Geographical masks are a group of location protection methods for the dissemination and publication of confidential and sensitive information, such as health- and crime-related geo-referenced data. The use of such masks ensures that privacy is protected for the individuals involved in the datasets. Nevertheless, the protection process introduces spatial error to the masked dataset. This study quantifies the spatial error of masked datasets using two approaches. First, a perceptual survey was employed where participants ranked the similarity of a diverse sample of masked and original maps. Second, a spatial statistical analysis was performed that provided quantitative results for the same pairs of maps. Spatial statistical similarity is calc...
Location privacy, or geoprivacy, is critical to secure users’ privacy in context‐aware applications....
International audienceThe spatial analysis of health data usually raises geoprivacy issues. Due to t...
Geomasking traditionally refers to a set of techniques employed by a data steward to protect the pri...
Geographical masks are a group of location protection methods for the dissemination and publication ...
Geographical masks are a group of location protection methods for the dissemination and publication ...
Advances in Geographic Information Science (GISc) and the increasing availability of location data h...
Copyright © 2014 Paul A. Zandbergen.This is an open access article distributed under the Creative Co...
To balance the protection of geo-privacy and the accuracy of spatial patterns, we developed a geo-sp...
Public health datasets increasingly use geographic identifiers such as an individual’s address. Geoc...
This research proposes cartographic guidelines for presenting confidential point data on maps. Such ...
This is the data and code repository for the paper on geo-indistinguishable masking.</p
The need for addressing geoprivacy in location based services has increased the offer of mechanisms ...
Geomasking is used to provide privacy protection for individual address information while maintainin...
A major challenge in mapping health data is protecting patient privacy while maintaining the spatial...
Includes bibliographical references (pages 41-46).Volunteered location and trajectory data are incre...
Location privacy, or geoprivacy, is critical to secure users’ privacy in context‐aware applications....
International audienceThe spatial analysis of health data usually raises geoprivacy issues. Due to t...
Geomasking traditionally refers to a set of techniques employed by a data steward to protect the pri...
Geographical masks are a group of location protection methods for the dissemination and publication ...
Geographical masks are a group of location protection methods for the dissemination and publication ...
Advances in Geographic Information Science (GISc) and the increasing availability of location data h...
Copyright © 2014 Paul A. Zandbergen.This is an open access article distributed under the Creative Co...
To balance the protection of geo-privacy and the accuracy of spatial patterns, we developed a geo-sp...
Public health datasets increasingly use geographic identifiers such as an individual’s address. Geoc...
This research proposes cartographic guidelines for presenting confidential point data on maps. Such ...
This is the data and code repository for the paper on geo-indistinguishable masking.</p
The need for addressing geoprivacy in location based services has increased the offer of mechanisms ...
Geomasking is used to provide privacy protection for individual address information while maintainin...
A major challenge in mapping health data is protecting patient privacy while maintaining the spatial...
Includes bibliographical references (pages 41-46).Volunteered location and trajectory data are incre...
Location privacy, or geoprivacy, is critical to secure users’ privacy in context‐aware applications....
International audienceThe spatial analysis of health data usually raises geoprivacy issues. Due to t...
Geomasking traditionally refers to a set of techniques employed by a data steward to protect the pri...