Abstract
Quality social science research and the privacy of human subjects require trust.
- Allen, I. E. and Seaman, J. Grade change: Tracking online education in the United States, 2014; http://sloanconsortium.org/publications/survey/grade-change-2013.Google Scholar
- DeBoer, J., Ho, A.D., Stump, G.S., and Breslow, L. Changing "course:" Reconceptualizing educational variables for Massive Open Online Courses. Educational Researcher. Published online (2013) before print Feb. 7, 2014.Google Scholar
- Dwork, C. Differential privacy. Automata, languages and programming. Springer Berlin Heidelberg, 2006, 1--12. Google ScholarDigital Library
- Dwork, C. State of the Art of Privacy Protection {PowerPoint slides}, 2014; http://web.mit.edu/bigdata-priv/agenda.html.Google Scholar
- Goben, A. and Salo, D. Federal research data requirements set to change. College & Research Libraries News 74, 8 (2013), 421--425; http://crln.acrl.org/content/74/8/421.full.Google ScholarCross Ref
- Ho, A.D., Reich, J., Nesterko, S., Seaton, D. T., Mullaney, T., Waldo, J. and Chuang, I. HarvardX and MITx: The First Year of Open Online Courses, Fall 2012--Summer 2013; http://ssrn.com/abstract=2381263Google Scholar
- Holdren, J.P. Increasing access to the results of federally funded scientific research; http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf.Google Scholar
- Koedinger, K.R., Baker, R.S.J.d., Cunningham, K., Skogsholm, A., Leber, B. and Stamper, J. A data repository for the EDM community: The PSLC DataShop. In Handbook of Educational Data Mining. C. Romero, S. Ventura, M. Pechenizkiy, R.SJ.d Baker, eds. CRC Press, Boca Raton, FL. 2010.Google Scholar
- Machanavajjhala, A., Gehrke, J., Kifer, D. and Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowledge Discovery from Data 1,1 (2007), 3. Google ScholarDigital Library
- MITx and HarvardX. HarvardX-MITx person-course academic year 2013 de-identified dataset, version 2.0. http://dx.doi.org/10.7910/DVN/26147.Google Scholar
- MOOCs @ Illinois. FAQ for Faculty, Feb. 7., 2013; http://mooc.illinois.edu/resources/faqfaculty/Google Scholar
- National Institutes of Health. Final NIH statement on sharing research data, 2003; http://grants.nih.gov/grants/guide/notice-files/NOT-OD-03-032.html.Google Scholar
- Newman, J. and Oh, S. 8 things you should know about MOOCs. The Chronicle of Higher Education (June 13, 2014); http://chronicle.com/article/8-Things-You-Should-Know-About/146901/.Google Scholar
- President's Council of Advisors on Science and Technology. Big data and privacy: A technological perspective, 2014; http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf.Google Scholar
- Privacy Technical Assistance Center. Frequently asked questions---disclosure avoidance, Oct. 2012; http://ptac.ed.gov/sites/default/files/FAQs_disclosure_avoidance.pdf.Google Scholar
- Siemens, G. Supporting and promoting learning analytics research. Journal of Learning Analytics 1, 1 (2014), 3--5; http://epress.lib.uts.edu.au/journals/index.php/JLA/article/view/3908/4010.Google ScholarCross Ref
- Skopek, J.M. Anonymity, the production of goods, and institutional design. Fordham Law Review 82, 4 (2014), 1751--1809; http://ir.lawnet.fordham.edu/flr/vol82/iss4/4/.Google Scholar
- Sweeney, L. Datafly: A system for providing anonymity in medical data. Database Security, XI: Status and Prospects. T. Lin and S. Qian, eds. Elsevier Science, Amsterdam. 1998. Google ScholarDigital Library
- Sweeney, L. Simple demographics often identify people uniquely. Health 671 (2000), 1--34, San Francisco, CA.Google Scholar
- Sweeney, L. k-anonymity: a model for protecting privacy. Intern. J. on Uncertainty, Fuzziness and Knowledge-based Systems 10, 5 (2002), 557--570. Google ScholarDigital Library
- Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. Intern. J. on Uncertainty, Fuzziness and Knowledge-based Systems 10, 5, (2002), 571--588. Google ScholarDigital Library
- U.S. Department of Education. Family Educational Rights and Privacy (Federal Register Vol. 73, No. 237). U.S. Government Printing Office, Washington, D.C., http://www.gpo.gov/fdsys/pkg/FR-2008-12-09/pdf/E8-28864.pdfGoogle Scholar
Index Terms
- Privacy, anonymity, and big data in the social sciences
Recommendations
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While ...
Hiding personalised anonymity of attributes using privacy preserving data mining
Privacy preserving data mining PPDM is a new direction in the area of data mining, where privacy preserving techniques have been applied to maintain the data privacy. Example through the process of data mining the sensitive data of an individual can be ...
Is Privacy possible without Anonymity?: The case for microblogging services
EuroSec '19: Proceedings of the 12th European Workshop on Systems SecurityTraditional approaches to privacy are usually based on top of anonymizing or pseudonymizing systems. For example, users who would like to protect their identity and/or hide their activities while browsing the web frequently use anonymizing systems (e.g.,...
Comments