Big data discovery, privacy, and the application of differential privacy mechanisms
The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.
Gespeichert in:
Veröffentlicht in: | Computer and Internet Lawyer 2015-07, Vol.32 (7), p.10 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 7 |
container_start_page | 10 |
container_title | Computer and Internet Lawyer |
container_volume | 32 |
creator | Sherer, James A Le, Jenny Taal, Amie |
description | The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid. |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_reports_1691259938</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A437058675</galeid><sourcerecordid>A437058675</sourcerecordid><originalsourceid>FETCH-LOGICAL-g1698-cf798ebf8045037f9cbc07712c3c53fff4a824ce508093d9449bce8f47bbd6bc3</originalsourceid><addsrcrecordid>eNptz19LwzAQAPA-KDin3yHo6yrpkjTJ4xz-g4EP6nNJ0ksXadOaZAO_vYEpTBiBu-P43XE5K2YVI1VJJaUXxWWMnxhXdU3wrHi7dx1qVVKoddGMewjfCzQFt1cmF8q3KG0BqWnqnVHJjR6NNlNrIYBPTvV_GA1gtsq7OMSr4tyqPsL1b54XH48P7-vncvP69LJebcquqqUojeVSgLYCU4YJt9JogzmvloYYRqy1VIklNcCwwJK0-XapDQhLudZtrQ2ZFzeHvVMYv3YQUxNgGkOKTd5fLZmURGR0e0Cd6qFx3o4pKDPkzzYrSjhmouYsq_KE6sBDUP3owbrc_ufvTvj8WhicOTmwOBrQu-g8xByi67YpdmoX4zH_AWjkhcI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1691259938</pqid></control><display><type>article</type><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><source>EBSCOhost Business Source Complete</source><creator>Sherer, James A ; Le, Jenny ; Taal, Amie</creator><creatorcontrib>Sherer, James A ; Le, Jenny ; Taal, Amie</creatorcontrib><description>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</description><identifier>ISSN: 1531-4944</identifier><language>eng</language><publisher>Frederick: Aspen Publishers, Inc</publisher><subject>Access control ; Aggregates ; Algorithms ; Big Data ; Computer privacy ; Confidentiality ; Criminal investigations ; Data analysis ; Data collection ; Data integrity ; Datasets ; Disclosure ; Discovery (Law) ; Electronic discovery ; Electronic evidence ; Financial Services Modernization Act 1999-US ; Information technology ; Personal information ; Privacy ; Right of privacy</subject><ispartof>Computer and Internet Lawyer, 2015-07, Vol.32 (7), p.10</ispartof><rights>COPYRIGHT 2015 Aspen Publishers, Inc.</rights><rights>Copyright Aspen Publishers, Inc. Jul 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>312,314,776,780,787</link.rule.ids></links><search><creatorcontrib>Sherer, James A</creatorcontrib><creatorcontrib>Le, Jenny</creatorcontrib><creatorcontrib>Taal, Amie</creatorcontrib><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><title>Computer and Internet Lawyer</title><description>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</description><subject>Access control</subject><subject>Aggregates</subject><subject>Algorithms</subject><subject>Big Data</subject><subject>Computer privacy</subject><subject>Confidentiality</subject><subject>Criminal investigations</subject><subject>Data analysis</subject><subject>Data collection</subject><subject>Data integrity</subject><subject>Datasets</subject><subject>Disclosure</subject><subject>Discovery (Law)</subject><subject>Electronic discovery</subject><subject>Electronic evidence</subject><subject>Financial Services Modernization Act 1999-US</subject><subject>Information technology</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Right of privacy</subject><issn>1531-4944</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>BEC</sourceid><sourceid>BENPR</sourceid><recordid>eNptz19LwzAQAPA-KDin3yHo6yrpkjTJ4xz-g4EP6nNJ0ksXadOaZAO_vYEpTBiBu-P43XE5K2YVI1VJJaUXxWWMnxhXdU3wrHi7dx1qVVKoddGMewjfCzQFt1cmF8q3KG0BqWnqnVHJjR6NNlNrIYBPTvV_GA1gtsq7OMSr4tyqPsL1b54XH48P7-vncvP69LJebcquqqUojeVSgLYCU4YJt9JogzmvloYYRqy1VIklNcCwwJK0-XapDQhLudZtrQ2ZFzeHvVMYv3YQUxNgGkOKTd5fLZmURGR0e0Cd6qFx3o4pKDPkzzYrSjhmouYsq_KE6sBDUP3owbrc_ufvTvj8WhicOTmwOBrQu-g8xByi67YpdmoX4zH_AWjkhcI</recordid><startdate>20150701</startdate><enddate>20150701</enddate><creator>Sherer, James A</creator><creator>Le, Jenny</creator><creator>Taal, Amie</creator><general>Aspen Publishers, Inc</general><scope>N95</scope><scope>XI7</scope><scope>ILT</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K6~</scope><scope>K7-</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20150701</creationdate><title>Big data discovery, privacy, and the application of differential privacy mechanisms</title><author>Sherer, James A ; Le, Jenny ; Taal, Amie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g1698-cf798ebf8045037f9cbc07712c3c53fff4a824ce508093d9449bce8f47bbd6bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Aggregates</topic><topic>Algorithms</topic><topic>Big Data</topic><topic>Computer privacy</topic><topic>Confidentiality</topic><topic>Criminal investigations</topic><topic>Data analysis</topic><topic>Data collection</topic><topic>Data integrity</topic><topic>Datasets</topic><topic>Disclosure</topic><topic>Discovery (Law)</topic><topic>Electronic discovery</topic><topic>Electronic evidence</topic><topic>Financial Services Modernization Act 1999-US</topic><topic>Information technology</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Right of privacy</topic><toplevel>online_resources</toplevel><creatorcontrib>Sherer, James A</creatorcontrib><creatorcontrib>Le, Jenny</creatorcontrib><creatorcontrib>Taal, Amie</creatorcontrib><collection>Gale Business: Insights</collection><collection>Business Insights: Essentials</collection><collection>LegalTrac (Gale OneFile) - Law</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>eLibrary</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Computer and Internet Lawyer</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sherer, James A</au><au>Le, Jenny</au><au>Taal, Amie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Big data discovery, privacy, and the application of differential privacy mechanisms</atitle><jtitle>Computer and Internet Lawyer</jtitle><date>2015-07-01</date><risdate>2015</risdate><volume>32</volume><issue>7</issue><spage>10</spage><pages>10-</pages><issn>1531-4944</issn><abstract>The authors followed up by reaching out within the academic community associated with the algorithms that would support the application ofDifP to determine if our considered application was valid.</abstract><cop>Frederick</cop><pub>Aspen Publishers, Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1531-4944 |
ispartof | Computer and Internet Lawyer, 2015-07, Vol.32 (7), p.10 |
issn | 1531-4944 |
language | eng |
recordid | cdi_proquest_reports_1691259938 |
source | EBSCOhost Business Source Complete |
subjects | Access control Aggregates Algorithms Big Data Computer privacy Confidentiality Criminal investigations Data analysis Data collection Data integrity Datasets Disclosure Discovery (Law) Electronic discovery Electronic evidence Financial Services Modernization Act 1999-US Information technology Personal information Privacy Right of privacy |
title | Big data discovery, privacy, and the application of differential privacy mechanisms |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T21%3A20%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Big%20data%20discovery,%20privacy,%20and%20the%20application%20of%20differential%20privacy%20mechanisms&rft.jtitle=Computer%20and%20Internet%20Lawyer&rft.au=Sherer,%20James%20A&rft.date=2015-07-01&rft.volume=32&rft.issue=7&rft.spage=10&rft.pages=10-&rft.issn=1531-4944&rft_id=info:doi/&rft_dat=%3Cgale_proqu%3EA437058675%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1691259938&rft_id=info:pmid/&rft_galeid=A437058675&rfr_iscdi=true |