Conceptualising Anonymisation
Birkbak. A. (2013). What is public and private anyway?: a pragmatic take on privacy and democracy. XRDS: Crossroads, – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 18-21. Fall 2013.
Bourne. I. (2013). Personal, pseudonymous, and anonymous data: the problem of identification. XRDS: Crossroads– The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 27-31. Fall 2013.
Cavoukian, A. and Khaled El Emam. (2011). Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy.
Elliot, M., O’hara, K., Raab, C., O’Keefe, C. M., Mackey, E., Dibben, C., … & McCullagh, K. (2018). Functional anonymisation: Personal data and the data environment. Computer Law & Security Review, 34(2), 204-221.
Mackey, E and Elliot. M. (2013). Understanding the Data Environment. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 36-39. Fall 2013.
Oswald, M. (2013). Something bad might happen: Lawyers, anonymisation and risk. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 22-26. Fall 2013.
Differential Privacy
Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg.
Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3-4), 211-407.
Task, C. (2013). An Illustrated Primer in Differential privacy. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 53-57. Fall 2013.
Zuba, M. (2013). Cynthia Dwork on differential privacy. The ACM Magazine for Students – The Complexities of Privacy and Anonymity. Volume 20 Issue 1, Pg. 58-59. Fall 2013.
Privacy
Bennett, C. (2013). The politics of privacy and the privacy of politics: Parties, elections and voter surveillance in Western democracies. Volume 18, number 8. 5th Aug 2013.
Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119.
O’Hara, Kieron (2020) Big data, consequentialism and privacy. In, Macnish, Kevin and Galliott, Jai (eds.) Big Data and Democracy. Edinburgh. Edinburgh University Press, pp. 13-26.
O’Hara, K. (2016). The seven veils of privacy. IEEE Internet Computing, 20(2), 86-91.
Solove, D. J. (2008). Understanding privacy. Harvard University Press.
Reidentification Attacks
Barth-Jones. D. C. (2012). The Re-identification of Governor William Weld’s Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now.
De Montjoye, Y. A., Radaelli, L., & Singh, V. K. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539.
Khaled El Emam K, Jonker E, Arbuckle L, Malin B. (2011). A Systematic Review of Re-Identification Attacks on Health Data. PLoS ONE 6(12).
Sánchez, D., Martínez, S., & Domingo-Ferrer, J. (2016). Comment on “Unique in the shopping mall: On the reidentifiability of credit card metadata”. Science, 351(6279), 1274-1274.
Statistical Disclosure Control
Elliot, M., & Domingo-Ferrer, J. (2018). The future of statistical disclosure control. arXiv preprint arXiv:1812.09204.
Elliot, M. J., Manning, A. M., & Ford, R. W. (2002). A computational algorithm for handling the special uniques problem. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 493-509.
Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Nordholt, E. S., Spicer, K., & De Wolf, P. P. (2012). Statistical disclosure control. John Wiley & Sons.
Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 3-es.
Skinner, C. J., & Elliot, M. J. (2002). A measure of disclosure risk for microdata. Journal of the Royal Statistical Society: series B (statistical methodology), 64(4), 855-867.
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557-570.
Willenborg, L., & De Waal, T. (2012). Elements of statistical disclosure control (Vol. 155). Springer Science & Business Media.
Synthetic Data
Drechsler, J. (2011). Synthetic datasets for statistical disclosure control: theory and implementation (Vol. 201). Springer Science & Business Media.
El Emam, Khaled, Lucy Mosquera, and Richard Hoptroff. (2020). Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data. O’Reilly Media.
Nowok, B., Raab, G. M., & Dibben, C. (2016). synthpop: Bespoke creation of synthetic data in R. J Stat Softw, 74(11), 1-26.
Raghunathan, T. E., Reiter, J. P., & Rubin, D. B. (2003). Multiple imputation for statistical disclosure limitation. Journal of official statistics, 19(1), 1.
Reiter, J. P. (2005). Using CART to generate partially synthetic public use microdata. Journal of Official Statistics, 21(3), 441.
Taub, J., Elliot, M., & Sakshaug, J. W. (2020). The Impact of Synthetic Data Generation on Data Utility with Application to the 1991 UK Samples of Anonymised Records. Trans. Data Priv., 13(1), 1-23.
Key Policy Papers and Reports
Kieron O’Hara. (2011). Transparent Government, Not Transparent Citizens: A Report on Privacy and Transparency for the Cabinet Office. Independent transparency and privacy review. Cabinet Office. 13th September 2011.
Stephan Shakespeare. (2013). Shakespeare review: an independent review of public sector information. Cabinet Office and Department for Business, Innovation & Skills. May 2013.
Policy paper – Open Data White Paper: Unleashing the Potential. (2012). Cabinet Office. 28th June 2012.
Policy paper – Government response to Shakespeare review. (2013). Cabinet Office and Department for Business, Innovation & Skills. 14th June 2013