Pseudonymisation and related techniques: a quest for determining what personal information to rewrite and how

Publikasjonsdetaljer

In this talk, we will walk through the different steps involved in the process of concealing
personal information. We will start by looking at methods for which pieces of personal information to
detect and how. We will then discuss strategies for rewriting these and, finally, we will look at approaches
proposed for evaluating the resulting redacted text in terms of privacy protection and utility preservation.
We will discuss previous work inspired by Named Entity Recognition as well as more recent approaches
employing Large Language Models. We will also explore the differences between pseudonymization and
anonymization highlighting the remaining challenges in performing these automatically.