Even with scrupulous attention to following good practices in anonymizing data, it would be easy for one of the research subjects to use contextual clues from the interviews to figure out who from their community was being interviewed--and who said what.
GOOD PRACTICES FOR ANONYMIZING AND DE-IDENTIFYING OPEN DATA
To keep such personal information private, the database would strip out women's names and other obvious identifying information, theoretically "anonymizing
" the data.
transparency<p>Critics say Google has been too vague in explaining how it uses the data it collects, how it shares information among its services and with its advertisers, how it protects that data from litigators and government investigators, and how long it retains that data before deleting or "anonymizing
" it so that it can't be tracked back to individual users.
He takes a case-by-case approach (anonymizing
and hybridizing those from his own practice) in discussing the warning signs of "growing up dangerous" (this is the chapter that deals with celebrities), women who kill outside the family, women who kill their partners, women "who didn't mean to do it," women who kill their own children, mothers who molest children, women teachers who sexually abuse students, nuns who sexually abuse children, and girls who molest and murder.
You type a Web address into an anonymizing
Web form such as The Cloak (www.the-cloak.com).
The continued development and increased availability of anonymizing
Internet tools (i.e., devices that ensure a person's anonymity when using the Internet) can complicate the investigation of cyberstalking cases.
CyberGhost VPN keeps its commitment to privacy by securing and anonymizing
connections while blocking tracking attempts.
Silk Road was only accessible through the anonymizing
network (https://www.torproject.org/) TOR , which requires a bit of technical skill to configure.
The company actually published a blog on anonymizing
information and noted how difficult it is to actually do that.