Skip to content

Commit d16ff74

Browse files
authored
Updated instructions
1 parent 9224076 commit d16ff74

File tree

1 file changed

+7
-10
lines changed

1 file changed

+7
-10
lines changed

modules/week09/index-09.qmd

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,27 @@ title: "Week 9 - Sensitive data"
88
- Identify and evaluate established approaches and techniques for de-identifying and anonymizing data to mitigate the risk of re-identification.
99
- Apply the acquired techniques while utilizing an R package to quantify the information loss and utility.
1010

11-
## Student notes
11+
## Slides
1212

13-
Before class, install the sdcMicro package if you choose not to use the servers.
13+
- [slides-09.pptx](slides-09.pptx)
1414

15-
If you are testing using sensitive data, make sure to launch it from RStudio, not from the website.
15+
## In-class demo and exercise (Day 2)
1616

17-
## Slides and other materials
17+
## Student notes
1818

19-
- [slides-09.pptx](slides-09.pptx)
19+
Before class, you can go ahead and install the sdcMicro package if you choose not to use the servers.
2020

2121
- Demo: South Park Case [files - update your fork!](https://github.com/UCSB-Library-Research-Data-Services/bren-meds213-spring-2024-class-data/tree/main/week9)
2222

23+
- Instructions for the [Whale Entanglement Exercise](hw-09.qmd)
2324

2425
## Resources
2526

2627
1. sdcMicro Documentation: <https://sdcpractice.readthedocs.io/en/latest/intro.html>
2728

2829
2. sdcMicro Shiny app: <https://sdcappdocs.readthedocs.io/en/latest/introsdcApp.html>
2930

30-
Other useful links can be found on slides.
31+
Other useful links can be found on the slides.
3132

3233
## Suggested readings
3334

@@ -38,7 +39,3 @@ Other useful links can be found on slides.
3839
3. Gehrke, J., Kifer, D., Machanavajjhala, A. (2011). ℓ-Diversity. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. <https://doi.org/10.1007/978-1-4419-5906-5_899>
3940

4041
4. Samarati, P., & Sweeney, L. (1998). Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. <https://dataprivacylab.org/dataprivacy/projects/kanonymity/paper3.pdf>
41-
42-
## In-class exercise (Day 2)
43-
44-
Instructions for the [Whale Entanglement Exercise](hw-09.qmd)

0 commit comments

Comments
 (0)