Mastering data privacy: leveraging K-anonymity for robust health data sharing
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm explicitly for educational purposes. The development of the k-anonymity algorithm is complemented by seven validation tests, that have also been used as a basis for constructing five learning scenarios on privacy preservation. The outcomes of this research provide a practical understanding of a well-known privacy preservation technique and extends the familiarity of k-anonymity and the fundamental concepts of privacy protection to a broader audience.
Top-30
Journals
|
1
2
|
|
|
Lecture Notes in Computer Science
2 publications, 15.38%
|
|
|
BMC Medical Informatics and Decision Making
1 publication, 7.69%
|
|
|
Scientific Reports
1 publication, 7.69%
|
|
|
Applied Intelligence
1 publication, 7.69%
|
|
|
Informatics and Health
1 publication, 7.69%
|
|
|
Journal of Information Security and Applications
1 publication, 7.69%
|
|
|
Discover Computing
1 publication, 7.69%
|
|
|
International Journal of Information Security
1 publication, 7.69%
|
|
|
Communications in Computer and Information Science
1 publication, 7.69%
|
|
|
Journal of Medical Internet Research
1 publication, 7.69%
|
|
|
1
2
|
Publishers
|
1
2
3
4
5
6
7
8
|
|
|
Springer Nature
8 publications, 61.54%
|
|
|
Elsevier
2 publications, 15.38%
|
|
|
Institute of Electrical and Electronics Engineers (IEEE)
2 publications, 15.38%
|
|
|
JMIR Publications
1 publication, 7.69%
|
|
|
1
2
3
4
5
6
7
8
|
- We do not take into account publications without a DOI.
- Statistics recalculated weekly.