O. E. Isafiade and A. B. Bagula, Citisafe: Adaptive spatial pattern knowledge using fp-growth algorithm for crime situation recognition, IEEE 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp.551-556, 2013.

L. Qiu, Y. Li, and X. Wu, Protecting business intelligence and customer privacy while outsourcing data mining tasks, Knowledge and Information Systems, vol.17, issue.1, p.99120, 2008.

H. Zakerzadeh and S. L. Osborn, Delay-sensitive approaches for anonymizing numerical streaming data, International Journal of Information Security, pp.1-15, 2013.

K. Guo and Q. Zhang, Fast clustering-based anonymization approaches with time constraints for data streams, 2013.

A. B. Sakpere, A. V. Kayem, and T. Ndlovu, A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015.

S. Li, Poisson process with fuzzy rates, Fuzzy Optimization and Decision Making, vol.9, pp.289-305, 2006.

A. B. Sakpere, K. Anne, and V. D. , A state of the art review of data stream anonymisation schemes, IGI Global, 2014.

A. B. Sakpere, K. Anne, and V. D. , Adaptive buffer resizing for efficient anonymization of streaming data with minimal information loss, Proceedings of 1st International Conference on Information Systems Security and Privacy (ICISSP), pp.191-201, 2015.

A. B. Sakpere, User-Defined Privacy Preferences for k-Anonymization in Electronic Crime Reporting Systems for Developing Nations, proceedings of the 1st International Doctoral Symposium on Security and Privacy, 2015.

E. Mohammadian, M. Noferesti, and R. Jalili, FAST: Fast Anonymization of Big Data Streams, Proceedings of the 2014 International Conference on Big Data Science and Computing, p.23, 2014.

J. R. Lasley and B. J. Palombo, When crime reporting goes high-tech: An experimental test of computerized citizen response to crime, Journal of Criminal Justice, vol.23, issue.6, pp.519-529, 1995.

A. B. Sakpere and A. V. Kayem, Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss, Proceedings of the 1st International Conference on Information Systems Security and Privacy, pp.191-201, 2015.

C. Dwork, Differential privacy, Automata, languages and programming, pp.1-12, 2006.

A. B. Sakpere, K. Anne, and V. D. , A state of the art review of data stream anonymisation schemes, 2014.

K. L. Jensen, H. N. Iipito, M. U. Onwordi, and S. Mukumbira, Toward an mPolicing solution for Namibia: leveraging emerging mobile platforms and crime mapping, Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp.196-205, 2012.

J. Domingo-ferrer and J. Soria-comas, From t-closeness to differential privacy and vice versa in data anonymization, vol.74, p.151158, 2015.

J. Soria-comas and J. Domingo-ferrer, Differential privacy via t-closeness in data publishing, Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST), p.2735, 2013.

L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.

L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002.

L. Sweeney, Computational Disclosure Control: A Primer on Data Privacy Protection, 2001.

V. S. Iyengar, Transforming data to satisfy privacy constraints, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.279-288, 2002.

J. Cao, B. Carminati, E. Ferrari, and K. L. Tan, Castle: Continuously anonymizing data streams, IEEE Transactions on, vol.8, issue.3, pp.337-352, 2011.

E. Mohammadian, M. Noferesti, and R. Jalili, Fast: fast anonymization of big data streams, Proceedings of the 2014 International Conference on Big Data Science and Computing, p.23, 2014.

J. R. Lewis, IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use, International Journal of Human-Computer Interaction, vol.7, issue.1, pp.57-78, 1995.

M. J. Burke, Enabling anonymous crime reporting on mobile phones in the developing world, 2013.

W. Wang, J. Li, C. Ai, and Y. Li, Privacy protection on sliding window of data streams, Collaborative Computing: Networking, Applications and Worksharing, 2007.

J. Li, B. C. Ooi, and W. Wang, Anonymizing streaming data for privacy protection, IEEE 24th International Conference on, pp.1367-1369, 2008.

J. Zhang, J. Yang, J. Zhang, and Y. Yuan, KIDS: K-anonymization data stream base on sliding window, Future Computer and Communication (ICFCC), 2010 2nd International Conference on, vol.2, pp.2-311, 2010.

T. Li and N. Li, On the tradeoff between privacy and utility in data publishing, Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.517-526, 2009.

A. Machanavajjhala, D. Kifer, and G. Johannes, l-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD), vol.1, issue.1, 2007.

N. Li, T. Li, and S. Venkatasubramanian, t-closeness: Privacy beyond kanonymity and l-diversity, International Conference on Data Engineering (ICDE), p.106115, 2007.

J. Soria-comas and J. Domingo-ferrer, Differential privacy via t-closeness in data publishing, Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST), 2013.

J. Soria-comas and J. Domingo-ferrer, Differential privacy via t-closeness in data publishing, 2015.