JMIR Publications

Select Journals for Content Updates

When finished, please click submit.

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

This paper is in the following e-collection/theme issue:

Works citing "Evaluating Common De-Identification Heuristics for Personal Health Information"

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.8.4.e28):

(note that this is only a small subset of citations)

  1. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32
    CrossRef
  2. Faresi AA, Alazzawe A, Alazzawe A. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS. Computational Intelligence 2014;30(3):514
    CrossRef
  3. Rosenbloom ST, Madison JL, Brothers KB, Bowton EA, Clayton EW, Malin BA, Roden DM, Pulley J. Ethical and practical challenges to studying patients who opt out of large-scale biorepository research. Journal of the American Medical Informatics Association 2013;20(e2):e221
    CrossRef
  4. El Emam K, Dankar FK, Neisa A, Jonker E. Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics and Decision Making 2013;13(1):114
    CrossRef
  5. Dankar F, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Medical Informatics and Decision Making 2012;12(1):66
    CrossRef
  6. Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. Journal of Medical Internet Research 2012;14(4):e95
    CrossRef
  7. Carrión Señor I, Fernández-Alemán JL, Toval A. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 2012;14(4):e114
    CrossRef
  8. Yoo S, Shin M, Lee D. An Approach to Reducing Information Loss and Achieving Diversity of Sensitive Attributes in k-anonymity Methods. Interactive Journal of Medical Research 2012;1(2):e14
    CrossRef
  9. El Emam K, Moreau K, Jonker E. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?. Journal of Medical Internet Research 2011;13(1):e18
    CrossRef
  10. Emam KE, Paton D, Dankar F, Koru G. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics and Decision Making 2011;11(1):53
    CrossRef
  11. Peyton L, Hu J. Federated identity management to link and protect healthcare data. International Journal of Electronic Business 2010;8(3):214
    CrossRef
  12. Malin B. Secure construction of k-unlinkable patient records from distributed providers. Artificial Intelligence in Medicine 2010;48(1):29
    CrossRef
  13. Malin B. k-Unlinkability: A privacy protection model for distributed data. Data & Knowledge Engineering 2008;64(1):294
    CrossRef
  14. Lyman JA, Scully K, Harrison JH. The Development of Health Care Data Warehouses to Support Data Mining. Clinics in Laboratory Medicine 2008;28(1):55
    CrossRef
  15. Emam KE. Heuristics for De-identifying Health Data. IEEE Security & Privacy Magazine 2008;6(4):58
    CrossRef
  16. Layman EJ. Ethical Issues and the Electronic Health Record. The Health Care Manager 2008;27(2):165
    CrossRef
  17. El Emam K, Neri E, Jonker E. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives. Journal of Medical Internet Research 2007;9(3):e24
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.8.4.e28)

:
  1. Guide to the De-Identification of Personal Health Information. 2013. :203
    CrossRef
  2. Guide to the De-Identification of Personal Health Information. 2013. :177
    CrossRef
  3. Hu J, Peyton L. Cyber Crime. 2011. chapter:263
    CrossRef
  4. Hu J, Peyton L. Cyber Crime. 2011. chapter 204:263
    CrossRef