Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Wednesday, July 01, 2020 at 8:00 PM to 10:00 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 21.11.06 in Vol 8, No 4 (2006)

This paper is in the following e-collection/theme issue:

Works citing "Evaluating Common De-Identification Heuristics for Personal Health Information"

According to Crossref, the following articles are citing this article (DOI 10.2196/jmir.8.4.e28):

(note that this is only a small subset of citations)

  1. Raspa M, Moultrie R, Wagner L, Edwards A, Andrews S, Frisch MK, Turner-Brown L, Wheeler A. Ethical, Legal, and Social Issues Related to the Inclusion of Individuals With Intellectual Disabilities in Electronic Health Record Research: Scoping Review. Journal of Medical Internet Research 2020;22(5):e16734
    CrossRef
  2. Yogarajan V, Pfahringer B, Mayo M. A review of Automatic end-to-end De-Identification: Is High Accuracy the Only Metric?. Applied Artificial Intelligence 2020;34(3):251
    CrossRef
  3. Rumbold J, Pierscionek B. Contextual Anonymization for Secondary Use of Big Data in Biomedical Research: Proposal for an Anonymization Matrix. JMIR Medical Informatics 2018;6(4):e47
    CrossRef
  4. Menger V, Scheepers F, van Wijk LM, Spruit M. DEDUCE: A pattern matching method for automatic de-identification of Dutch medical text. Telematics and Informatics 2018;35(4):727
    CrossRef
  5. Francis LP, Francis JG. Data Re-Use and the Problem of Group Identity. SSRN Electronic Journal 2017;
    CrossRef
  6. Pantazos K, Lauesen S, Lippert S. Preserving medical correctness, readability and consistency in de-identified health records. Health Informatics Journal 2017;23(4):291
    CrossRef
  7. Azarm-Daigle M, Kuziemsky C, Peyton L. A Review of Cross Organizational Healthcare Data Sharing. Procedia Computer Science 2015;63:425
    CrossRef
  8. Song X, Wang J, Wang A, Meng Q, Prescott C, Tsu L, Eckert MA. DeID – a data sharing tool for neuroimaging studies. Frontiers in Neuroscience 2015;9
    CrossRef
  9. Gal TS, Tucker TC, Gangopadhyay A, Chen Z. A data recipient centered de-identification method to retain statistical attributes. Journal of Biomedical Informatics 2014;50:32
    CrossRef
  10. Faresi AA, Alazzawe A, Alazzawe A. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS. Computational Intelligence 2014;30(3):514
    CrossRef
  11. Heatherly RD, Loukides G, Denny JC, Haines JL, Roden DM, Malin BA, Shomron N. Enabling Genomic-Phenomic Association Discovery without Sacrificing Anonymity. PLoS ONE 2013;8(2):e53875
    CrossRef
  12. Rosenbloom ST, Madison JL, Brothers KB, Bowton EA, Clayton EW, Malin BA, Roden DM, Pulley J. Ethical and practical challenges to studying patients who opt out of large-scale biorepository research. Journal of the American Medical Informatics Association 2013;20(e2):e221
    CrossRef
  13. El Emam K, Dankar FK, Neisa A, Jonker E. Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics and Decision Making 2013;13(1)
    CrossRef
  14. Carrión Señor I, Fernández-Alemán JL, Toval A. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 2012;14(4):e114
    CrossRef
  15. Sokolova M, El Emam K, Arbuckle L, Neri E, Rose S, Jonker E. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks. Journal of Medical Internet Research 2012;14(4):e95
    CrossRef
  16. Erdal BS, Liu J, Ding J, Chen J, Marsh CB, Kamal J, Clymer BD. A Database De-identification Framework to Enable Direct Queries on Medical Data for Secondary Use. Methods of Information in Medicine 2012;51(03):229
    CrossRef
  17. Yoo S, Shin M, Lee D. An Approach to Reducing Information Loss and Achieving Diversity of Sensitive Attributes in k-anonymity Methods. Interactive Journal of Medical Research 2012;1(2):e14
    CrossRef
  18. Dankar FK, El Emam K, Neisa A, Roffey T. Estimating the re-identification risk of clinical data sets. BMC Medical Informatics and Decision Making 2012;12(1)
    CrossRef
  19. Emam KE, Paton D, Dankar F, Koru G. De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics and Decision Making 2011;11(1)
    CrossRef
  20. El Emam K, Moreau K, Jonker E. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?. Journal of Medical Internet Research 2011;13(1):e18
    CrossRef
  21. Malin B, Benitez K, Masys D. Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule. Journal of the American Medical Informatics Association 2011;18(1):3
    CrossRef
  22. Malin B, Loukides G, Benitez K, Clayton EW. Identifiability in biobanks: models, measures, and mitigation strategies. Human Genetics 2011;130(3):383
    CrossRef
  23. El Emam K, Brown A, AbdelMalik P, Neisa A, Walker M, Bottomley J, Roffey T. A method for managing re-identification risk from small geographic areas in Canada. BMC Medical Informatics and Decision Making 2010;10(1)
    CrossRef
  24. Malin B. Secure construction of k-unlinkable patient records from distributed providers. Artificial Intelligence in Medicine 2010;48(1):29
    CrossRef
  25. Peyton L, Hu J. Federated identity management to link and protect healthcare data. International Journal of Electronic Business 2010;8(3):214
    CrossRef
  26. El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J. A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. Journal of the American Medical Informatics Association 2009;16(5):670
    CrossRef
  27. El Emam K, Brown A, AbdelMalik P. Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk. Journal of the American Medical Informatics Association 2009;16(2):256
    CrossRef
  28. Lyman JA, Scully K, Harrison JH. The Development of Health Care Data Warehouses to Support Data Mining. Clinics in Laboratory Medicine 2008;28(1):55
    CrossRef
  29. Layman EJ. Ethical Issues and the Electronic Health Record. The Health Care Manager 2008;27(2):165
    CrossRef
  30. Emam KE. Heuristics for De-identifying Health Data. IEEE Security & Privacy Magazine 2008;6(4):58
    CrossRef
  31. Malin B. k-Unlinkability: A privacy protection model for distributed data. Data & Knowledge Engineering 2008;64(1):294
    CrossRef
  32. El Emam K, Dankar FK. Protecting Privacy Using k-Anonymity. Journal of the American Medical Informatics Association 2008;15(5):627
    CrossRef
  33. El Emam K, Neri E, Jonker E. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives. Journal of Medical Internet Research 2007;9(3):e24
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/jmir.8.4.e28)

:
  1. Francis LP, Francis JG. Studies in Law, Politics, and Society. 2017. :141
    CrossRef
  2. Guide to the De-Identification of Personal Health Information. 2013. :177
    CrossRef
  3. Guide to the De-Identification of Personal Health Information. 2013. :203
    CrossRef
  4. Hu J, Peyton L. Cyber Crime. 2012. chapter 17:263
    CrossRef
  5. Hu J, Peyton L. Cyber Crime. 2012. chapter 17:263
    CrossRef
  6. Plovnick RM. Information Technology Essentials for Behavioral Health Clinicians. 2010. Chapter 3:27
    CrossRef
  7. Hu J, Peyton L. E-Technologies: Innovation in an Open World. 2009. Chapter 9:100
    CrossRef