fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Repo, Antti", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-06-27T11:55:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-06-27T11:55:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50607", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nyky\u00e4\u00e4n ihmisist\u00e4 ker\u00e4t\u00e4\u00e4n ja tallentuu massiivisia m\u00e4\u00e4ri\u00e4 henkil\u00f6kohtaista dataa, mutta kyseisen datan yksityisyydensuojasta ja turvallisuudesta ei aina voida olla t\u00e4ysin varmoja. Kun ihmisten henkil\u00f6kohtaisia tietoja, kuten sairaushistoriaa tai hoitotietoja, julkaistaan esimerkiksi tutkimusk\u00e4ytt\u00f6\u00f6n, tulee tiedot anonymisoida riitt\u00e4v\u00e4ll\u00e4 tavalla eli k\u00e4sitell\u00e4 siten, ettei yksitt\u00e4isi\u00e4 henkil\u00f6it\u00e4 kyet\u00e4 tunnistamaan tiedoista. Vaikka anonymisointitekniikoita on useita ja ne voivat olla tehokkaita, eiv\u00e4t ne ole t\u00e4ydellisi\u00e4: joskus anonymisointi voi pett\u00e4\u00e4 ja ihmisten mahdollisesti arkaluontoisiakin tietoja voi tulla julki ja p\u00e4\u00e4ty\u00e4 v\u00e4\u00e4riin k\u00e4siin. Anonymisoinnin pett\u00e4minen voi johtua joko ihmisten tietoja sis\u00e4lt\u00e4v\u00e4n tietokannan hallinnoijan virheest\u00e4, tai vastustajan \u2013 tietojen paljastamista haluavan henkil\u00f6n \u2013 aktiivisista toimista. T\u00e4m\u00e4n kirjallisuuskatsauksen tarkastelun kohteena on tietojoukkojen anonymisointi sek\u00e4 deanonymisointi eli j\u00e4lleentunnistaminen. Tutkimuskysymyksen\u00e4 on selvitt\u00e4\u00e4, ovatko nykyiset tietojoukkojen anonymisointitoimenpiteet riitt\u00e4vi\u00e4 ihmisten yksityisyyden takaamiseksi tietojoukoissa, eli voidaanko anonymisointiin t\u00e4ysin luottaa nykyajan digitaalisessa maailmassa. Katsauksessa tutustutaan erilaisiin tietojoukkojen anonymisointitekniikoihin ja -menetelmiin sek\u00e4 niiden ep\u00e4onnistumisiin eli tapauksiin, joissa anonymisointi on pett\u00e4nyt ja deanonymisointi on onnistunut, jolloin yksityishenkil\u00f6iden piilotettuja identiteettej\u00e4 on kyetty paljastamaan. Yhteenvetona voidaan todeta, ett\u00e4 t\u00e4ydellisesti anonyymi\u00e4 ja samanaikaisesti hy\u00f6dyllist\u00e4 tietojoukkoa ei ole mahdollista luoda, sill\u00e4 muun muassa t\u00e4ydent\u00e4v\u00e4\u00e4, ulkopuolista informaatiota hyv\u00e4ksik\u00e4ytt\u00e4en yksityishenkil\u00f6ist\u00e4 on mahdollista paljastaa tunnistavaa henkil\u00f6kohtaista informaatiota.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nowadays, massive amounts of personal data are being collected and stored but the security of the data cannot always be guaranteed. When people\u2019s per-sonal information such as the history of illnesses or treatments is published for example for research purposes, the data needs to be anonymized in a sufficient way so that single individuals cannot be recognized from the dataset. Although different anonymization methods are numerous and they can be efficient, sometimes the anonymization can fail and potentially sensitive information can end up in the wrong hands. The failure of anonymization can be caused by an error made by the data administrator or due to the actions of an adversary \u2013 a person who wishes to uncover anonymized information. The object of this lit-erature review is to examine the anonymization and deanonymization of da-tasets. The research question seeks to find out whether current anonymization procedures are sufficient in guaranteeing the privacy of individuals and if anonymization can be fully trusted in today\u2019s digital world. I review various anonymization techniques and methods, their strengths, weaknesses, and fail-ures, i.e. cases where the anonymization has failed and reidentification has suc-ceeded: hidden identities of individuals have been revealed. As a conclusion it can be stated that a dataset that is simultaneously perfectly anonymous and useful cannot currently be created, because of the fact that by, for example, combining outside information with the data it is still possible to reveal per-sonal information about individuals.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Antti Repo (anjorepo) on 2016-06-27 11:55:35.441868. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-06-27T11:55:35Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201606273351.pdf: 462817 bytes, checksum: 1188efdeaf2b7e73f8400e81c2ebe62c (MD5)\nlicense.html: 4790 bytes, checksum: e9ae8de2413b38a1e52e3d261422bd91 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-06-27T11:55:35Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201606273351.pdf: 462817 bytes, checksum: 1188efdeaf2b7e73f8400e81c2ebe62c (MD5)\nlicense.html: 4790 bytes, checksum: e9ae8de2413b38a1e52e3d261422bd91 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "38", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "anonymisointi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "j\u00e4lleentunnistaminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "deanonymisointi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojoukko", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietokanta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yksityisyys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietojoukkojen anonymisointi ja j\u00e4lleentunnistaminen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201606273351", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-06-27T11:55:36Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|