Books and Papers

Conceptualising Anonymisation

Birkbak. A. (2013). What is public and private anyway?: a pragmatic take on privacy and democracy.  XRDS: Crossroads, – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 18-21. Fall 2013.

Bourne. I. (2013). Personal, pseudonymous, and anonymous data: the problem of identification. XRDS: Crossroads– The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 27-31. Fall 2013.

Cavoukian, A. and Khaled El Emam. (2011). Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy.

Elliot, M., O’hara, K., Raab, C., O’Keefe, C. M., Mackey, E., Dibben, C., … & McCullagh, K. (2018). Functional anonymisation: Personal data and the data environment. Computer Law & Security Review34(2), 204-221.

Mackey, E and Elliot. M. (2013). Understanding the Data Environment. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 36-39. Fall 2013.

Oswald, M. (2013). Something bad might happen: Lawyers, anonymisation and risk. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 22-26. Fall 2013.

Differential Privacy

Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg.

Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science9(3-4), 211-407.

Task, C. (2013). An Illustrated Primer in Differential privacy. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 53-57. Fall 2013.

Zuba, M. (2013). Cynthia Dwork on differential privacy.  The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 58-59. Fall 2013.

Privacy

Bennett, C. (2013). The politics of privacy and the privacy of politics: Parties, elections and voter surveillance in Western democracies. Volume 18, number 8. 5th Aug 2013.

Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev.79, 119.

O’Hara, Kieron (2020) Big data, consequentialism and privacy. In, Macnish, Kevin and Galliott, Jai (eds.) Big Data and Democracy. Edinburgh. Edinburgh University Press, pp. 13-26.

O’Hara, K. (2016). The seven veils of privacy. IEEE Internet Computing20(2), 86-91.

Solove, D. J. (2008). Understanding privacy. Harvard University Press.

Reidentification Attacks

Barth-Jones. D. C. (2012). The Re-identification of Governor William Weld’s Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now.

De Montjoye, Y. A., Radaelli, L., & Singh, V. K. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science347(6221), 536-539.

Khaled El Emam K, Jonker E, Arbuckle L, Malin B. (2011). A Systematic Review of Re-Identification Attacks on Health Data. PLoS ONE 6(12).

Sánchez, D., Martínez, S., & Domingo-Ferrer, J. (2016). Comment on “Unique in the shopping mall: On the reidentifiability of credit card metadata”Science351(6279), 1274-1274.

Statistical Disclosure Control

Elliot, M., & Domingo-Ferrer, J. (2018). The future of statistical disclosure controlarXiv preprint arXiv:1812.09204.

Elliot, M. J., Manning, A. M., & Ford, R. W. (2002). A computational algorithm for handling the special uniques problemInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems10(05), 493-509.

Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Nordholt, E. S., Spicer, K., & De Wolf, P. P. (2012). Statistical disclosure control. John Wiley & Sons.

Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymityACM Transactions on Knowledge Discovery from Data (TKDD)1(1), 3-es.

Skinner, C. J., & Elliot, M. J. (2002). A measure of disclosure risk for microdata. Journal of the Royal Statistical Society: series B (statistical methodology)64(4), 855-867.

Sweeney, L. (2002). k-anonymity: A model for protecting privacyInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems10(05), 557-570.

Willenborg, L., & De Waal, T. (2012). Elements of statistical disclosure control (Vol. 155). Springer Science & Business Media.

Synthetic Data

Drechsler, J. (2011). Synthetic datasets for statistical disclosure control: theory and implementation (Vol. 201). Springer Science & Business Media.

El Emam, Khaled, Lucy Mosquera, and Richard Hoptroff. (2020). Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data. O’Reilly Media.

Nowok, B., Raab, G. M., & Dibben, C. (2016). synthpop: Bespoke creation of synthetic data in RJ Stat Softw74(11), 1-26.

Raghunathan, T. E., Reiter, J. P., & Rubin, D. B. (2003). Multiple imputation for statistical disclosure limitationJournal of official statistics19(1), 1.

Reiter, J. P. (2005). Using CART to generate partially synthetic public use microdataJournal of Official Statistics21(3), 441.

Taub, J., Elliot, M., & Sakshaug, J. W. (2020). The Impact of Synthetic Data Generation on Data Utility with Application to the 1991 UK Samples of Anonymised Records. Trans. Data Priv.13(1), 1-23.

Key Policy Papers and Reports

Kieron O’Hara. (2011). Transparent Government, Not Transparent Citizens: A Report on Privacy and Transparency for the Cabinet Office. Independent transparency and privacy review. Cabinet Office. 13th September 2011.

Stephan Shakespeare. (2013). Shakespeare review: an independent review of public sector information. Cabinet Office and Department for Business, Innovation & Skills. May 2013.

Policy paper – Open Data White Paper: Unleashing the Potential. (2012). Cabinet Office. 28th June 2012.

Policy paper – Government response to Shakespeare review. (2013). Cabinet Office and Department for Business, Innovation & Skills. 14th June 2013