Summary of the Anonymization Workflow

Add overview of all steps, kind of like handout; add notes on most important points to each step

  1. Implement data privacy before and during data collection
  2. Collect data
  3. Analyze attack scenarios
  4. Calculate disclosure risk and utility
  5. Choose anonymization measures
  6. Apply anonymization techniques
  7. Recalculate disclosure risk and utility; go back to step 3 if not satisfactory
  8. Document process
  9. Publish data

Add a flowchart to the process

Learning Objective

After completing this part of the tutorial, you will understand the anonymization workflow.

Exercises

  • none
Back to top