Examples of Easy-to-implement , Widely Used Methods of Masking for which Analytic Properties are not Justified

@inproceedings{Winkler2008ExamplesOE,
  title={Examples of Easy-to-implement , Widely Used Methods of Masking for which Analytic Properties are not Justified},
  author={William E. Winkler and william. e. winkler},
  year={2008}
}
This paper provides examples that illustrate the severe analytic distortions of many widely used masking methods that have been in use for a number of years. The masking methods are intended to reduce or eliminate re-identification risk in public-use files. Although the masking methods yield files that do not allow reproduction of the analytic properties of original, confidential files, in a number of situations they sometimes allow small amounts of re-identification using elementary methods… CONTINUE READING

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
12 Extracted Citations
42 Extracted References
Similar Papers

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 42 references

Using the P90/P10 Index to Measure U.S. Inequality Trends with Current Population Data: A View from Inside the Census Bureau Vaults,

  • R. V. Burkhauser, S. Feng, S. P. Jenkins
  • Center of Economic Studies Discussion Paper CES…
  • 2007
Highly Influential
4 Excerpts

Masking Procedures for Microdata Disclosure Limitation,

  • W. A. Fuller
  • Journal of Official Statistics,
  • 1993
Highly Influential
9 Excerpts

A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation," American Statistical Association

  • J. J. Kim
  • Proceedings of the Section on Survey Research…
  • 1986
Highly Influential
6 Excerpts

Variety of Constraints,

  • W. E. Yancey, W. E. Winkler, R. H. Creecy
  • 2002
Highly Influential
5 Excerpts

Similar Papers

Loading similar papers…