JMIR Publications

Journal of Medical Internet Research

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 21.11.06 in Vol 8, No 4 (2006)

This paper is in the following e-collection/theme issue:

Works citing "Evaluating Common De-Identification Heuristics for Personal Health Information"

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.8.4.e28):

(note that this is only a small subset of citations)

  1. Song X, Wang J, Wang A, Meng Q, Prescott C, Tsu L, Eckert MA. DeID – a data sharing tool for neuroimaging studies. Frontiers in Neuroscience 2015;9
    CrossRef
  2. Faresi AA, Alazzawe A, Alazzawe A. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS. Computational Intelligence 2014;30(3):514
    CrossRef
  3. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32
    CrossRef
  4. Rosenbloom ST, Madison JL, Brothers KB, Bowton EA, Clayton EW, Malin BA, Roden DM, Pulley J. Ethical and practical challenges to studying patients who opt out of large-scale biorepository research. Journal of the American Medical Informatics Association 2013;20(e2):e221
    CrossRef
  5. El Emam K, Dankar FK, Neisa A, Jonker E. Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics and Decision Making 2013;13(1)
    CrossRef
  6. Carrión Señor I, Fernández-Alemán JL, Toval A. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 2012;14(4):e114
    CrossRef
  7. Yoo S, Shin M, Lee D. An Approach to Reducing Information Loss and Achieving Diversity of Sensitive Attributes in k-anonymity Methods. Interactive Journal of Medical Research 2012;1(2):e14
    CrossRef
  8. Dankar FK, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Medical Informatics and Decision Making 2012;12(1)
    CrossRef
  9. Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. Journal of Medical Internet Research 2012;14(4):e95
    CrossRef
  10. Emam KE, Paton D, Dankar F, Koru G. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics and Decision Making 2011;11(1)
    CrossRef
  11. El Emam K, Moreau K, Jonker E. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?. Journal of Medical Internet Research 2011;13(1):e18
    CrossRef
  12. Malin B, Benitez K, Masys D. Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule. Journal of the American Medical Informatics Association 2011;18(1):3
    CrossRef
  13. Malin B. Secure construction of k-unlinkable patient records from distributed providers. Artificial Intelligence in Medicine 2010;48(1):29
    CrossRef
  14. El Emam K, Brown A, AbdelMalik P, Neisa A, Walker M, Bottomley J, Roffey T. A method for managing re-identification risk from small geographic areas in Canada. BMC Medical Informatics and Decision Making 2010;10(1)
    CrossRef
  15. Peyton L, Hu J. Federated identity management to link and protect healthcare data. International Journal of Electronic Business 2010;8(3):214
    CrossRef
  16. El Emam K, Brown A, AbdelMalik P. Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk. Journal of the American Medical Informatics Association 2009;16(2):256
    CrossRef
  17. El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J. A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. Journal of the American Medical Informatics Association 2009;16(5):670
    CrossRef
  18. El Emam K, Dankar FK. Protecting Privacy Using k-Anonymity. Journal of the American Medical Informatics Association 2008;15(5):627
    CrossRef
  19. Layman EJ. Ethical Issues and the Electronic Health Record. The Health Care Manager 2008;27(2):165
    CrossRef
  20. Malin B. k-Unlinkability: A privacy protection model for distributed data. Data & Knowledge Engineering 2008;64(1):294
    CrossRef
  21. Emam KE. Heuristics for De-identifying Health Data. IEEE Security & Privacy Magazine 2008;6(4):58
    CrossRef
  22. Lyman JA, Scully K, Harrison JH. The Development of Health Care Data Warehouses to Support Data Mining. Clinics in Laboratory Medicine 2008;28(1):55
    CrossRef
  23. El Emam K, Neri E, Jonker E. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives. Journal of Medical Internet Research 2007;9(3):e24
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.8.4.e28)

:
  1. Guide to the De-Identification of Personal Health Information. 2013. :177
    CrossRef
  2. Guide to the De-Identification of Personal Health Information. 2013. :203
    CrossRef
  3. Hu J, Peyton L. Cyber Crime. 2012. chapter 17:263
    CrossRef
  4. Hu J, Peyton L. Cyber Crime. 2012. chapter 17:263
    CrossRef
  5. Hu J, Peyton L. E-Technologies: Innovation in an Open World. 2009. Chapter 9:100
    CrossRef