Published on in Vol 14, No 1 (2012): Jan-Feb
Journals
- Somolinos R, Munoz A, Hernando M, Pascual M, Caceres J, Sanchez-de-Madariaga R, Fragua J, Serrano P, Salvador C. Service for the Pseudonymization of Electronic Healthcare Records Based on ISO/EN 13606 for the Secondary Use of Information. IEEE Journal of Biomedical and Health Informatics 2015;19(6):1937 View
- Tsang W, Benoit D. Gaussian processes for daily demand prediction in tourism planning. Journal of Forecasting 2020;39(3):551 View
- Park R. A clinical research strategy using longitudinal observational data in the post-electronic health records era. Journal of the Korean Medical Association 2012;55(8):711 View
- Parameshwarappa P, Chen Z, Koru G. An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data. International Journal of Information Security and Privacy 2020;14(3):72 View
- Suominen H, Zhou L, Hanlen L, Ferraro G. Benchmarking Clinical Speech Recognition and Information Extraction: New Data, Methods, and Evaluations. JMIR Medical Informatics 2015;3(2):e19 View
- Chen X, Fann Y, McAuliffe M, Vismer D, Yang R. Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation. JMIR Medical Informatics 2017;5(1):e2 View
- Asmaa H, Norizan B. Sharing healthcare information based on privacy preservation. Scientific Research and Essays 2015;10(5):184 View
- Shin S, Park Y, Shin Y, Choi H, Park J, Lyu Y, Lee M, Choi C, Kim W, Lee J. A De-identification Method for Bilingual Clinical Texts of Various Note Types. Journal of Korean Medical Science 2015;30(1):7 View
- Scaiano M, Middleton G, Arbuckle L, Kolhatkar V, Peyton L, Dowling M, Gipson D, El Emam K. A unified framework for evaluating the risk of re-identification of text de-identification tools. Journal of Biomedical Informatics 2016;63:174 View
- Frank R, Kriesberg A, Yakel E, Faniel I. Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists. Proceedings of the Association for Information Science and Technology 2015;52(1):1 View
- Herwartz H, Klein N, Strumann C. Modelling Hospital Admission and Length of Stay by Means of Generalised Count Data Models. Journal of Applied Econometrics 2016;31(6):1159 View
- Park M, Yoon D, Choi N, Lee J, Lee K, Lim H, Park B, Kim J, Park R. Construction of an Open-Access QT Database for Detecting the Proarrhythmia Potential of Marketed Drugs: ECG-ViEW. Clinical Pharmacology & Therapeutics 2012;92(3):393 View
- Gray E, Thorpe J. Comparative effectiveness research and big data: balancing potential with legal and ethical considerations. Journal of Comparative Effectiveness Research 2015;4(1):61 View
- Li J. A Privacy Preservation Model for Health-Related Social Networking Sites. Journal of Medical Internet Research 2015;17(7):e168 View
- Tayal A, Coleman T, Li Y. Bounding the difference between RankRC and RankSVM and application to multi-level rare class kernel ranking. Data Mining and Knowledge Discovery 2018;32(2):417 View
- Collins B. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats. PharmacoEconomics 2016;34(2):101 View
- Branson J, Good N, Chen J, Monge W, Probst C, El Emam K. Evaluating the re-identification risk of a clinical study report anonymized under EMA Policy 0070 and Health Canada Regulations. Trials 2020;21(1) View
- Sockolow P, Bowles K, Topaz M, Koru G, Hellesø R, O'Connor M, Bass E. The Time is Now: Informatics Research Opportunities in Home Health Care. Applied Clinical Informatics 2021;12(01):100 View
- Oh S, Sung M, Rhee Y, Hong N, Park Y. Evaluation of the Privacy Risks of Personal Health Identifiers and Quasi-Identifiers in a Distributed Research Network: Development and Validation Study. JMIR Medical Informatics 2021;9(5):e24940 View
- Parameshwarappa P, Chen Z, Koru G. Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model. ACM Transactions on Management Information Systems 2021;12(3):1 View
- Fabris A, Messina S, Silvello G, Susto G. Algorithmic fairness datasets: the story so far. Data Mining and Knowledge Discovery 2022;36(6):2074 View
- Xia W, Basford M, Carroll R, Clayton E, Harris P, Kantacioglu M, Liu Y, Nyemba S, Vorobeychik Y, Wan Z, Malin B. Managing re-identification risks while providing access to the All of Us research program. Journal of the American Medical Informatics Association 2023;30(5):907 View
- Chen R, Wang J, Williamson D, Chen T, Lipkova J, Lu M, Sahai S, Mahmood F. Algorithmic fairness in artificial intelligence for medicine and healthcare. Nature Biomedical Engineering 2023;7(6):719 View
Books/Policy Documents
- Becker T, Curry E, Jentzsch A, Palmetshofer W. New Horizons for a Data-Driven Economy. View
- Sampson M, Shamseer L, Vohra S. The Essential Guide to N-of-1 Trials in Health. View
- Narayanan A, Huey J, Felten E. Data Protection on the Move. View
- Ponder-Sutton A. Automating Open Source Intelligence. View
- . Guide to the De-Identification of Personal Health Information. View
- Grabus S, Greenberg J. Metadata and Semantic Research. View
- Mensah E, Goderre J. Public Health Informatics and Information Systems. View
- Parameshwarappa P, Chen Z, Koru G. Research Anthology on Privatizing and Securing Data. View