Big data discovery, privacy, and the application of differential privacy mechanisms

The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer and Internet Lawyer 2015-07, Vol.32 (7), p.10
Hauptverfasser: Sherer, James A, Le, Jenny, Taal, Amie
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 7
container_start_page 10
container_title Computer and Internet Lawyer
container_volume 32
creator Sherer, James A
Le, Jenny
Taal, Amie
description The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_reports_1691259938</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A437058675</galeid><sourcerecordid>A437058675</sourcerecordid><originalsourceid>FETCH-LOGICAL-g1698-cf798ebf8045037f9cbc07712c3c53fff4a824ce508093d9449bce8f47bbd6bc3</originalsourceid><addsrcrecordid>eNptz19LwzAQAPA-KDin3yHo6yrpkjTJ4xz-g4EP6nNJ0ksXadOaZAO_vYEpTBiBu-P43XE5K2YVI1VJJaUXxWWMnxhXdU3wrHi7dx1qVVKoddGMewjfCzQFt1cmF8q3KG0BqWnqnVHJjR6NNlNrIYBPTvV_GA1gtsq7OMSr4tyqPsL1b54XH48P7-vncvP69LJebcquqqUojeVSgLYCU4YJt9JogzmvloYYRqy1VIklNcCwwJK0-XapDQhLudZtrQ2ZFzeHvVMYv3YQUxNgGkOKTd5fLZmURGR0e0Cd6qFx3o4pKDPkzzYrSjhmouYsq_KE6sBDUP3owbrc_ufvTvj8WhicOTmwOBrQu-g8xByi67YpdmoX4zH_AWjkhcI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1691259938</pqid></control><display><type>article</type><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><source>EBSCOhost Business Source Complete</source><creator>Sherer, James A ; Le, Jenny ; Taal, Amie</creator><creatorcontrib>Sherer, James A ; Le, Jenny ; Taal, Amie</creatorcontrib><description>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</description><identifier>ISSN: 1531-4944</identifier><language>eng</language><publisher>Frederick: Aspen Publishers, Inc</publisher><subject>Access control ; Aggregates ; Algorithms ; Big Data ; Computer privacy ; Confidentiality ; Criminal investigations ; Data analysis ; Data collection ; Data integrity ; Datasets ; Disclosure ; Discovery (Law) ; Electronic discovery ; Electronic evidence ; Financial Services Modernization Act 1999-US ; Information technology ; Personal information ; Privacy ; Right of privacy</subject><ispartof>Computer and Internet Lawyer, 2015-07, Vol.32 (7), p.10</ispartof><rights>COPYRIGHT 2015 Aspen Publishers, Inc.</rights><rights>Copyright Aspen Publishers, Inc. Jul 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>312,314,776,780,787</link.rule.ids></links><search><creatorcontrib>Sherer, James A</creatorcontrib><creatorcontrib>Le, Jenny</creatorcontrib><creatorcontrib>Taal, Amie</creatorcontrib><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><title>Computer and Internet Lawyer</title><description>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</description><subject>Access control</subject><subject>Aggregates</subject><subject>Algorithms</subject><subject>Big Data</subject><subject>Computer privacy</subject><subject>Confidentiality</subject><subject>Criminal investigations</subject><subject>Data analysis</subject><subject>Data collection</subject><subject>Data integrity</subject><subject>Datasets</subject><subject>Disclosure</subject><subject>Discovery (Law)</subject><subject>Electronic discovery</subject><subject>Electronic evidence</subject><subject>Financial Services Modernization Act 1999-US</subject><subject>Information technology</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Right of privacy</subject><issn>1531-4944</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>BEC</sourceid><sourceid>BENPR</sourceid><recordid>eNptz19LwzAQAPA-KDin3yHo6yrpkjTJ4xz-g4EP6nNJ0ksXadOaZAO_vYEpTBiBu-P43XE5K2YVI1VJJaUXxWWMnxhXdU3wrHi7dx1qVVKoddGMewjfCzQFt1cmF8q3KG0BqWnqnVHJjR6NNlNrIYBPTvV_GA1gtsq7OMSr4tyqPsL1b54XH48P7-vncvP69LJebcquqqUojeVSgLYCU4YJt9JogzmvloYYRqy1VIklNcCwwJK0-XapDQhLudZtrQ2ZFzeHvVMYv3YQUxNgGkOKTd5fLZmURGR0e0Cd6qFx3o4pKDPkzzYrSjhmouYsq_KE6sBDUP3owbrc_ufvTvj8WhicOTmwOBrQu-g8xByi67YpdmoX4zH_AWjkhcI</recordid><startdate>20150701</startdate><enddate>20150701</enddate><creator>Sherer, James A</creator><creator>Le, Jenny</creator><creator>Taal, Amie</creator><general>Aspen Publishers, Inc</general><scope>N95</scope><scope>XI7</scope><scope>ILT</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K6~</scope><scope>K7-</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20150701</creationdate><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><author>Sherer, James A ; Le, Jenny ; Taal, Amie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g1698-cf798ebf8045037f9cbc07712c3c53fff4a824ce508093d9449bce8f47bbd6bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Aggregates</topic><topic>Algorithms</topic><topic>Big Data</topic><topic>Computer privacy</topic><topic>Confidentiality</topic><topic>Criminal investigations</topic><topic>Data analysis</topic><topic>Data collection</topic><topic>Data integrity</topic><topic>Datasets</topic><topic>Disclosure</topic><topic>Discovery (Law)</topic><topic>Electronic discovery</topic><topic>Electronic evidence</topic><topic>Financial Services Modernization Act 1999-US</topic><topic>Information technology</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Right of privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Sherer, James A</creatorcontrib><creatorcontrib>Le, Jenny</creatorcontrib><creatorcontrib>Taal, Amie</creatorcontrib><collection>Gale Business: Insights</collection><collection>Business Insights: Essentials</collection><collection>LegalTrac (Gale OneFile) - Law</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>eLibrary</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Computer and Internet Lawyer</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sherer, James A</au><au>Le, Jenny</au><au>Taal, Amie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Big data discovery, privacy, and the application of differential privacy mechanisms</atitle><jtitle>Computer and Internet Lawyer</jtitle><date>2015-07-01</date><risdate>2015</risdate><volume>32</volume><issue>7</issue><spage>10</spage><pages>10-</pages><issn>1531-4944</issn><abstract>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</abstract><cop>Frederick</cop><pub>Aspen Publishers, Inc</pub></addata></record>
fulltext fulltext
identifier ISSN: 1531-4944
ispartof Computer and Internet Lawyer, 2015-07, Vol.32 (7), p.10
issn 1531-4944
language eng
recordid cdi_proquest_reports_1691259938
source EBSCOhost Business Source Complete
subjects Access control
Aggregates
Algorithms
Big Data
Computer privacy
Confidentiality
Criminal investigations
Data analysis
Data collection
Data integrity
Datasets
Disclosure
Discovery (Law)
Electronic discovery
Electronic evidence
Financial Services Modernization Act 1999-US
Information technology
Personal information
Privacy
Right of privacy
title Big data discovery, privacy, and the application of differential privacy mechanisms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T21%3A20%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Big%20data%20discovery,%20privacy,%20and%20the%20application%20of%20differential%20privacy%20mechanisms&rft.jtitle=Computer%20and%20Internet%20Lawyer&rft.au=Sherer,%20James%20A&rft.date=2015-07-01&rft.volume=32&rft.issue=7&rft.spage=10&rft.pages=10-&rft.issn=1531-4944&rft_id=info:doi/&rft_dat=%3Cgale_proqu%3EA437058675%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1691259938&rft_id=info:pmid/&rft_galeid=A437058675&rfr_iscdi=true