skip to main content
research-article
Open Access

Privacy, anonymity, and big data in the social sciences

Published:01 September 2014Publication History
Skip Abstract Section

Abstract

Quality social science research and the privacy of human subjects require trust.

References

  1. Allen, I. E. and Seaman, J. Grade change: Tracking online education in the United States, 2014; http://sloanconsortium.org/publications/survey/grade-change-2013.Google ScholarGoogle Scholar
  2. DeBoer, J., Ho, A.D., Stump, G.S., and Breslow, L. Changing "course:" Reconceptualizing educational variables for Massive Open Online Courses. Educational Researcher. Published online (2013) before print Feb. 7, 2014.Google ScholarGoogle Scholar
  3. Dwork, C. Differential privacy. Automata, languages and programming. Springer Berlin Heidelberg, 2006, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dwork, C. State of the Art of Privacy Protection {PowerPoint slides}, 2014; http://web.mit.edu/bigdata-priv/agenda.html.Google ScholarGoogle Scholar
  5. Goben, A. and Salo, D. Federal research data requirements set to change. College & Research Libraries News 74, 8 (2013), 421--425; http://crln.acrl.org/content/74/8/421.full.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ho, A.D., Reich, J., Nesterko, S., Seaton, D. T., Mullaney, T., Waldo, J. and Chuang, I. HarvardX and MITx: The First Year of Open Online Courses, Fall 2012--Summer 2013; http://ssrn.com/abstract=2381263Google ScholarGoogle Scholar
  7. Holdren, J.P. Increasing access to the results of federally funded scientific research; http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf.Google ScholarGoogle Scholar
  8. Koedinger, K.R., Baker, R.S.J.d., Cunningham, K., Skogsholm, A., Leber, B. and Stamper, J. A data repository for the EDM community: The PSLC DataShop. In Handbook of Educational Data Mining. C. Romero, S. Ventura, M. Pechenizkiy, R.SJ.d Baker, eds. CRC Press, Boca Raton, FL. 2010.Google ScholarGoogle Scholar
  9. Machanavajjhala, A., Gehrke, J., Kifer, D. and Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowledge Discovery from Data 1,1 (2007), 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. MITx and HarvardX. HarvardX-MITx person-course academic year 2013 de-identified dataset, version 2.0. http://dx.doi.org/10.7910/DVN/26147.Google ScholarGoogle Scholar
  11. MOOCs @ Illinois. FAQ for Faculty, Feb. 7., 2013; http://mooc.illinois.edu/resources/faqfaculty/Google ScholarGoogle Scholar
  12. National Institutes of Health. Final NIH statement on sharing research data, 2003; http://grants.nih.gov/grants/guide/notice-files/NOT-OD-03-032.html.Google ScholarGoogle Scholar
  13. Newman, J. and Oh, S. 8 things you should know about MOOCs. The Chronicle of Higher Education (June 13, 2014); http://chronicle.com/article/8-Things-You-Should-Know-About/146901/.Google ScholarGoogle Scholar
  14. President's Council of Advisors on Science and Technology. Big data and privacy: A technological perspective, 2014; http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf.Google ScholarGoogle Scholar
  15. Privacy Technical Assistance Center. Frequently asked questions---disclosure avoidance, Oct. 2012; http://ptac.ed.gov/sites/default/files/FAQs_disclosure_avoidance.pdf.Google ScholarGoogle Scholar
  16. Siemens, G. Supporting and promoting learning analytics research. Journal of Learning Analytics 1, 1 (2014), 3--5; http://epress.lib.uts.edu.au/journals/index.php/JLA/article/view/3908/4010.Google ScholarGoogle ScholarCross RefCross Ref
  17. Skopek, J.M. Anonymity, the production of goods, and institutional design. Fordham Law Review 82, 4 (2014), 1751--1809; http://ir.lawnet.fordham.edu/flr/vol82/iss4/4/.Google ScholarGoogle Scholar
  18. Sweeney, L. Datafly: A system for providing anonymity in medical data. Database Security, XI: Status and Prospects. T. Lin and S. Qian, eds. Elsevier Science, Amsterdam. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sweeney, L. Simple demographics often identify people uniquely. Health 671 (2000), 1--34, San Francisco, CA.Google ScholarGoogle Scholar
  20. Sweeney, L. k-anonymity: a model for protecting privacy. Intern. J. on Uncertainty, Fuzziness and Knowledge-based Systems 10, 5 (2002), 557--570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. Intern. J. on Uncertainty, Fuzziness and Knowledge-based Systems 10, 5, (2002), 571--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. U.S. Department of Education. Family Educational Rights and Privacy (Federal Register Vol. 73, No. 237). U.S. Government Printing Office, Washington, D.C., http://www.gpo.gov/fdsys/pkg/FR-2008-12-09/pdf/E8-28864.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Privacy, anonymity, and big data in the social sciences

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 57, Issue 9
          September 2014
          94 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/2663191
          • Editor:
          • Moshe Y. Vardi
          Issue’s Table of Contents

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format