Westin hotel room layout

Mark S. Borkowski, D. Cotter
{"title":"Westin hotel room layout","authors":"Mark S. Borkowski, D. Cotter","doi":"10.1109/ths.2010.5655227","DOIUrl":null,"url":null,"abstract":"Anonymization—the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual— has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization’s utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ths.2010.5655227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Anonymization—the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual— has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization’s utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.
威斯汀酒店房间布局
匿名化——删除或以其他方式转换信息的过程,以减少将其与可识别的个人联系起来的能力——最近受到了很多批评,但在许多方面对它的兴趣仍然很高。潜在的用例,包括那些在国土安全领域发现的用例,比那些对匿名化的效用产生怀疑的事件所代表的用例差异要大得多。然而,有效和高效地处理这种多样性带来了挑战。本文将介绍国土安全部科学技术局正在开发的表格文本数据的通用匿名化方法。这种方法将匿名化视为一种单一的、非排他性的隐私风险控制,要与其他潜在的控制一起考虑。它所描述的匿名化过程既是一个程序化的风险管理过程,也是一个技术过程。它的目标是使匿名化更多地成为一种系统工程活动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信