Cargando…
Evolutionary approach to violating group anonymity using third-party data
In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler metho...
Autores principales: | Tavrov, Dan, Chertov, Oleg |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728171/ https://www.ncbi.nlm.nih.gov/pubmed/26844025 http://dx.doi.org/10.1186/s40064-016-1692-9 |
Ejemplares similares
-
Anonymity in third party reproduction: an old dilemma in new packaging?
por: Jacobson, Heather
Publicado: (2016) -
Defectors, not norm violators, are punished by third-parties
por: Bone, Jonathan, et al.
Publicado: (2014) -
Neurocognitive mechanisms of reactions to second- and third-party justice violations
por: Civai, Claudia, et al.
Publicado: (2019) -
Analysis of an evolutionary game of pallet pooling with participation of third-party platform
por: Liu, Cuiping, et al.
Publicado: (2021) -
The MSSM with R-Party Violation
por: Besançon, Marc, et al.
Publicado: (2006)