.2014040103-29","author":"W. E.Winkler","year":"2006","journal-title":"Overview of record linkage and current research directions: Statistical Research Division, Washing-ton"},{"key":"jdm.2014040103-30","author":"W. E.Yancey","year":"2002","journal-title":"Disclosure risk assessment in perturbat-ive microdata protection: Statistical Research Division, Washing-ton"}],"container-title":["Journal of Database Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=117744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T13:57:20Z","timestamp":1717509440000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdm.2014040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jdm.2014040103","relation":{},"ISSN":["1063-8016","1533-8010"],"issn-type":[{"value":"1063-8016","type":"print"},{"value":"1533-8010","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}