Simultaneous edit-imputation and disclosure limitation for business establishment data

2016 ◽  
Vol 45 (1) ◽  
pp. 63-82 ◽  
Author(s):  
Hang J. Kim ◽  
Jerome P. Reiter ◽  
Alan F. Karr
2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Lars Vilhuber

This issue is the first to appear after a longer intermission. We have replatformed the journal, but we continue the original mission of publishing innovative materials from many disciplines in the areas of privacy, confidentiality, and disclosure limitation. 


2021 ◽  
Author(s):  
Dr. Sharath Chandra I ◽  
Dr. Srikanth N ◽  
Dr. Senthil Kumar S k ◽  
Dr. Venkatessulu S ◽  
Dr. Anjaiah A ◽  
...  

The exceptional growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Credit card security is a major concern for any business establishment. With that in mind, it is hard to identify the credit card fraud. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses.


2017 ◽  
Vol 1 (1) ◽  
pp. 43 ◽  
Author(s):  
Masoud Tosifyan ◽  
Saeed Tosifyan

This research was done with the aim to investigate the effect of social media on tendency to entrepreneurship and business establishment. The aim of applied research and methods used in this survey was a descriptive survey research. A standard questionnaire was used to collect relevant data in this study. The reliability of each questionnaire was estimated 0.779, 0.806 and 0.798. The population study is Iranian entrepreneurs who are active in social media and number of them is uncertain; A sample of 120 active Iranian entrepreneurs were selected as target and a questionnaire was distributed among these individuals. To collect the information and necessary data to evaluate the hypotheses of the research, a questionnaire and SPSS and LISREL software were evaluated.  At inferential comprehension level, techniques of Kolmogorov-Smirnov test for being normal, Pearson correlation test and structural equation modelling were used to test the hypotheses. Based on the results, the hypotheses were accepted.


2018 ◽  
Vol 47 (4) ◽  
pp. 695-715
Author(s):  
Kevin Kane ◽  
Young-An Kim

While there has been no shortage of discussion of urban big data, smart cities, and cities as complex systems, there has been less discussion of the implications of big data as a source of individual data for planning and social science research. This study takes advantage of increasingly available land parcel and business establishment data to analyze how the measurement of proximity to urban services or amenities performed in many fields can be impacted by using these data—which can be considered “individual” when compared to aggregated origins or destinations. We use business establishment data across five distinctive US cities: Long Beach, Irvine, and Moreno Valley in California; Milwaukee, Wisconsin; and the New York borough of Staten Island. In these case studies, we show how aggregation error, a previously recognized concern in using census-type data, can be minimized through careful choice of distance measures. Informed by these regions, we provide recommendations for researchers evaluating the potential risks of a measurement strategy that differs from the “gold standard” of network distance from individually measured, point-based origins and destinations. We find limited support for previous hypotheses regarding measurement error based on the abundance or clustering of urban services or amenities, though further research is merited. Importantly, these new data sources reveal vast differences across cities, underscoring how accurate proximity measurement necessitates a critical understanding of the nuances of the urban landscape under investigation as measures appear heavily influenced by a city’s street layouts and historical development trajectories.


Author(s):  
Raphael C.W. Phan

In this chapter, we discuss the security technologies that are important in guaranteeing the good quality of communication within smart organizations. We first briefly review the various forms of communication that can be used in the current information age, before outlining the possible threats that can be faced in each communication medium. We then describe the relevant security technologies that help to protect communication media from common threats, as well as the security tools available in the market that implement these technologies. The topics discussed in this chapter would serve to educate the smart organizations towards securing their various means of communication, which is vital for a business establishment to exist and coexist with peers and partners.


2003 ◽  
pp. 94-119 ◽  
Author(s):  
George T. Duncan ◽  
Stephen F. Roehrig

Government agencies collect and disseminate data that bear on the most important issues of public interest. Advances in information technology, particularly the Internet, have multiplied the tension between demands for evermore comprehensive databases and demands for the shelter of privacy. In mediating between these two conflicting demands, agencies must address a host of difficult problems. These include providing access to information while protecting confidentiality, coping with health information databases, and ensuring consistency with international standards. The policies of agencies are determined by what is right for them to do, what works for them, and what they are required to do by law. They must interpret and respect the ethical imperatives of democratic accountability, constitutional empowerment, and individual autonomy. They must keep pace with technological developments by developing effective measures for making information available to a broad range of users. They must both abide by the mandates of legislation and participate in the process of developing new legislation that is responsive to changes that affect their domain. In managing confidentiality and data access functions, agencies have two basic tools: techniques for disclosure limitation through restricted data and administrative procedures through restricted access. The technical procedures for disclosure limitation involve a range of mathematical and statistical tools. The administrative procedures can be implemented through a variety of institutional mechanisms, ranging from privacy advocates, through internal privacy review boards, to a data and access protection commission.


2020 ◽  
pp. 104-139
Author(s):  
Sharon Zukin

Profiling New York–based venture capitalists and VC firms that have been established in the city since the early 2000s, the chapter examines their risky but privileged perch between Wall Street and Silicon Valley. Interviews with VCs are juxtaposed with the post–World War II history of venture capital as a distinctive form of investment and management. The VCs’ equally distinctive commitment to New York is then contrasted with the increasing geographical dispersal of their investment funds to other regions of the world. Meanwhile, the integration of some corporate and VC members of the tech “community” into New York’s business establishment suggests the formation of a local tech-financial elite, updating C. Wright Mills’s critique of the institutional bases of power.


Sign in / Sign up

Export Citation Format

Share Document