You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Identify and evaluate established approaches and techniques for de-identifying and anonymizing data to mitigate the risk of re-identification.
9
9
- Apply the acquired techniques while utilizing an R package to quantify the information loss and utility.
10
10
11
-
## Student notes
11
+
## Slides
12
12
13
-
Before class, install the sdcMicro package if you choose not to use the servers.
13
+
-[slides-09.pptx](slides-09.pptx)
14
14
15
-
If you are testing using sensitive data, make sure to launch it from RStudio, not from the website.
15
+
## In-class demo and exercise (Day 2)
16
16
17
-
## Slides and other materials
17
+
## Student notes
18
18
19
-
-[slides-09.pptx](slides-09.pptx)
19
+
Before class, you can go ahead and install the sdcMicro package if you choose not to use the servers.
20
20
21
21
- Demo: South Park Case [files - update your fork!](https://github.com/UCSB-Library-Research-Data-Services/bren-meds213-spring-2024-class-data/tree/main/week9)
22
22
23
+
- Instructions for the [Whale Entanglement Exercise](hw-09.qmd)
@@ -38,7 +39,3 @@ Other useful links can be found on slides.
38
39
3. Gehrke, J., Kifer, D., Machanavajjhala, A. (2011). ℓ-Diversity. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. <https://doi.org/10.1007/978-1-4419-5906-5_899>
39
40
40
41
4. Samarati, P., & Sweeney, L. (1998). Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. <https://dataprivacylab.org/dataprivacy/projects/kanonymity/paper3.pdf>
41
-
42
-
## In-class exercise (Day 2)
43
-
44
-
Instructions for the [Whale Entanglement Exercise](hw-09.qmd)
0 commit comments