Published on in Vol 8, No 4 (2006):

Evaluating Common De-Identification Heuristics for Personal Health Information

Evaluating Common De-Identification Heuristics for Personal Health Information

Evaluating Common De-Identification Heuristics for Personal Health Information

Journals

  1. Yoo S, Shin M, Lee D. An Approach to Reducing Information Loss and Achieving Diversity of Sensitive Attributes in k-anonymity Methods. Interactive Journal of Medical Research 2012;1(2):e14 View
  2. Menger V, Scheepers F, van Wijk L, Spruit M. DEDUCE: A pattern matching method for automatic de-identification of Dutch medical text. Telematics and Informatics 2018;35(4):727 View
  3. Carrión Señor I, Fernández-Alemán J, Toval A. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 2012;14(4):e114 View
  4. Emam K. Heuristics for De-identifying Health Data. IEEE Security & Privacy Magazine 2008;6(4):58 View
  5. Faresi A, Alazzawe A, Alazzawe A. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS. Computational Intelligence 2014;30(3):514 View
  6. El Emam K, Brown A, AbdelMalik P. Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk. Journal of the American Medical Informatics Association 2009;16(2):256 View
  7. Gal T, Tucker T, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32 View
  8. El Emam K, Neri E, Jonker E. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives. Journal of Medical Internet Research 2007;9(3):e24 View
  9. Heatherly R, Loukides G, Denny J, Haines J, Roden D, Malin B, Shomron N. Enabling Genomic-Phenomic Association Discovery without Sacrificing Anonymity. PLoS ONE 2013;8(2):e53875 View
  10. Emam K, Paton D, Dankar F, Koru G. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics and Decision Making 2011;11(1) View
  11. Malin B. Secure construction of k-unlinkable patient records from distributed providers. Artificial Intelligence in Medicine 2010;48(1):29 View
  12. Yogarajan V, Pfahringer B, Mayo M. A review of Automatic end-to-end De-Identification: Is High Accuracy the Only Metric?. Applied Artificial Intelligence 2020;34(3):251 View
  13. Dankar F, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Medical Informatics and Decision Making 2012;12(1) View
  14. Layman E. Ethical Issues and the Electronic Health Record. The Health Care Manager 2008;27(2):165 View
  15. Lyman J, Scully K, Harrison J. The Development of Health Care Data Warehouses to Support Data Mining. Clinics in Laboratory Medicine 2008;28(1):55 View
  16. Malin B, Benitez K, Masys D. Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule. Journal of the American Medical Informatics Association 2011;18(1):3 View
  17. Raspa M, Moultrie R, Wagner L, Edwards A, Andrews S, Frisch M, Turner-Brown L, Wheeler A. Ethical, Legal, and Social Issues Related to the Inclusion of Individuals With Intellectual Disabilities in Electronic Health Record Research: Scoping Review. Journal of Medical Internet Research 2020;22(5):e16734 View
  18. El Emam K, Dankar F, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J. A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. Journal of the American Medical Informatics Association 2009;16(5):670 View
  19. Malin B, Loukides G, Benitez K, Clayton E. Identifiability in biobanks: models, measures, and mitigation strategies. Human Genetics 2011;130(3):383 View
  20. Erdal B, Liu J, Ding J, Chen J, Marsh C, Kamal J, Clymer B. A Database De-identification Framework to Enable Direct Queries on Medical Data for Secondary Use. Methods of Information in Medicine 2012;51(03):229 View
  21. Francis L, Francis J. Data Re-Use and the Problem of Group Identity. SSRN Electronic Journal 2017 View
  22. Azarm-Daigle M, Kuziemsky C, Peyton L. A Review of Cross Organizational Healthcare Data Sharing. Procedia Computer Science 2015;63:425 View
  23. El Emam K, Brown A, AbdelMalik P, Neisa A, Walker M, Bottomley J, Roffey T. A method for managing re-identification risk from small geographic areas in Canada. BMC Medical Informatics and Decision Making 2010;10(1) View
  24. El Emam K, Dankar F, Neisa A, Jonker E. Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics and Decision Making 2013;13(1) View
  25. El Emam K, Dankar F. Protecting Privacy Using k-Anonymity. Journal of the American Medical Informatics Association 2008;15(5):627 View
  26. Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. Journal of Medical Internet Research 2012;14(4):e95 View
  27. Malin B. k-Unlinkability: A privacy protection model for distributed data. Data & Knowledge Engineering 2008;64(1):294 View
  28. Rumbold J, Pierscionek B. Contextual Anonymization for Secondary Use of Big Data in Biomedical Research: Proposal for an Anonymization Matrix. JMIR Medical Informatics 2018;6(4):e47 View
  29. Song X, Wang J, Wang A, Meng Q, Prescott C, Tsu L, Eckert M. DeID – a data sharing tool for neuroimaging studies. Frontiers in Neuroscience 2015;9 View
  30. El Emam K, Moreau K, Jonker E. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?. Journal of Medical Internet Research 2011;13(1):e18 View
  31. Peyton L, Hu J. Federated identity management to link and protect healthcare data. International Journal of Electronic Business 2010;8(3):214 View
  32. Rosenbloom S, Madison J, Brothers K, Bowton E, Clayton E, Malin B, Roden D, Pulley J. Ethical and practical challenges to studying patients who opt out of large-scale biorepository research. Journal of the American Medical Informatics Association 2013;20(e2):e221 View
  33. Pantazos K, Lauesen S, Lippert S. Preserving medical correctness, readability and consistency in de-identified health records. Health Informatics Journal 2017;23(4):291 View
  34. Layman E. Ethical Issues and the Electronic Health Record. The Health Care Manager 2020;39(4):150 View
  35. Csányi G, Nagy D, Vági R, Vadász J, Orosz T. Challenges and Open Problems of Legal Document Anonymization. Symmetry 2021;13(8):1490 View
  36. Dammen L, Finseth T, McCurdy B, Barnett N, Conrady R, Leach A, Deick A, Van Steenis A, Gardner R, Smith B, Kay A, Shirtcliff E. Evoking stress reactivity in virtual reality: A systematic review and meta-analysis. Neuroscience & Biobehavioral Reviews 2022;138:104709 View
  37. Wiepert D, Malin B, Duffy J, Utianski R, Stricker J, Jones D, Botha H. Reidentification of Participants in Shared Clinical Data Sets: Experimental Study. JMIR AI 2024;3:e52054 View

Books/Policy Documents

  1. . Guide to the De-Identification of Personal Health Information. View
  2. . Guide to the De-Identification of Personal Health Information. View
  3. Francis L, Francis J. Studies in Law, Politics, and Society. View
  4. Hu J, Peyton L. Cyber Crime. View
  5. Plovnick R. Information Technology Essentials for Behavioral Health Clinicians. View
  6. Hu J, Peyton L. E-Technologies: Innovation in an Open World. View