Advertisement: Preregister now for the Medicine 2.0 Congress

Works citing "Evaluating Common De-Identification Heuristics for Personal Health Information"

Khaled El Emam, Sam Jabbouri, Scott Sams, Youenn Drouet, Michael Power
J Med Internet Res 2006 (Nov 21); 8(4):e28 

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.8.4.e28):

(note that this is only a small subset of citations)

 
1. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32 [CrossRef]
 
2. Faresi AA, Alazzawe A, Alazzawe A. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS. Computational Intelligence 2014;30(3):514 [CrossRef]
 
3. Rosenbloom ST, Madison JL, Brothers KB, Bowton EA, Clayton EW, Malin BA, Roden DM, Pulley J. Ethical and practical challenges to studying patients who opt out of large-scale biorepository research. Journal of the American Medical Informatics Association 2013;20(e2):e221 [CrossRef]
 
4. El Emam K, Dankar FK, Neisa A, Jonker E. Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics and Decision Making 2013;13(1):114 [CrossRef]
 
5. Dankar F, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Medical Informatics and Decision Making 2012;12(1):66 [CrossRef]
 
6. Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. Journal of Medical Internet Research 2012;14(4):e95 [CrossRef]
 
7. Carrión Señor I, Fernández-Alemán JL, Toval A. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 2012;14(4):e114 [CrossRef]
 
8. Yoo S, Shin M, Lee D. An Approach to Reducing Information Loss and Achieving Diversity of Sensitive Attributes in k-anonymity Methods. Interactive Journal of Medical Research 2012;1(2):e14 [CrossRef]
 
9. El Emam K, Moreau K, Jonker E. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?. Journal of Medical Internet Research 2011;13(1):e18 [CrossRef]
 
10. Emam KE, Paton D, Dankar F, Koru G. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics and Decision Making 2011;11(1):53 [CrossRef]
 
11. Peyton L, Hu J. Federated identity management to link and protect healthcare data. International Journal of Electronic Business 2010;8(3):214 [CrossRef]
 
12. Malin B. Secure construction of k-unlinkable patient records from distributed providers. Artificial Intelligence in Medicine 2010;48(1):29 [CrossRef]
 
13. Malin B. k-Unlinkability: A privacy protection model for distributed data. Data & Knowledge Engineering 2008;64(1):294 [CrossRef]
 
14. Lyman JA, Scully K, Harrison JH. The Development of Health Care Data Warehouses to Support Data Mining. Clinics in Laboratory Medicine 2008;28(1):55 [CrossRef]
 
15. Emam KE. Heuristics for De-identifying Health Data. IEEE Security & Privacy Magazine 2008;6(4):58 [CrossRef]
 
16. Layman EJ. Ethical Issues and the Electronic Health Record. The Health Care Manager 2008;27(2):165 [CrossRef]
 
17. El Emam K, Neri E, Jonker E. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives. Journal of Medical Internet Research 2007;9(3):e24 [CrossRef]
 


According to Crossref, the following books are citing this article (DOI 10.2196/jmir.8.4.e28):

 
1. Guide to the De-Identification of Personal Health Information. 2013. :203 [CrossRef]
 
2. Guide to the De-Identification of Personal Health Information. 2013. :177 [CrossRef]
 
3. Hu J, Peyton L. Cyber Crime. 2011. chapter:263 [CrossRef]
 
4. Hu J, Peyton L. Cyber Crime. 2011. chapter 204:263 [CrossRef]