{"id":334,"date":"2018-12-13T16:30:28","date_gmt":"2018-12-13T08:30:28","guid":{"rendered":"https:\/\/urirb.com\/?p=334"},"modified":"2020-06-27T13:44:54","modified_gmt":"2020-06-27T05:44:54","slug":"a-review-of-anonymisation-techniques-strengths-and-limitations-of-different-methods-across-different-jurisdictions","status":"publish","type":"post","link":"https:\/\/infolaw.iias.sinica.edu.tw\/?p=334","title":{"rendered":"A review of anonymisation  techniques \u2013 strengths and  limitations of different  methods across different  jurisdictions"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-2848\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_User_4200482-300x300.png\" alt=\"\" width=\"21\" height=\"21\" \/> Bradley Malin, <a href=\"http:\/\/www.iias.sinica.edu.tw\/en\/content\/researcher\/contents\/2013110517175075138?MSID=2013111716165886645\" target=\"_blank\" rel=\"noopener noreferrer\">Chuan-Feng Wu<\/a>\u3000\u4e3b\u8b1b<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-2850\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-300x300.png\" alt=\"\" width=\"21\" height=\"21\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-300x300.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-150x150.png 150w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-200x200.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-280x280.png 280w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363.png 512w\" sizes=\"auto, (max-width: 21px) 100vw, 21px\" \/> 2018\u5e7412\u670813\u65e5<\/p>\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-align:center\"><strong>\u6d3b\u52d5\u6d77\u5831<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"481\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2.jpg\" alt=\"\" class=\"wp-image-538\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2.jpg 875w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2-300x165.jpg 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2-768x422.jpg 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2-200x110.jpg 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2018\/12\/717265-2-690x379.jpg 690w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"1024\" src=\"https:\/\/urirb.com\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-724x1024.png\" alt=\"\" class=\"wp-image-335\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-724x1024.png 724w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-212x300.png 212w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-768x1086.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-200x283.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/06\/20181213-Bradley-Malin-A-Review-of-Anonymisation-Techniques-\u2013-Strengths-and-Limitations-of-Different-Jurisdictions-\u5de5\u4f5c\u574a\u6d77\u5831-20181205-1_01-690x976.png 690w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8209\u8fa6\u65e5\u671f\uff1a2018\u5e7412\u670813\u65e5<br \/>\n\u8209\u8fa6\u5730\u9ede\uff1a\u6cd5\u5f8b\u6240\u7b2c\u4e8c\u6703\u8b70\u5ba4\ufeff<\/p>\n","protected":false},"author":3,"featured_media":538,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[44,299],"tags":[],"class_list":["post-334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activities-record","category-299","post-item clearfix"],"_links":{"self":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=334"}],"version-history":[{"count":14,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":3310,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/334\/revisions\/3310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/media\/538"}],"wp:attachment":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}