306
Views
0
CrossRef citations to date
0
Altmetric
Articles

An empirical test of household identification risk in geomasked maps

ORCID Icon, ORCID Icon & ORCID Icon
Pages 475-488 | Received 14 Mar 2018, Accepted 02 Nov 2018, Published online: 28 Nov 2018

References

  • Abdelmoty, A. I., & Alrayes, F. (2017). Towards understanding location privacy awareness on geo-social networks. ISPRS International Journal of Geo-Information, 6(4), 109. doi:10.3390/ijgi6040109
  • Armstrong, M. P., Rushton, G., & Zimmerman, D. L. (1999). Geographically masking health data to preserve confidentiality. Statistics in Medicine, 18(5), 497–525. doi:10.1002/(SICI)1097-0258(19990315)18:5%3C497::AID-SIM45%3E3.0.CO;2-%23
  • Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacygrid. In J. Huai, R. Chen, H.-W. Hon, Y. Liu, W.-Y. Ma, A. Tomkins, & X. Zhang (Eds.), Proceedings of the 17th international conference on World Wide Web (pp. 237–246). New York: ACM. doi:10.1145/1367497.1367531
  • Bengtsson, C., Persson, M., & Willenhag, P. (2005). Gender and overconfidence. Economics Letters, 86(2), 199–203. doi:10.1016/j.econlet.2004.07.012
  • Biland, J., & Çöltekin, A. (2017). An empirical assessment of the impact of the light direction on the relief inversion effect in shaded relief maps: NNW is better than NW. Cartography and Geographic Information Science, 44(4), 358–372. doi:10.1080/15230406.2016.1185647
  • Clarke, K. C. (2016). A multiscale masking method for point geographic data. International Journal of Geographical Information Science, 30(2), 300–315. doi:10.1080/13658816.2015.1085540
  • Curtis, A. J., Mills, J. W., & Leitner, M. (2006). Spatial confidentiality and GIS: Re-engineering mortality locations from published maps about Hurricane Katrina. International Journal of Health Geographics, 5(1), 44. doi:10.1186/1476-072X-5-44
  • Dahlbom, L., Jakobsson, A., Jakobsson, N., & Kotsadam, A. (2011). Gender and overconfidence: Are girls really overconfident? Applied Economics Letters, 18(4), 325–327. doi:10.1080/13504851003670668
  • Dunn, O. J. (1964). Multiple comparisons using rank sums. Technometrics, 6(3), 241–252. doi:10.2307/1266041
  • Egenhofer, M. J., & Franzosa, R. D. (1991). Point-set topological spatial relations. International Journal of Geographical Information Systems, 5(2), 161–174. doi:10.1080/02693799108927841
  • Ghinita, G., Zhao, K., Papadias, D., & Kalnis, P. (2010). A reciprocal framework for spatial k-anonymity. Information Systems, 35(3), 299–314. doi:10.1016/j.is.2009.10.001
  • Goodchild, M. F., & Janelle, D. G. (2010). Toward critical spatial thinking in the social sciences and humanities. GeoJournal, 75(1), 3–13. doi:10.1007/s10708-010-9340-3
  • Hampton, K. H., Fitch, M. K., Allshouse, W. B., Doherty, I. A., Gesink, D. C., Leone, P. A., … Miller, W. C. (2010). Mapping health data: Improved privacy protection with donut method geomasking. American Journal of Epidemiology, 172(9), 1062–1069. doi:10.1093/aje/kwq248
  • Kounadi, O., Bowers, K., & Leitner, M. (2015). Crime mapping on-line: Public perception of privacy issues. European Journal on Criminal Policy and Research, 21(1), 167–190. doi:10.1007/s10610-014-9248-4
  • Kounadi, O., & Leitner, M. (2015a). Defining a threshold value for maximum spatial information loss of masked geo-data. ISPRS International Journal of Geo-Information, 4(2), 572–590. doi:10.3390/ijgi4020572
  • Kounadi, O., & Leitner, M. (2015b). Spatial information divergence: Using global and local indices to compare geographical masks applied to crime data. Transactions in GIS, 19(5), 737–757. doi:10.1111/tgis.12125
  • Kruskal, W. H., & Wallis, W. A. (1952). Use of ranks in one-criterion variance analysis. Journal of the American Statistical Association, 47(260), 583–621. doi:10.2307/2280779
  • Kwan, M.-P., Casas, I., & Schmitz, B. (2004). Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information and Geovisualization, 39(2), 15–28. doi:10.3138/X204-4223-57MK-8273
  • Leitner, M., & Curtis, A. (2004). Cartographic guidelines for geographically masking the locations of confidential point data. Cartographic Perspectives, (49), 22–39. doi:10.14714/CP49.439
  • Lu, Y., Yorke, C., & Zhan, F. B. (2012). Considering risk locations when defining perturbation zones for geomasking. Cartographica: the International Journal for Geographic Information and Geovisualization, 47(3), 168–178. doi:10.3138/carto.47.3.1112
  • Lundeberg, M. A., Fox, P. W., & Punćcohaŕ, J. (1994). Highly confident but wrong: Gender differences and similarities in confidence judgments. Journal of Educational Psychology, 86(1), 114–121. doi:10.1037/0022-0663.86.1.114
  • McCarroll, D. (2016). Simple statistical tests for geography. Boca Raton, FL: CRC Press.
  • McLafferty, S. (2004). The socialization of GIS. Cartographica: the International Journal for Geographic Information and Geovisualization, 39(2), 51–53. doi:10.3138/F333-6V74-815U-4631
  • Menkhoff, L., Schmeling, M., & Schmidt, U. (2013). Overconfidence, experience, and professionalism: An experimental study. Journal of Economic Behavior and Organization, 86, 92–101. doi:10.1016/j.jebo.2012.12.022
  • Openshaw, S. (1984). The modifiable areal unit problem (Concepts and Techniques in Modern Geography). Norwich, UK: Geo Books.
  • Prosser, W. L. (1960). Privacy. California Law Review, 48(3), 383–423. doi:10.2307/3478805
  • Ruel, E. E., Wagner, W. E., & Gillespie, B. J. (2015). The practice of survey research: Theory and applications. Los Angeles: Sage.
  • Seidl, D. E., Jankowski, P., & Clarke, K. C. (2018). Privacy and false identification risk in geomasking techniques. Geographical Analysis, 50(3), 280–297. doi:10.1111/gean.12144
  • Seidl, D. E., Paulus, G., Jankowski, P., & Regenfelder, M. (2015). Spatial obfuscation methods for privacy protection of household-level data. Applied Geography, 63(253–263). doi:10.1016/j.apgeog.2015.07.001
  • Shi, X., Alford-Teaster, J., & Onega, T. (2009). Kernel density estimation with geographically masked points. In L. Di & A. Chen (Eds.), Geoinformatics, 2009 17th International Conference on geomatics (pp. 1–4). Piscataway, NJ: IEEE. doi:10.1109/GEOINFORMATICS.2009.5292881
  • Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570. doi:10.1142/S0218488502001648
  • Tavakol, M., & Dennick, R. (2011). Making sense of Cronbach’s alpha. International Journal of Medical Education, 2(53). doi:10.5116/ijme.4dfb.8dfd
  • Wagner, W. E. I. I. I., & Gillespie, B. J. (2018). Using and interpreting statistics in the social, behavioral, and health sciences. Thousand Oaks, CA: Sage.
  • Wang, T., & Liu, L. (2009). Privacy-aware mobile services over road networks. Proceedings of the VLDB Endowment, 2(1), 1042–1053. doi:10.14778/1687627.1687745
  • Weiser, P., & Scheider, S. (2014, November 4–7). Acivilized cyberspace for geoprivacy. In C. Kessler, G. D. McKenzie, & L. Kulik (Eds.), Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis(p. 5), New York: ACM. doi:10.1145/2675682.2676396
  • Wieland, S. C., Cassa, C. A., Mandl, K. D., & Berger, B. (2008). Revealing the spatial distribution of a disease while preserving privacy. Proceedings of the National Academy of Sciences, 105(46), 17608–17613. doi:10.1073/pnas.0801021105
  • Zandbergen, P. A. (2014). Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Advances in Medicine, 1–14. doi:10.1155/2014/567049
  • Zhang, S., Freundschuh, S. M., Lenzer, K., & Zandbergen, P. A. (2017). The location swapping method for geomasking. Cartography and Geographic Information Science, 44(1), 22–34. doi:10.1080/15230406.2015.1095655
  • Zimmerman, D. L., & Pavlik, C. (2008). Quantifying the effects of mask metadata disclosure and multiple releases on the confidentiality of geographically masked health data. Geographical Analysis, 40(1), 52–76. doi:10.1111/j.0016-7363.2007.00713.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.