Online discussion: K-anonymity and other de-identification frameworks (an introduction)


/ October 13, 2015

Convo_bubblesJoin us Friday, November 6 at 11am EST (4pm GMT) for an introduction to k-anonymity and other de-identification frameworks with Max Shron, founder of Polynumeral.

So far in our de-identifying data discussion series, we’ve discussed de-identification basics with Mark Elliot, and risk analysis and mitigation strategies with Sara-Jayne Terp. Now we want to dive deeper into the technical de-identification frameworks that are available to practitioners.

In this online discussion, Max will talk about k-anonymity, l-diversity, and, if time permits, t-closeness, and briefly touch on some of the tools available for enacting these approaches to data privacy. Although the content is more technically-minded, it doesn’t require any specific background other than some comfort with thinking algorithmically. Participants of this discussion will come away with a better understanding of why these different frameworks matter (that is, what they defend against) and what the potential caveats are with each.

If you have experience using k-anonymity, l-diversity, t-closeness or other formal anonymization frameworks, we hope you’ll join this discussion and share your experience.

This online discussion will start with a presentation from Max and then will open it up for discussion among the attendees. This discussion will be recorded and shared on our website. If you want to join this discussion, please RSVP using this form. Once you have RSVP’d, you will receive instructions on how to join the call.

Questions? Concerns? You can contact me directly.

We look forward to exploring these de-identification frameworks with all of you!

– Kristin Antin and the responsible data team

Kristin Antin

About the contributor

Kristin has a background in human rights and computer science, and has worked as a community-builder and technology problem-solver in the human rights community since 2007. As Director of Programmes at HURIDOCS, she strives to ensure the services and tools we provide to their partners truly help them achieve their human rights goals. She is passionate about peer-to-peer exchange and believes that if we do it well, we have so much to learn from each other.

See Kristin's Articles

4 thoughts on "Online discussion: K-anonymity and other de-identification frameworks (an introduction)"

Leave a Reply


Related /

/ May 16, 2017

Responsible data considerations for open source investigation in human rights

/ December 12, 2016

Social media intelligence, the wayward child of open source intelligence

/ November 28, 2016

Responsible Data and Project Design