Correction: A Systematic Review of Re-Identification Attacks on Health Data
暂无分享,去创建一个
Bradley Malin | Luk Arbuckle | Khaled El Emam | Elizabeth Jonker | B. Malin | K. El Emam | Luk Arbuckle | E. Jonker | Elizabeth Jonker
[1] D. Altman,et al. Preparing raw clinical data for publication: guidance for journal editors, authors, and peer reviewers , 2010, BMJ : British Medical Journal.
[2] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[3] Y. Khaliq,et al. Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans , 2012 .
[4] Brian Mullen,et al. Cumulative Meta-Analysis: A Consideration of Indicators of Sufficiency and Stability , 2001 .
[5] S Greenland,et al. Random-effects meta-analyses are not always conservative. , 1999, American journal of epidemiology.
[6] John Riedl,et al. You are what you say: privacy risks of public mentions , 2006, SIGIR '06.
[7] Amy L McGuire,et al. Genetics. No longer de-identified. , 2006, Science.
[8] Khaled El Emam,et al. Privacy Interests in Prescription Data, Part 2: Patient Privacy , 2009, IEEE Security & Privacy.
[9] Bradley Malin,et al. A Secure Protocol to Distribute Unlinkable Health Data , 2005, AMIA.
[10] J. Ioannidis,et al. The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration , 2009, Annals of Internal Medicine [serial online].
[11] Fernando Diaz,et al. Geographic features in web search retrieval , 2008, GIR '08.
[12] Robert Gellman,et al. The Deidentification Dilemma: A Legislative and Contractual Proposal , 2010 .
[13] Cinda Becker. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data. , 2006, Modern healthcare.
[14] Bradley Malin,et al. Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..
[15] A. A. Afifi,et al. Sample size determinations for the two rater kappa statistic , 1988 .
[16] A. Levy,et al. Personal privacy and public health: potential impacts of privacy legislation on health research in Canada. , 2008, Canadian journal of public health = Revue canadienne de sante publique.
[17] Jacob Cohen. A Coefficient of Agreement for Nominal Scales , 1960 .
[18] M. Sanderson,et al. Analyzing geographic queries , 2004 .
[19] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[20] J. Sterne,et al. Funnel plots for detecting bias in meta-analysis: guidelines on choice of axis. , 2001, Journal of clinical epidemiology.
[21] Philippe Golle,et al. Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.
[22] Bradley Malin,et al. Betrayed By My Shadow: Learning Data Identity via Trail Matching , 2005 .
[23] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[24] C. Skinner,et al. Safe data versus safe setting: access to microdata from the British Census , 1994 .
[25] Zhen Lin,et al. Genomic Research and Human Subject Privacy , 2004, Science.
[26] J. Sim,et al. The kappa statistic in reliability studies: use, interpretation, and sample size requirements. , 2005, Physical therapy.
[27] Russ B Altman,et al. Genetics. Genomic research and human subject privacy. , 2004, Science.
[28] Jean-Pierre Corriveau,et al. A globally optimal k-anonymity method for the de-identification of health data. , 2009, Journal of the American Medical Informatics Association : JAMIA.
[29] Ravi Kumar,et al. "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.
[30] K. El Emam,et al. Methods for the de-identification of electronic health records for genomic research , 2011, Genome Medicine.
[31] John S Brownstein,et al. No place to hide--reverse identification of patients from published maps. , 2006, The New England journal of medicine.
[32] Lynda L. McGhie,et al. Health Insurance Portability and Accountability Act (HIPAA) , 2011, Encyclopedia of Information Assurance.
[33] Hhs Office for Civil Rights. Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.
[34] Torsten Suel,et al. Analysis of geographic queries in a search engine log , 2008, LocWeb.
[35] Stefan Bender,et al. Re-identifying register data by survey data: An empirical study , 2001 .
[36] K. Brazil,et al. Access to medical records for research purposes: varying perceptions across research ethics boards , 2008, Journal of Medical Ethics.
[37] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[38] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[39] C. Skinner,et al. The case for samples of anonymized records from the 1991 census. , 1991, Journal of the Royal Statistical Society. Series A,.
[40] Mark Elliot,et al. Scenarios of attack: the data intruder's perspective on statistical disclosure risk , 1999 .
[41] R. Rosenthal. The file drawer problem and tolerance for null results , 1979 .
[42] Barry B Perlman. Prescriptions, privacy, and the first amendment. , 2011, The New England journal of medicine.
[43] F Mosteller,et al. Some Statistical Methods for Combining Experimental Results , 1990, International Journal of Technology Assessment in Health Care.
[44] M. Rothstein. Is Deidentification Sufficient to Protect Health Privacy in Research? , 2010, The American journal of bioethics : AJOB.
[45] Bradley Malin,et al. Evaluating re-identification risks with respect to the HIPAA privacy rule , 2010, J. Am. Medical Informatics Assoc..
[46] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[47] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[48] Christine Robson,et al. Reidentification of Individuals in Chicago’s Homicide Database: A Technical and Legal Study , 2002 .
[49] Melissa C Brouwers,et al. Written informed consent and selection bias in observational studies using medical records: systematic review , 2009, BMJ : British Medical Journal.
[50] C.T.A.M. de Laat,et al. A study on the re-identifiability of Dutch citizens , 2010 .
[51] Jonathan A C Sterne,et al. The Funnel Plot , 2006 .
[52] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[53] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[54] E. Clayton,et al. Identifiability in biobanks: models, measures, and mitigation strategies , 2011, Human Genetics.