Correction: A Systematic Review of Re-Identification Attacks on Health Data

The following information is missing from the Competing Interests section: KEE is the founder of Privacy Analytics Inc.

[1]  D. Altman,et al.  Preparing raw clinical data for publication: guidance for journal editors, authors, and peer reviewers , 2010, BMJ : British Medical Journal.

[2]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[3]  Y. Khaliq,et al.  Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans , 2012 .

[4]  Brian Mullen,et al.  Cumulative Meta-Analysis: A Consideration of Indicators of Sufficiency and Stability , 2001 .

[5]  S Greenland,et al.  Random-effects meta-analyses are not always conservative. , 1999, American journal of epidemiology.

[6]  John Riedl,et al.  You are what you say: privacy risks of public mentions , 2006, SIGIR '06.

[7]  Amy L McGuire,et al.  Genetics. No longer de-identified. , 2006, Science.

[8]  Khaled El Emam,et al.  Privacy Interests in Prescription Data, Part 2: Patient Privacy , 2009, IEEE Security & Privacy.

[9]  Bradley Malin,et al.  A Secure Protocol to Distribute Unlinkable Health Data , 2005, AMIA.

[10]  J. Ioannidis,et al.  The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration , 2009, Annals of Internal Medicine [serial online].

[11]  Fernando Diaz,et al.  Geographic features in web search retrieval , 2008, GIR '08.

[12]  Robert Gellman,et al.  The Deidentification Dilemma: A Legislative and Contractual Proposal , 2010 .

[13]  Cinda Becker Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data. , 2006, Modern healthcare.

[14]  Bradley Malin,et al.  Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..

[15]  A. A. Afifi,et al.  Sample size determinations for the two rater kappa statistic , 1988 .

[16]  A. Levy,et al.  Personal privacy and public health: potential impacts of privacy legislation on health research in Canada. , 2008, Canadian journal of public health = Revue canadienne de sante publique.

[17]  Jacob Cohen A Coefficient of Agreement for Nominal Scales , 1960 .

[18]  M. Sanderson,et al.  Analyzing geographic queries , 2004 .

[19]  S. Nelson,et al.  Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.

[20]  J. Sterne,et al.  Funnel plots for detecting bias in meta-analysis: guidelines on choice of axis. , 2001, Journal of clinical epidemiology.

[21]  Philippe Golle,et al.  Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.

[22]  Bradley Malin,et al.  Betrayed By My Shadow: Learning Data Identity via Trail Matching , 2005 .

[23]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[24]  C. Skinner,et al.  Safe data versus safe setting: access to microdata from the British Census , 1994 .

[25]  Zhen Lin,et al.  Genomic Research and Human Subject Privacy , 2004, Science.

[26]  J. Sim,et al.  The kappa statistic in reliability studies: use, interpretation, and sample size requirements. , 2005, Physical therapy.

[27]  Russ B Altman,et al.  Genetics. Genomic research and human subject privacy. , 2004, Science.

[28]  Jean-Pierre Corriveau,et al.  A globally optimal k-anonymity method for the de-identification of health data. , 2009, Journal of the American Medical Informatics Association : JAMIA.

[29]  Ravi Kumar,et al.  "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.

[30]  K. El Emam,et al.  Methods for the de-identification of electronic health records for genomic research , 2011, Genome Medicine.

[31]  John S Brownstein,et al.  No place to hide--reverse identification of patients from published maps. , 2006, The New England journal of medicine.

[32]  Lynda L. McGhie,et al.  Health Insurance Portability and Accountability Act (HIPAA) , 2011, Encyclopedia of Information Assurance.

[33]  Hhs Office for Civil Rights Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.

[34]  Torsten Suel,et al.  Analysis of geographic queries in a search engine log , 2008, LocWeb.

[35]  Stefan Bender,et al.  Re-identifying register data by survey data: An empirical study , 2001 .

[36]  K. Brazil,et al.  Access to medical records for research purposes: varying perceptions across research ethics boards , 2008, Journal of Medical Ethics.

[37]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[38]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[39]  C. Skinner,et al.  The case for samples of anonymized records from the 1991 census. , 1991, Journal of the Royal Statistical Society. Series A,.

[40]  Mark Elliot,et al.  Scenarios of attack: the data intruder's perspective on statistical disclosure risk , 1999 .

[41]  R. Rosenthal The file drawer problem and tolerance for null results , 1979 .

[42]  Barry B Perlman Prescriptions, privacy, and the first amendment. , 2011, The New England journal of medicine.

[43]  F Mosteller,et al.  Some Statistical Methods for Combining Experimental Results , 1990, International Journal of Technology Assessment in Health Care.

[44]  M. Rothstein Is Deidentification Sufficient to Protect Health Privacy in Research? , 2010, The American journal of bioethics : AJOB.

[45]  Bradley Malin,et al.  Evaluating re-identification risks with respect to the HIPAA privacy rule , 2010, J. Am. Medical Informatics Assoc..

[46]  Vitaly Shmatikov,et al.  Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.

[47]  L Sweeney,et al.  Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.

[48]  Christine Robson,et al.  Reidentification of Individuals in Chicago’s Homicide Database: A Technical and Legal Study , 2002 .

[49]  Melissa C Brouwers,et al.  Written informed consent and selection bias in observational studies using medical records: systematic review , 2009, BMJ : British Medical Journal.

[50]  C.T.A.M. de Laat,et al.  A study on the re-identifiability of Dutch citizens , 2010 .

[51]  Jonathan A C Sterne,et al.  The Funnel Plot , 2006 .

[52]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[53]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[54]  E. Clayton,et al.  Identifiability in biobanks: models, measures, and mitigation strategies , 2011, Human Genetics.