An investigation into reducing third party privacy breaches during the investigation of cybercrime.
Wynand J. C. van StadenPublished in: ISSA (2014)
Keyphrases
- third party
- privacy breaches
- private information
- sensitive information
- privacy preserving data mining
- privacy protection
- personal information
- original data
- reverse logistics
- privacy preserving
- privacy preservation
- data privacy
- database systems
- information sharing
- data management
- data sets
- privacy concerns
- sensitive data