Because of the personal nature of information in social networks, some form of anonymization may be applied to the data. |
|
The power can only be used where gaining consent or anonymization are not reasonably practicable options. |
|
The way serious people protect their web-searching privacy is through anonymization. |
|
Where anonymization is not practical or possible, identifying secondary uses up front becomes all the more important. |
|
Analysis of the data, anonymization techniques, and final results of the exercise. |
|
The heart of this inventiveness is the anonymization of individual movements on the network, and the dilution of places for information storage. |
|
However, these measures do not entirely eliminate these risks and do not lead to full anonymization. |
|
Another option for providing anonymity is the anonymization of data through special software. |
|
Potential donors should also be made aware of whether true anonymization of stem cell lines is possible. |
|
We would perhaps like to think that anonymization is the answer to some of our privacy concerns, particularly those relating to secondary uses. |
|
Privacy ultimately is about an individual's ability to control personally identifying information, and anonymization alone can never facilitate this. |
|
With the prevalence of electronic data capture and increased ease of accessibility, anonymization, and aggregation, health care data is increasingly desirable for secondary use by health care planners and managers. |
|
The idea behind such anonymization software is that a record can no longer be linked to an individual, while the relevant parts of the data can still be used for scientific or other purposes. |
|
As best practice, the analyst should also assess the possibilities to use further anonymization techniques with respect to the part of the microdata which may be preserved for a longer period. |
|
While anonymization often protects participants from identification, the ability to link anonymized datasets with other information sources may lead to re-identification of individuals. |
|
This anonymization site is supposed to keep emails from being tracked back to you. |
|
But they removed the protections, the anonymization process. |
|
Concerns can arise about whether particular methods of anonymization adequately shield research subjects from invasion of privacy and breaches of confidentiality. |
|