Privacy and Confidentiality in Service Science and Big Data Analytics

Vast amounts of data are now being collected from census and surveys, scientific research, instruments, observation of consumer and internet activities, and sensors of many kinds. These data hold a wealth of information, however there is a risk that personal privacy will not be protected when they are accessed and used.

[1]  Jerome P. Reiter,et al.  Categorical data regression diagnostics for remote access servers , 2005 .

[2]  Jerome P. Reiter,et al.  Towards Unrestricted Public Use Business Microdata: The Synthetic Longitudinal Business Database , 2011 .

[3]  George T. Duncan,et al.  Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .

[4]  Olli Pitkänen,et al.  Legal research topics in user-centric services , 2008, IBM Syst. J..

[5]  Josep Domingo-Ferrer,et al.  Inference Control in Statistical Databases , 2002, Lecture Notes in Computer Science.

[6]  A. J. Bass,et al.  Population‐based linkage of health records in Western Australia: development of a health services research linked database , 1999, Australian and New Zealand journal of public health.

[7]  Jerome P. Reiter,et al.  Towards Unrestricted Public Use Business Microdata: The Synthetic Longitudinal Business Database , 2011 .

[8]  R. Lyons,et al.  The SAIL Databank: building a national architecture for e-health research and evaluation , 2009, BMC health services research.

[9]  Noriaki Izumi,et al.  Service Science, Quo Vadis? , 2010, Int. J. Serv. Sci. Manag. Eng. Technol..

[10]  L. Cox Linear sensitivity measures in statistical disclosure control , 1981 .

[11]  Stephen L. Vargo,et al.  The Service-dominant Logic of Marketing: Dialog, Debate, and Directions , 2006 .

[12]  Josep Domingo-Ferrer,et al.  Statistical Disclosure Control: Hundepool/Statistical Disclosure Control , 2012 .

[13]  Scott E. Sampson,et al.  Foundations and Implications of a Proposed Unified Services Theory , 2006 .

[14]  John M. Abowd,et al.  Final Report to the Social Security Administration on the SIPP/SSA/IRS Public Use File Project , 2006 .

[15]  Jerome P. Reiter,et al.  Using CART to generate partially synthetic public use microdata , 2005 .

[16]  George T. Duncan,et al.  Disclosure Risk vs. Data Utility: The R-U Confidentiality Map , 2003 .

[17]  Jerome P. Reiter,et al.  Data Dissemination and Disclosure Limitation in a World Without Microdata: A Risk-Utility Framework for Remote Access Analysis Servers , 2005 .

[18]  Mark Westcott,et al.  Protecting confidentiality in statistical analysis outputs from a virtual data centre , 2013 .

[19]  Jerome P. Reiter,et al.  Model Diagnostics for Remote Access Regression Servers , 2003, Stat. Comput..

[20]  Christine M. O'Keefe,et al.  Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia , 2014, Privacy in Statistical Databases.

[21]  J. Rao,et al.  Wiley Series in Survey Methodology , 2005 .

[22]  Damien McAullay,et al.  Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics® , 2008, Comput. Methods Programs Biomed..

[23]  C. Skinner,et al.  The case for samples of anonymized records from the 1991 census. , 1991, Journal of the Royal Statistical Society. Series A,.

[24]  Natalie Shlomo,et al.  Assessing Identification Risk in Survey Microdata Using Log-Linear Models , 2008 .

[25]  Paul P. Maglio,et al.  Steps Toward a Science of Service Systems , 2007, Computer.

[26]  Josep Domingo-Ferrer,et al.  Statistical Disclosure Control , 2012 .

[27]  A Wajda,et al.  Record Linkage Strategies , 1991, Methods of Information in Medicine.

[28]  Dale A. Robertson,et al.  Cell Suppression: Experience and Theory , 2002, Inference Control in Statistical Databases.