Identifiability in biobanks: models, measures, and mitigation strategies

[1]  Xiaohong Su,et al.  Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices , 2012, Comput. Methods Programs Biomed..

[2]  S. Haga,et al.  Public Perspectives Regarding Data-Sharing Practices in Genomics Research , 2011, Public Health Genomics.

[3]  M. Guyer,et al.  Charting a course for genomic medicine from base pairs to bedside , 2011, Nature.

[4]  Bradley Malin,et al.  Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule , 2011, J. Am. Medical Informatics Assoc..

[5]  Wendy A. Wolf,et al.  The eMERGE Network: A consortium of biorepositories linked to electronic medical records data for conducting genomic studies , 2011, BMC Medical Genomics.

[6]  Bradley Malin,et al.  Beyond safe harbor: automatic discovery of health information de-identification policy alternatives , 2010, IHI.

[7]  S. Fullerton,et al.  Confronting real time ethical, legal, and social issues in the Electronic Medical Records and Genomics (eMERGE) Consortium , 2010, Genetics in Medicine.

[8]  Jin Fan,et al.  Leveraging informatics for genetic studies: use of the electronic medical record to enable a genome-wide association study of peripheral arterial disease , 2010, J. Am. Medical Informatics Assoc..

[9]  D. Clayton On inferring presence of an individual in a mixture: a Bayesian approach , 2010, Biostatistics.

[10]  Joshua C. Denny,et al.  The disclosure of diagnosis codes can breach research participants' privacy , 2010, J. Am. Medical Informatics Assoc..

[11]  B. Malin,et al.  Anonymization of electronic medical records for validating genome-wide association studies , 2010, Proceedings of the National Academy of Sciences.

[12]  Melissa A. Basford,et al.  Robust replication of genotype-phenotype associations across multiple diseases in an electronic medical record. , 2010, American journal of human genetics.

[13]  F. Collins Has the revolution arrived? , 2010, Nature.

[14]  Khaled El Emam,et al.  A method for evaluating marketer re-identification risk , 2010, EDBT '10.

[15]  Bradley Malin,et al.  Evaluating re-identification risks with respect to the HIPAA privacy rule , 2010, J. Am. Medical Informatics Assoc..

[16]  Wendy A. Wolf,et al.  Public and Biobank Participant Attitudes toward Genetic Research Participation and Data Sharing , 2010, Public Health Genomics.

[17]  Bradley Malin,et al.  Technical and Policy Approaches to Balancing Patient Privacy and Data Sharing in Clinical and Translational Research , 2010, Journal of Investigative Medicine.

[18]  Joan Scott,et al.  Public opinion about the importance of privacy in biobank research. , 2009, American journal of human genetics.

[19]  Haixu Tang,et al.  Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.

[20]  Erin Murphy,et al.  Relative Doubt: Familial Searches of DNA Databases , 2009 .

[21]  Jean-Pierre Corriveau,et al.  A globally optimal k-anonymity method for the de-identification of health data. , 2009, Journal of the American Medical Informatics Association : JAMIA.

[22]  Michael I. Jordan,et al.  Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.

[23]  Peter M Schneider,et al.  DNA-based prediction of human externally visible characteristics in forensics: motivations, scientific challenges, and ethical considerations. , 2009, Forensic science international. Genetics.

[24]  S. Levy,et al.  An agenda for personalized medicine , 2009, Nature.

[25]  E. Zerhouni,et al.  Protecting Aggregate Genomic Data , 2008, Science.

[26]  D. Roden,et al.  Development of a Large‐Scale De‐Identified DNA Biobank to Enable Personalized Medicine , 2008, Clinical pharmacology and therapeutics.

[27]  S. Nelson,et al.  Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.

[28]  Amy L McGuire,et al.  Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider , 2008, Genetics in Medicine.

[29]  Khaled El Emam,et al.  Heuristics for De-identifying Health Data , 2008, IEEE Secur. Priv..

[30]  John Glaser,et al.  White Paper: Advancing Personalized Health Care through Health Information Technology: An Update from the American Health Information Community's Personalized Health Care Workgroup , 2008, J. Am. Medical Informatics Assoc..

[31]  Tony Pan,et al.  Sharing Data and Analytical Resources Securely in a Biomed Research Grid Environment , 2008 .

[32]  G. Church,et al.  From genetic privacy to open consent , 2008, Nature Reviews Genetics.

[33]  Blaz Zupan,et al.  Predictive data mining in clinical medicine: Current issues and guidelines , 2008, Int. J. Medical Informatics.

[34]  Bradley Malin,et al.  k-Unlinkability: A privacy protection model for distributed data , 2008, Data Knowl. Eng..

[35]  A. McGuire,et al.  DNA data sharing: research participants' perspectives , 2008, Genetics in Medicine.

[36]  Christopher A Cassa,et al.  My sister's keeper?: genomic research and the identifiability of siblings , 2008, BMC Medical Genomics.

[37]  A. Abu-Bakar,et al.  Balancing benefits of human genetic research against civic concerns: Essentially Yours and beyond - the case of Australia. , 2007, Personalized medicine.

[38]  Á. Carracedo,et al.  Inferring ancestral origin using a single multiplex assay of ancestry-informative marker SNPs. , 2007, Forensic science international. Genetics.

[39]  B. Psaty,et al.  Personalized medicine in the era of genomics. , 2007, JAMA.

[40]  K. Sirotkin,et al.  The NCBI dbGaP database of genotypes and phenotypes , 2007, Nature Genetics.

[41]  Francis S. Collins,et al.  Identifiability in Genomic Research , 2007, Science.

[42]  G. Colditz,et al.  Key Elements of Access Policies for Biorepositories Associated with Population Science Research , 2007, Cancer Epidemiology Biomarkers & Prevention.

[43]  K. Hoeyer,et al.  Will forensic use of medical biobanks decrease public trust in healthcare services? Some empirical observations , 2007, Scandinavian Journal of Public Health.

[44]  Bradley Malin,et al.  A computational model to protect patient data from location-based re-identification , 2007, Artif. Intell. Medicine.

[45]  Alon Y. Halevy,et al.  Data integration and genomic medicine , 2007, J. Biomed. Informatics.

[46]  M. García-Sancho,et al.  The rise and fall of the idea of genetic information (1948-2006) , 2006, Genomics, society, and policy.

[47]  K. El Emam,et al.  Evaluating Common De-Identification Heuristics for Personal Health Information , 2006, Journal of medical Internet research.

[48]  L. Wolf,et al.  Sleeping better at night: investigators' experiences with certificates of confidentiality. , 2006, IRB.

[49]  Philippe Golle,et al.  Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.

[50]  Russ B Altman,et al.  Confidentiality in Genome Research , 2006, Science.

[51]  S. Hansson,et al.  Bioethics in Sweden. , 2006, Cambridge quarterly of healthcare ethics : CQ : the international journal of healthcare ethics committees.

[52]  Pilar N. Ossorio,et al.  About Face: Forensic Genetic Testing for Race and Visible Traits , 2006, Journal of Law, Medicine & Ethics.

[53]  Jane Kaye,et al.  Police collection and access to DNA samples , 2006 .

[54]  Richard A. Gibbs,et al.  No Longer De-Identified , 2006, Science.

[55]  Amy L McGuire,et al.  Genetics. No longer de-identified. , 2006, Science.

[56]  Russ B Altman,et al.  Health-information altruists--a potentially critical resource. , 2005, The New England journal of medicine.

[57]  Francis S Collins,et al.  Realizing the promise of genomics in biomedical research. , 2005, JAMA.

[58]  Tim Sprosen,et al.  UK Biobank: from concept to reality. , 2005, Pharmacogenomics.

[59]  Peter M Currie,et al.  Balancing privacy protections with efficient research: institutional review boards and the use of certificates of confidentiality. , 2005, IRB.

[60]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[61]  Bradley Malin,et al.  Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..

[62]  B A Malin,et al.  Protecting Genomic Sequence Anonymity with Generalization Lattices , 2005, Methods of Information in Medicine.

[63]  Tsan-sheng Hsu,et al.  Medical privacy protection based on granular computing , 2004, Artif. Intell. Medicine.

[64]  Allen D. Roses,et al.  Pharmacogenetics and drug development: the path to safer and more effective drugs , 2004, Nature Reviews Genetics.

[65]  Zhen Lin,et al.  Genomic Research and Human Subject Privacy , 2004, Science.

[66]  Bradley Malin,et al.  How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.

[67]  C. McCartney Forensic DNA Sampling and the England and Wales National DNA Database: A Sceptical Approach , 2004 .

[68]  Russ B Altman,et al.  Genetics. Genomic research and human subject privacy. , 2004, Science.

[69]  Tsan-sheng Hsu,et al.  Preserving confidentiality when sharing medical database with the Cellsecu system , 2003, Int. J. Medical Informatics.

[70]  Noreen Clancy,et al.  Case Studies of Existing Human Tissue Repositories , 2003 .

[71]  Noreen Clancy,et al.  Case Studies of Existing Human Tissue Repositories: "Best Practices" for a Biospecimen Resource for the Genomic and Proteomic Era , 2003 .

[72]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[73]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[74]  Hhs Office for Civil Rights Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.

[75]  G. Ginsburg,et al.  The path to personalized medicine. , 2002, Current opinion in chemical biology.

[76]  Zhen Lin,et al.  Using binning to maintain confidentiality of medical data , 2002, AMIA.

[77]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[78]  J. Botkin,et al.  Protecting the privacy of family members in survey and pedigree research. , 2001, JAMA.

[79]  Lucila Ohno-Machado,et al.  Hiding information by cell suppression , 2001, AMIA.

[80]  L Sweeney,et al.  Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.

[81]  Ton de Waal,et al.  Statistical Disclosure Control in Practice , 1996 .

[82]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..