Essays about: "Anonymisering"
Showing result 1 - 5 of 10 essays containing the word Anonymisering.
-
1. Valuing Differential Privacy : Assessing the value of personal data anonymization solutions, specifically Differential Privacy-solutions, for companies in the mobility sector
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This paper aims to determine the value of the product based on the mathematical concept of Differential Privacy, by assessing the value of the business opportunities it enables and the value of the possible GDPR-fines it prevents. To delimit the scope of the research the analysis will focus on what the value of personal data is for companies within the mobility sector. READ MORE
-
2. Synthetic Graph Generation at Scale : A novel framework for generating large graphs using clustering, generative models and node embeddings
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of generative graph models has seen increased popularity during recent years as it allows us to model the underlying distribution of a network and thus recreate it. From allowing anonymization of sensitive information in social networks to data augmentation of rare diseases in the brain, the ability to generate synthetic data has multiple applications in various domains. READ MORE
-
3. Competition and Data Protection Law in Conflict : Data Protection as a Justification for Anti-Competitive Conduct and a Consideration in Designing Competition Law Remedies
University essay from Uppsala universitet/Juridiska institutionenAbstract : Competition and data protection law are two powerful regimes simultaneously shaping the use of digital information, which has given rise to new interactions between these areas of law. While most views on this intersection emphasize that competition and data protection law must work together, nascent developments indicate that these legal regimes may sometimes conflict. READ MORE
-
4. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE
-
5. A compact language model for Swedish text anonymization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The General Data Protection Regulation (GDPR) that came into effect in 2018 states that for personal information to be freely used for research and statistics it needs to be anonymized first. To properly anonymize a text one needs to identify thewords that carry personally identifying information such as names, locations and organizations. READ MORE