Review of "Instructional Message Design: Principles from the Behavioral Sciences, by Malcolm Fleming and W. Howard Levie", Educational Technology Publications, Inc.
{"title":"Review of \"Instructional Message Design: Principles from the Behavioral Sciences, by Malcolm Fleming and W. Howard Levie\", Educational Technology Publications, Inc.","authors":"David R. Kniefel, Michael J. D'Amore","doi":"10.1145/1103009.1103013","DOIUrl":null,"url":null,"abstract":"The authors point out that queries to the system compute raw statistics for a query set. Questioners with prior knowledge of a given individual can divide their queries into parts such that when reassembled into a special characteristic, formulas will isolate the proprietary information about the individual. These formulas are called trackers, The paper reviews the literature on the extent and limits of trackers, provides excellent information to show how they can extract individualized information and so subvert the confidentiality of database files. The paper also reviews individual trackers and defines ranges within which they work, and shows how statistical responses to queries do compromise confidentiality of information, positively or negatively; positively if the individual falls into the given category and negatively if not. The authors then proceed to develop a general tracker and show how it can be applied within restricted subranges to extract individualized information. Under conditions where this fails, they show how a double tracker can be used. In general, trackers for most statistical database systems exist within the database, or can be easily obtained, thereby compromising the confidentiality of the data.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"87","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Sigsoc Bulletin","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1103009.1103013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 87
Abstract
The authors point out that queries to the system compute raw statistics for a query set. Questioners with prior knowledge of a given individual can divide their queries into parts such that when reassembled into a special characteristic, formulas will isolate the proprietary information about the individual. These formulas are called trackers, The paper reviews the literature on the extent and limits of trackers, provides excellent information to show how they can extract individualized information and so subvert the confidentiality of database files. The paper also reviews individual trackers and defines ranges within which they work, and shows how statistical responses to queries do compromise confidentiality of information, positively or negatively; positively if the individual falls into the given category and negatively if not. The authors then proceed to develop a general tracker and show how it can be applied within restricted subranges to extract individualized information. Under conditions where this fails, they show how a double tracker can be used. In general, trackers for most statistical database systems exist within the database, or can be easily obtained, thereby compromising the confidentiality of the data.