<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v21i5e13484</article-id>
      <article-id pub-id-type="pmid">31152528</article-id>
      <article-id pub-id-type="doi">10.2196/13484</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Use and Understanding of Anonymization and De-Identification in the Biomedical Literature: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Focsa</surname>
            <given-names>Mircea</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Knoppers</surname>
            <given-names>Bartha</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Greenberg</surname>
            <given-names>Alexandra J</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Goris</surname>
            <given-names>Johan</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1" corresp="yes">
          <name name-style="western">
            <surname>Chevrier</surname>
            <given-names>Raphaël</given-names>
          </name>
          <degrees>MD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Division of Medical Information Sciences</institution>
            <institution>University Hospitals of Geneva</institution>
            <addr-line>Rue Gabrielle-Perret-Gentil, 4</addr-line>
            <addr-line>Geneva, 1205</addr-line>
            <country>Switzerland</country>
            <phone>41 223790847</phone>
            <email>raphael.chevrier@hcuge.ch</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-0334-4883</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2">
          <name name-style="western">
            <surname>Foufi</surname>
            <given-names>Vasiliki</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-8625-0734</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3">
          <name name-style="western">
            <surname>Gaudet-Blavignac</surname>
            <given-names>Christophe</given-names>
          </name>
          <degrees>BSc, MD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6527-5898</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4">
          <name name-style="western">
            <surname>Robert</surname>
            <given-names>Arnaud</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-8692-7402</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib5">
          <name name-style="western">
            <surname>Lovis</surname>
            <given-names>Christian</given-names>
          </name>
          <degrees>MD, MPH, FACMI</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-2681-8076</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
      <label>1</label>
      <institution>Division of Medical Information Sciences</institution>
      <institution>University Hospitals of Geneva</institution>  
      <addr-line>Geneva</addr-line>
      <country>Switzerland</country></aff>
      <aff id="aff2">
      <label>2</label>
      <institution>Faculty of Medicine</institution>
      <institution>University of Geneva</institution>  
      <addr-line>Geneva</addr-line>
      <country>Switzerland</country></aff>
      <author-notes>
        <corresp>Corresponding Author: Raphaël Chevrier 
        <email>raphael.chevrier@hcuge.ch</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><month>05</month><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>31</day>
        <month>05</month>
        <year>2019</year>
      </pub-date>
      <volume>21</volume>
      <issue>5</issue>
      <elocation-id>e13484</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>24</day>
          <month>1</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>13</day>
          <month>2</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>29</day>
          <month>3</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>4</month>
          <year>2019</year>
        </date>
      </history>
      <copyright-statement>©Raphaël Chevrier, Vasiliki Foufi, Christophe Gaudet-Blavignac, Arnaud Robert, Christian Lovis. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 31.05.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2019/5/e13484/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The secondary use of health data is central to biomedical research in the era of data science and precision medicine. National and international initiatives, such as the Global Open Findable, Accessible, Interoperable, and Reusable (GO FAIR) initiative, are supporting this approach in different ways (eg, making the sharing of research data mandatory or improving the legal and ethical frameworks). Preserving patients’ privacy is crucial in this context. De-identification and anonymization are the two most common terms used to refer to the technical approaches that protect privacy and facilitate the secondary use of health data. However, it is difficult to find a consensus on the definitions of the concepts or on the reliability of the techniques used to apply them. A comprehensive review is needed to better understand the domain, its capabilities, its challenges, and the ratio of risk between the data subjects’ privacy on one side, and the benefit of scientific advances on the other.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This work aims at better understanding how the research community comprehends and defines the concepts of de-identification and anonymization. A rich overview should also provide insights into the use and reliability of the methods. Six aspects will be studied: (1) terminology and definitions, (2) backgrounds and places of work of the researchers, (3) reasons for anonymizing or de-identifying health data, (4) limitations of the techniques, (5) legal and ethical aspects, and (6) recommendations of the researchers.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Based on a scoping review protocol designed a priori, MEDLINE was searched for publications discussing de-identification or anonymization and published between 2007 and 2017. The search was restricted to MEDLINE to focus on the life sciences community. The screening process was performed by two reviewers independently.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>After searching 7972 records that matched at least one search term, 135 publications were screened and 60 full-text articles were included. (1) Terminology: Definitions of the terms de-identification and anonymization were provided in less than half of the articles (29/60, 48%). When both terms were used (41/60, 68%), their meanings divided the authors into two equal groups (19/60, 32%, each) with opposed views. The remaining articles (3/60, 5%) were equivocal. (2) Backgrounds and locations: Research groups were based predominantly in North America (31/60, 52%) and in the European Union (22/60, 37%). The authors came from 19 different domains; computer science (91/248, 36.7%), biomedical informatics (47/248, 19.0%), and medicine (38/248, 15.3%) were the most prevalent ones. (3) Purpose: The main reason declared for applying these techniques is to facilitate biomedical research. (4) Limitations: Progress is made on specific techniques but, overall, limitations remain numerous. (5) Legal and ethical aspects: Differences exist between nations in the definitions, approaches, and legal practices. (6) Recommendations: The combination of organizational, legal, ethical, and technical approaches is necessary to protect health data.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Interest is growing for privacy-enhancing techniques in the life sciences community. This interest crosses scientific boundaries, involving primarily computer science, biomedical informatics, and medicine. The variability observed in the use of the terms de-identification and anonymization emphasizes the need for clearer definitions as well as for better education and dissemination of information on the subject. The same observation applies to the methods. Several legislations, such as the American Health Insurance Portability and Accountability Act (HIPAA) and the European General Data Protection Regulation (GDPR), regulate the domain. Using the definitions they provide could help address the variable use of these two concepts in the research community.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>anonymization</kwd>
        <kwd>anonymisation</kwd>
        <kwd>de-identification</kwd>
        <kwd>deidentification</kwd>
        <kwd>pseudonymization</kwd>
        <kwd>privacy</kwd>
        <kwd>confidentiality</kwd>
        <kwd>secondary use</kwd>
        <kwd>data protection</kwd>
        <kwd>scoping review</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>In 2003, the National Institutes of Health (NIH) released its final statement on sharing research data. The NIH made the provision of a data-sharing plan mandatory for any funding starting at US $500,000 per year [<xref ref-type="bibr" rid="ref1">1</xref>]. This statement, among other published work [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref5">5</xref>], accelerated the sharing of research data worldwide in parallel to the growing availability of data and information technologies. In this context, the research community gained an unprecedented capacity to access and analyze large amounts of health data, originating partly from nonresearch sources. The use of medical data for a different purpose than the one it was initially collected for is commonly called “secondary use of medical data” [<xref ref-type="bibr" rid="ref3">3</xref>]. This particular use of health data is subject to technical and semantic problems as well as legal, ethical, and societal concerns. To comply with the legal and ethical principles, researchers have two main options to access and use medical data for a secondary purpose [<xref ref-type="bibr" rid="ref6">6</xref>]. One option is to gain patients’ consent specifically for the new purpose of their research. This is generally complicated and costly [<xref ref-type="bibr" rid="ref7">7</xref>]. Alternatively, they can de-identify the data, since the law permits the disclosure of clinical information if it has been correctly de-identified [<xref ref-type="bibr" rid="ref8">8</xref>]. Institutional review boards (IRBs) generally waive the need for consent in this situation [<xref ref-type="bibr" rid="ref9">9</xref>]. The existence of the second option gives de-identification and anonymization a pivotal role in biomedical research. Consequently, the availability of reliable techniques to protect privacy becomes essential for the research community to leverage the secondary use of medical data [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Despite all efforts, an important gap still exists between the needs and the access to massive data in science. Large collaborative data-sharing projects are somehow below expectations and the research community is calling for improved open data and open science [<xref ref-type="bibr" rid="ref11">11</xref>]. Some authors have proposed explanations as to why data sharing is more complicated in practice than in theory [<xref ref-type="bibr" rid="ref3">3</xref>]. An article has considered the influence of policies and of our capacity to protect the data on our ability to share it [<xref ref-type="bibr" rid="ref12">12</xref>]. Reviews have been published on the techniques and systems aiming at protecting health data privacy [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]; one has collected and studied the known re-identification attacks on health data [<xref ref-type="bibr" rid="ref15">15</xref>], and another has looked specifically into the security and privacy issues related to electronic health records [<xref ref-type="bibr" rid="ref16">16</xref>]. Various techniques aim at protecting the medical data subjects’ privacy. Those that do not strictly represent an anonymization or de-identification process are not part of the scope of this review. Cryptography, privacy-preserving record linkage [<xref ref-type="bibr" rid="ref17">17</xref>], and differential privacy [<xref ref-type="bibr" rid="ref18">18</xref>] are among these techniques.</p>
        <p>Although advanced probabilistic privacy-enhancing methods have been studied and applied for over three decades in other areas [<xref ref-type="bibr" rid="ref19">19</xref>], their application to medical data is a fairly recent interest for the biomedical research community. A striking example is the late introduction of <italic>data anonymization</italic> (2016) and other central concepts of health data privacy (eg, <italic>personally identifiable information</italic>) in the Medical Subject Headings (MeSH) thesaurus of the US National Library of Medicine. Over the last few years, a great amount of expert literature was produced on anonymization and de-identification techniques for medical data. However, publications providing the readers with a broad understanding of these techniques, and addressing their application in life sciences and clinical research in a comprehensive way, are lacking. As a consequence, the fundamental concepts remain either unknown to the research community or difficult to comprehend. Adding to the confusion, a well-documented and long-standing ambiguity exists in the vocabulary used by those who contribute to the practice [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. In particular, the terms <italic>de-identification</italic> and <italic>anonymization</italic> have been used with different meanings by researchers. De-identification is frequently, but not exclusively, used in the biomedical literature to refer to rule-based techniques. These techniques often apply the rules provided in the <italic>Safe Harbor</italic> method of the American legislation (ie, the Health Insurance Portability and Accountability Act [HIPAA]). On the other hand, anonymization is commonly, but not exclusively, used in the biomedical literature to refer to statistical or probabilistic techniques. Turning to the legislations to clarify the meaning of these terms can bring further confusion. Although researchers tend to use two different terms—de-identification and anonymization—to refer to one approach or the other, the American law itself regards both approaches (ie, rule-based or probabilistic) as ways to achieve de-identification. The first follows the <italic>Safe Harbor</italic> method—§164.514(b)(2)—and the second follows the <italic>Expert Determination</italic> method—§164.514(b)(1). The European legislation (ie, the General Data Protection Regulation [GDPR]), on the other hand, does not use either of the terms.</p>
        <p>A growing number of health care data breaches are being reported [<xref ref-type="bibr" rid="ref22">22</xref>], some resulting directly from a failure to anonymize or de-identify the data properly [<xref ref-type="bibr" rid="ref23">23</xref>]. In this context, it seems essential to review the literature published on this rapidly evolving domain to inform researchers, doctors, lawmakers, and the public about instruments that are becoming indispensable to researchers. This is true, especially since these instruments have bearing on subjects of paramount importance for the future of medical research, namely, data sharing, data privacy, and public trust in health care research and institutions.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>The aim of this work is to better understand how the life sciences research community defines, comprehends, and uses the concepts of de-identification and anonymization. Providing a broad perspective on the field, this review should also contextualize these concepts and their application in today’s biomedical research domain. To attain these goals, the reviewers identified six key aspects to study, which are presented in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>. These aspects are central to this work; they guided the data collection and they structured the Results section.</p>
        <boxed-text id="box1" position="float">
          <title>Objectives: subjects of focus for this scoping review.</title>
          <list list-type="order">
            <list-item>
              <p>Vocabulary, definitions, and understandings of the terms <italic>anonymization</italic> and <italic>de-identification</italic>.</p>
            </list-item>
            <list-item>
              <p>Authors’ backgrounds and places of work.</p>
            </list-item>
            <list-item>
              <p>Reasons for anonymizing or de-identifying health data.</p>
            </list-item>
            <list-item>
              <p>Limitations of anonymization and de-identification techniques.</p>
            </list-item>
            <list-item>
              <p>Legal and ethical implications of the practice.</p>
            </list-item>
            <list-item>
              <p>Experts’ recommendations.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>Scoping reviews represent an increasingly popular type of review [<xref ref-type="bibr" rid="ref24">24</xref>], which allows for the mapping of concepts in a field of interest. They are intended to study complex and overlapping domains, particularly when they have not been reviewed comprehensively before [<xref ref-type="bibr" rid="ref25">25</xref>]. To conduct this work, the authors used the guidance proposed by the Joanna Briggs Institute for the conduct of scoping reviews [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
        <p>The first step of the scoping review process was to perform a preliminary, nonsystematic survey of the literature regarding de-identification and anonymization. This survey identified the key concepts, the concerns, the challenges, and the gaps in the domain. This information was used to define the study’s objectives and to design the study protocol.</p>
      </sec>
      <sec>
        <title>Article Identification and Selection</title>
        <sec>
          <title>Search Strategy</title>
          <p>Aiming to focus this work on the life sciences researchers’ community, the articles were sourced selectively from one database: MEDLINE [<xref ref-type="bibr" rid="ref27">27</xref>]. To maximize the sensitivity and specificity of the search query, several strategies were tested and implemented. The terms “de-identification” and “anonymization”; their lexical variants (eg, “de-identif*,” and “anonymi*”); and their spelling variants (eg, “deidentified” without hyphen and “anonymisation” in British English) were used. Alternative spellings were proven effective in a previous literature review on the same topic [<xref ref-type="bibr" rid="ref28">28</xref>]. Numerous candidate terms were tested, here are some examples: “privacy protection,” “data protection,” “confidentiality,” “personal data,” “medical data,” ”re-identification,” and “breaches”. None of these terms increased the sensitivity of the search compared to the terms “de-identification,” “anonymization,” and their variants. The same conclusion was reached regarding the use of the MeSH-controlled vocabulary. Finally, search-field descriptors—[ti] (Title) and [tiab] (Title/Abstract)—were used, and the terms were combined between themselves using Boolean operators. A full description of the search query is provided in the Results section.</p>
        </sec>
        <sec>
          <title>Inclusion Criteria</title>
          <p>This work analyses the literature published between November 1, 2007, and November 1, 2017. Only original research articles and review articles available in full text through the University of Geneva’s library network were considered. Additionally, publications had to meet at least one of the following three criteria to be included:</p>
          <list list-type="order">
            <list-item>
              <p>The subject of the article is the process of rendering medical data as less identifiable using computer techniques (ie, de-identification or anonymization).</p>
            </list-item>
            <list-item>
              <p>The article focuses on sharing medical data; however, protecting the patients’ privacy using computer techniques is also discussed.</p>
            </list-item>
            <list-item>
              <p>The article presents legal and ethical aspects of sharing medical data, and the concept of de-identification or anonymization is discussed.</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>Exclusion Criteria</title>
          <p>The literature addressing certain data types was excluded: video recordings, photographic images, radiological images, and geolocation data. This decision was made on the basis of the information found during the preliminary literature survey [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>] and was confirmed after discussions with experts. Short reports, posters, and editorials were also excluded.</p>
        </sec>
      </sec>
      <sec>
        <title>Data Collection</title>
        <p>Based on the list of six objectives (see <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>), information categories were defined (see <xref ref-type="table" rid="table1">Table 1</xref>). Quantitative and qualitative data were collected from the articles. Quantitative information was extracted for certain categories and statistical analysis was performed on this data. Qualitative information was collected for the categories not suited to quantitative analysis. This second approach was nonetheless important, as it allowed us to bring together the views of some experts and to identify consensus or disagreements.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Categories of information used to collect quantitative and qualitative data from the reviewed articles.</p>
          </caption>
          <table width="591" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="87"/>
            <col width="474"/>
            <thead>
              <tr valign="top">
                <td>Type of data</td>
                <td>Categories of information</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Quantitative</td>
                <td><list list-type="bullet"><list-item><p>Journal</p></list-item><list-item><p>Year of publication</p></list-item><list-item><p>Author(s)</p></list-item><list-item><p>Authors’ backgrounds</p></list-item><list-item><p>Authors’ places of work</p></list-item><list-item><p>Presence of the terms “de-identification” and “anonymization”</p></list-item><list-item><p>Definitions of the terms “de-identification” and “anonymization”</p></list-item><list-item><p>Meanings given to the terms “de-identification” and “anonymization”</p></list-item></list></td>
              </tr>
              <tr valign="top">
                <td>Qualitative</td>
                <td><list list-type="bullet"><list-item><p>Purposes of de-identification and anonymization</p></list-item><list-item><p>Limitations of the privacy-enhancing techniques</p></list-item><list-item><p>Ethical or legal considerations</p></list-item><list-item><p>Suggestions and recommendations</p></list-item><list-item><p>Data utility and information loss</p></list-item><list-item><p>Data sharing in biomedical research</p></list-item><list-item><p>Types of data subjected to anonymization or de-identification</p></list-item><list-item><p>Public opinion on privacy-enhancing techniques and health data sharing</p></list-item></list></td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>To determine the backgrounds of the authors, points were attributed to domains (medicine, computer science, law, etc) according to each author’s professional affiliation and academic qualifications. Up to three authors were included per publication (ie, first, second, and last author), based on a previous research study, which showed that the most significant contributions were made by these authors [<xref ref-type="bibr" rid="ref30">30</xref>]. All publications included in the review were considered. The information about the authors was collected manually from the articles, from the authors’ or organizations’ websites, and from other sources, such as Google Scholar, Open Researcher and Contributor ID (ORCID), ResearchGate, etc.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Study Selection and Characteristics</title>
        <p>The literature search retrieved 135 articles from the sizeable number of existing records—7972 after the removal of duplicates—containing at least one of the search terms used. The breakdown of the search query shows the number of records at each level (see <xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
        <p>The search query identified 135 records in MEDLINE corresponding to the keyword search; the records were then manually screened according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology (see <xref ref-type="fig" rid="figure2">Figure 2</xref>). Among them, 103 records were in the considered time frame. Three records were excluded because the full text could not be retrieved. An additional 40 articles were excluded based on the focus of the paper, the data type considered, or the publication type. During this process, five records raised questions about their potential eligibility. A third reviewer was involved to reach consensus.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Architecture and breakdown of the search query with the number of records at each level. [ti]: Title; [tiab]: Title/Abstract.</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13484_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flow diagram for the scoping review process (ie, screening, eligibility, and inclusion).</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13484_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>The process resulted in the inclusion of 60 articles; the list is available in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>. The 60 articles came from 32 different scientific journals. Corrected for the five journals that did not have a registered impact factor in 2017, the average impact factor of the journals included in this review was 2.859, ranging from 9.504 for the highest to 0.304 for the lowest, with a median of 2.766. More than a third of the articles (23/60, 38%) were published after 2015 (see <xref ref-type="table" rid="table2">Table 2</xref>).</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Characteristics of the 60 articles included in the review and of the journals where they were published.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="770"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Characteristics</td>
                <td>Count (N=60), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="2"><bold>Year of publication</bold></td>
                <td><break/></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2008-2009</td>
                <td>5 (8)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2010-2011</td>
                <td>11 (18)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2012-2013</td>
                <td>10 (17)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2014-2015</td>
                <td>11 (18)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>2016-2017</td>
                <td>23 (38)</td>
              </tr>
              <tr valign="top">
                <td colspan="2"><bold>Scientific domains of the journals</bold></td>
                <td><break/></td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Biomedical informatics</td>
                <td>32 (53)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Engineering</td>
                <td>8 (13)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Public health, methodology, and epidemiology</td>
                <td>6 (10)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Bioethics and law &amp; health policies</td>
                <td>5 (8)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Medicine: biomedical sciences</td>
                <td>5 (8)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Medicine: clinical</td>
                <td>4 (7)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Vocabulary and Definitions</title>
        <p>Half of the articles (29/60, 48%) provided a definition of de-identification or anonymization (see <xref ref-type="table" rid="table3">Table 3</xref>).</p>
        <p>The attempts at defining the terms were rare, and the definitions often vague, inconsistent, or even contradictory (see <xref ref-type="table" rid="table4">Table 4</xref>). Referring to the HIPAA <italic>Safe Harbor</italic> method of de-identification, one article correctly recommended the removal of 18 types of protected health information (PHI) [<xref ref-type="bibr" rid="ref13">13</xref>]. Another suggested the removal of 17 types of PHI [<xref ref-type="bibr" rid="ref31">31</xref>]. Regarding the processing of the types of PHI, one article proposed to “hide” or “remove” them [<xref ref-type="bibr" rid="ref13">13</xref>], while another suggested to “extract” or “replace” them with pseudonyms [<xref ref-type="bibr" rid="ref32">32</xref>]. Concerning anonymization, the variability was similar. One article presented the process as the removal of the patients’ names [<xref ref-type="bibr" rid="ref33">33</xref>]. Another considered it a much more radical alteration of the data, which would be virtually impossible to reverse [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        <p>Conflicting representations of de-identification and anonymization were uncovered (see <xref ref-type="boxed-text" rid="box2">Textbox 2</xref>). In some articles, the terms are used interchangeably to refer to the same concept [<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref37">37</xref>], while in others they outline strictly different processes [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>The researchers’ representations of de-identification and anonymization, as similar or different concepts, were counted from the reviewed articles to determine whether or not there was a consensus among the experts. The results are presented in <xref ref-type="table" rid="table5">Table 5</xref>. The 38 authors who used both terms were evenly split between those who considered the two notions to be identical (19/60, 32%) and those who considered them to be different (19/60, 32%).</p>
        <p>The 19 researchers who only used or discussed one concept in the core of their articles mentioned the second one in the keywords or title. From the reviewers’ perspective, this finding reinforces the idea that de-identification and anonymization are synonyms in many people’s minds.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Presence of definitions for the terms <italic>de-identification</italic> or <italic>anonymization</italic> in the reviewed articles.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="0"/>
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td><break/></td>
                <td>Terms with definitions</td>
                <td>Count (N=60), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td><break/></td>
                <td>De-identification</td>
                <td>26 (43)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Anonymization</td>
                <td>12 (20)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>Both</td>
                <td>9 (15)</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td>None</td>
                <td>31 (52)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Examples of attempts to define the terms <italic>de-identification</italic> or <italic>anonymization</italic>.</p>
          </caption>
          <table width="703" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="103"/>
            <col width="578"/>
            <thead>
              <tr valign="top">
                <td>Terms</td>
                <td>Definitions</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>De-identification</td>
                <td>“For clinical data to be considered de-identified, the HIPAA ‘Safe Harbor’ technique requires 18 data elements (called PHI: Protected Health Information) to be removed...de-identification only means that explicit identifiers are hidden or removed.” [<xref ref-type="bibr" rid="ref13">13</xref>] <break/>“Under Safe Harbor, data are considered de-identified if 17 listed types of identifiers are removed.” [<xref ref-type="bibr" rid="ref31">31</xref>] <break/>“de-identification where explicit identifiers (e.g., Protected Health Information [PHI] elements) are extracted or replaced with ‘pseudonyms’” [<xref ref-type="bibr" rid="ref32">32</xref>] <break/>“De-identification of medical record data refers to the removal or replacement of personal identifiers so that it would be difficult to reestablish a link between the individual and his or her data. Although a de-identified dataset may contain an encrypted patient identifier with which authorized individuals could relink a patient with his or her dataset, this dataset must not contain data that will allow an unauthorized individual to infer a patient’s identity from the existing data elements.” [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Anonymization</td>
                <td>“The anonymization consists in removing the patients’ names from the records: unfortunately, other pieces of information enable to identify the patients.” [<xref ref-type="bibr" rid="ref33">33</xref>] <break/>“anonymization implies that the data cannot be linked to identify the patient” [<xref ref-type="bibr" rid="ref13">13</xref>] <break/>“the process of rendering data into a form which does not identify individuals and where identification is not likely to take place” [<xref ref-type="bibr" rid="ref10">10</xref>] <break/>“Data anonymization is the process of conditioning a dataset such that no sensitive information can be learned about any specific individual.” [<xref ref-type="bibr" rid="ref19">19</xref>] <break/>“Anonymization refers to the irreversible removal of the link between the individual and his or her medical record data to the degree that it would be virtually impossible to reestablish the link.” [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <boxed-text id="box2" position="float">
          <title>Discrepancies in understanding and using de-identification and anonymization in relation to each other.</title>
          <p>Anonymization = de-identification:</p>
          <list list-type="bullet">
            <list-item>
              <p>“Access to de-identified (anonymized) health records would in many cases be sufficient.” [<xref ref-type="bibr" rid="ref34">34</xref>]</p>
            </list-item>
            <list-item>
              <p>“Anonymization: Redaction, perturbation, or generalization of those attributes that could be used, alone or in combination, to associate a given record with a specific person. Also called ‘de-identification.’” [<xref ref-type="bibr" rid="ref35">35</xref>]</p>
            </list-item>
            <list-item>
              <p>“Recent renewed interest in de-identification (also known as ‘anonymisation’) has led to the development of a series of systems in the United States with very good performance on challenge test sets.” [<xref ref-type="bibr" rid="ref36">36</xref>]</p>
            </list-item>
            <list-item>
              <p>“As has been seen, the European regime for privacy does not require the de-identification (anonymization) of personal data used in genomic databases or biobanks.” [<xref ref-type="bibr" rid="ref37">37</xref>]</p>
            </list-item>
          </list>
          <p>Anonymization ≠ de-identification:</p>
          <list list-type="bullet">
            <list-item>
              <p>“we note that a recent analysis of matching attacks against a large, public, de-identified (although not anonymized) dataset independently came up” [<xref ref-type="bibr" rid="ref19">19</xref>]</p>
            </list-item>
            <list-item>
              <p>“Anonymization and de-identification are often used interchangeably, but de-identification only means that explicit identifiers are hidden or removed, while anonymization implies that the data cannot be linked to identify the patient (i.e. de-identified is often far from anonymous).” [<xref ref-type="bibr" rid="ref13">13</xref>]</p>
            </list-item>
            <list-item>
              <p>“De-identification of medical record data refers to the removal or replacement of personal identifiers so that it would be difficult to reestablish a link between the individual and his or her data...Anonymization refers to the irreversible removal of the link between the individual and his or her medical record data to the degree that it would be virtually impossible to reestablish the link.” [<xref ref-type="bibr" rid="ref28">28</xref>]</p>
            </list-item>
            <list-item>
              <p>“The term ‘anonymization’ is not identical to ‘de-identification.’ De-identification is the removal of attributes known to increase the risk of identification, and this can be seen as a preliminary step for producing anonymous data. It requires, however, a further assessment as to whether the de-identification process achieves anonymization.” [<xref ref-type="bibr" rid="ref38">38</xref>]</p>
            </list-item>
          </list>
        </boxed-text>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Researchers’ understanding of de-identification and anonymization as similar or different concepts.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Use of the terms in the articles</td>
                <td>Count (N=60), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Only use or discuss one concept</td>
                <td>19 (32)</td>
              </tr>
              <tr valign="top">
                <td>De-identification and anonymization are two different concepts</td>
                <td>19 (32)</td>
              </tr>
              <tr valign="top">
                <td>De-identification and anonymization are used interchangeably</td>
                <td>19 (32)</td>
              </tr>
              <tr valign="top">
                <td>Ambiguous with regard to the meaning of both terms</td>
                <td>3 (5)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Authors’ Backgrounds and Places of Work</title>
        <p>Applying the scoring system presented in the Methods section, we counted 163 authors for the 60 publications. A total of 248 background points were attributed to 19 different domains (see <xref ref-type="table" rid="table6">Table 6</xref>).</p>
        <p>The first seven fields represent 90% of the researchers’ backgrounds. On average, one researcher was awarded 1.52 research field points. A total of 14 researchers published more than one article (ie, 2-8 articles). Out of 14 prolific authors, 13 (93%) had a background in the three leading domains. Removing the duplicates revealed 121 unique authors. The number of domains and their ranking remained unchanged with and without duplicates, with a slightly smaller gap between the first three domains and the others when duplicates were removed. The background of 7 authors could not be found; this represents a margin of error of 4.3%.</p>
        <p>Regarding the place of work, the United States was the largest contributor with 25 articles (25/60, 42%), followed by Germany, the United Kingdom, and Canada combined (23/60, 38%). The predominance of publications from the US-based research groups is noticeable particularly between 2010 and 2012. After this period, their contribution decreases in absolute number and, more importantly, in relation to other groups, due to the arrival of new groups from 2014 and the rapid growth of publications on the topic of anonymization and de-identification. As a result, the leading position that American researchers (ie, Canada and the United States) held until 2013 was caught up to by researchers from other countries in 2014. Since 2015, European groups have been publishing an equal or greater number of articles than the Americans on this topic (see <xref ref-type="fig" rid="figure3">Figure 3</xref>).</p>
      </sec>
      <sec>
        <title>Purpose of Anonymization and De-Identification</title>
        <p>Most often, the authors mentioned the secondary use of medical data without specification as to the purpose of their research. When specified, their objective was to enable and support biomedical research [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref39">39</xref>-<xref ref-type="bibr" rid="ref41">41</xref>]. Regarding the research domains, <italic>genetics and genomics</italic> [<xref ref-type="bibr" rid="ref42">42</xref>-<xref ref-type="bibr" rid="ref49">49</xref>] were the most frequently cited, followed by <italic>personalized health and precision medicine</italic> [<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref52">52</xref>]. Improvement in the domains of <italic>epidemiology</italic> and <italic>public health surveillance and reporting</italic> were among other anticipated benefits of developing privacy protection techniques [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref53">53</xref>]. The protection of privacy was implicit in most projects but was also explicitly cited as a standalone objective in some publications [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. Complying with regulations and policies was a motivation expressed by certain authors [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. Several other reasons were found, as shown in <xref ref-type="boxed-text" rid="box3">Textbox 3</xref>.</p>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Background points awarded to the authors of the reviewed articles. The authors are separated by authorship position: first, second, and last.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="370"/>
            <col width="150"/>
            <col width="170"/>
            <col width="150"/>
            <col width="160"/>
            <thead>
              <tr valign="top">
                <td>Research field</td>
                <td>First author (N=92), n (%)</td>
                <td>Second author (N=72), n (%)</td>
                <td>Last author (N=84), n (%)</td>
                <td>Total count (N=248), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Computer science</td>
                <td>36 (14)</td>
                <td>26 (10)</td>
                <td>29 (12)</td>
                <td>91 (36.7)</td>
              </tr>
              <tr valign="top">
                <td>Biomedical informatics</td>
                <td>16 (6)</td>
                <td>15 (6)</td>
                <td>16 (6)</td>
                <td>47 (19.0)</td>
              </tr>
              <tr valign="top">
                <td>Medicine (MD<sup>a</sup>)</td>
                <td>13 (5)</td>
                <td>9 (4)</td>
                <td>16 (6)</td>
                <td>38 (15.3)</td>
              </tr>
              <tr valign="top">
                <td>Epidemiology and statistics</td>
                <td>6 (2)</td>
                <td>3 (1)</td>
                <td>7 (3)</td>
                <td>16 (6.5)</td>
              </tr>
              <tr valign="top">
                <td>Mathematics and biomathematics</td>
                <td>6 (2)</td>
                <td>5 (2)</td>
                <td>5 (2)</td>
                <td>16 (6.5)</td>
              </tr>
              <tr valign="top">
                <td>Law</td>
                <td>3 (1)</td>
                <td>3 (1)</td>
                <td>2 (1)</td>
                <td>8 (3.2)</td>
              </tr>
              <tr valign="top">
                <td>Psychology</td>
                <td>2 (1)</td>
                <td>3 (1)</td>
                <td>2 (1)</td>
                <td>7 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>Linguistics</td>
                <td>2 (1)</td>
                <td>0 (0)</td>
                <td>2 (1)</td>
                <td>4 (1.6)</td>
              </tr>
              <tr valign="top">
                <td>Project management</td>
                <td>1 (0)</td>
                <td>1 (0)</td>
                <td>1 (0)</td>
                <td>3 (1.2)</td>
              </tr>
              <tr valign="top">
                <td>Bioethics and humanities</td>
                <td>1 (0)</td>
                <td>2 (1)</td>
                <td>0 (0)</td>
                <td>3 (1.2)</td>
              </tr>
              <tr valign="top">
                <td>Public health</td>
                <td>1 (0)</td>
                <td>0 (0)</td>
                <td>1 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Neuroscience</td>
                <td>2 (1)</td>
                <td>0 (0)</td>
                <td>0 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Behavioral economy</td>
                <td>0 (0)</td>
                <td>2 (1)</td>
                <td>0 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Journalism</td>
                <td>1 (0)</td>
                <td>1 (0)</td>
                <td>0 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Biology and microbiology</td>
                <td>1 (0)</td>
                <td>0 (0)</td>
                <td>1 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Physics</td>
                <td>1 (0)</td>
                <td>1 (0)</td>
                <td>0 (0)</td>
                <td>2 (0.8)</td>
              </tr>
              <tr valign="top">
                <td>Health care administration</td>
                <td>0 (0)</td>
                <td>0 (0)</td>
                <td>1 (0)</td>
                <td>1 (0.4)</td>
              </tr>
              <tr valign="top">
                <td>Ecology and evolution</td>
                <td>0 (0)</td>
                <td>1 (0)</td>
                <td>0 (0)</td>
                <td>1 (0.4)</td>
              </tr>
              <tr valign="top">
                <td>Business (MBA<sup>b</sup>)</td>
                <td>0 (0)</td>
                <td>0 (0)</td>
                <td>1 (0)</td>
                <td>1 (0.4)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table6fn1">
              <p><sup>a</sup>MD: Doctor of Medicine.</p>
            </fn>
            <fn id="table6fn2">
              <p><sup>b</sup>MBA: Master of Business Administration.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Representation of the 60 publications according to the date of publication, the number of articles per year, and the authors’ locations. The size of the discs used on the graph represents each country’s contribution in number of articles over the studied period (10 years). The exact count is shown between brackets next to each country’s name.</p>
          </caption>
          <graphic xlink:href="jmir_v21i5e13484_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <boxed-text id="box3" position="float">
          <title>Additional reasons expressed by experts for de-identifying or anonymizing health data.</title>
          <list list-type="order">
            <list-item>
              <p>Publication in biomedical journals [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
            </list-item>
            <list-item>
              <p>Teaching [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
            </list-item>
            <list-item>
              <p>Spontaneous reporting systems to collect adverse drug events [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
            </list-item>
            <list-item>
              <p>Limiting the administrative burden of consent in research [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
            </list-item>
            <list-item>
              <p>Facilitating clinical trial data publication [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
            </list-item>
            <list-item>
              <p>Facilitating population screening programs [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
            </list-item>
            <list-item>
              <p>Enabling the creation of medical text corpora for natural language processing (NLP) research and development [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
            </list-item>
            <list-item>
              <p>Protecting particularly sensitive information (eg, mental health data) [<xref ref-type="bibr" rid="ref59">59</xref>].</p>
            </list-item>
            <list-item>
              <p>Producing reports on prescribing patterns and drug utilization and to perform economic studies [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
            </list-item>
            <list-item>
              <p>Performing comparative effectiveness studies [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Limitations of Anonymization and De-Identification Techniques</title>
        <sec>
          <title>Technical and Operational Limitations</title>
          <p>Anonymization and de-identification are time-consuming tasks, particularly when textual data is concerned [<xref ref-type="bibr" rid="ref61">61</xref>]. The necessity for manual intervention is seen as a weakness that leaves room for human error and contributes to lengthening the procedure [<xref ref-type="bibr" rid="ref62">62</xref>]. The difficulty in generalizing and scaling the de-identification and anonymization procedures, as well as the absence of broadly accepted metrics to judge their results, are recurrent concerns raised in publications [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref60">60</xref>]. The complexity of these procedures depends on the type of information involved. Structured information (eg, tabular data) is generally easier to process than unstructured information (eg, textual data) [<xref ref-type="bibr" rid="ref29">29</xref>]. Specific types of information (eg, diagnoses of rare diseases [<xref ref-type="bibr" rid="ref60">60</xref>]) are more identifying than others. Some types are even considered identifying by nature (eg, large genome sequencing) and presumably impossible to render anonymous [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref63">63</xref>]. More generally, balancing the probability of re-identification with the amount of distortion applied to the data is seen as a challenge [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. Unable to overcome the interdependence between data quality and data identifiability, one has to be compromised for the other: “no existing anonymization algorithm provides both perfect privacy protection and perfect analytic utility” [<xref ref-type="bibr" rid="ref19">19</xref>]. The re-identification risk depends on the availability of additional information. Using data linkage techniques, the presence of individuals in the protected dataset can be revealed and their personal information re-identified [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Because the amount of information available for comparison can only be estimated, the re-identification risk will always remain an estimate [<xref ref-type="bibr" rid="ref66">66</xref>]. Additionally, this risk will increase over time [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. These inherent weaknesses have led some researchers to express doubts about the reliability of anonymization or de-identification techniques [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref67">67</xref>].</p>
        </sec>
        <sec>
          <title>Limitations in Accessibility and Governance</title>
          <p>The substantial cost and the limited access to trained professionals are seen as hindrances for institutions wanting to share their data [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. Disparities in the availability of anonymization and de-identification systems between English-speaking countries and the rest of the world is expressed by certain authors [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Textual data is primarily concerned by this problem with a critical need for natural language processing (NLP) systems in varied languages [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. Authors report the lack of practical guidelines and training to assist the researchers [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref69">69</xref>]. They also report an absence of a consensus “regarding the effective governance of secondary research uses, beyond adherence to the terms of informed consent” [<xref ref-type="bibr" rid="ref70">70</xref>]. Finally, several researchers point out the confusion affecting the terminology as a flaw in itself, increasing the risk of re-identification through misconceptions and misunderstandings [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref71">71</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Legal and Ethical Implications</title>
        <sec>
          <title>General</title>
          <p>Privacy laws and regulations provide the legal framework for the collection, processing, and sharing of personal data [<xref ref-type="bibr" rid="ref71">71</xref>]. Differences exist between nations in the definitions, approaches, and legal practices [<xref ref-type="bibr" rid="ref66">66</xref>]. Commonly, legal experts agree that relying on legislation alone to protect privacy would be an error [<xref ref-type="bibr" rid="ref71">71</xref>]. Legislations are effective when used in conjunction with ethical principles, commitments in data use agreements (DUAs), and technical safeguards provided by the de-identification and anonymization process [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref72">72</xref>]. Stricter DUAs can be used to mitigate the loss of data quality that would otherwise be required if the technical process alone had to guarantee the privacy [<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref73">73</xref>]. Current rules and regulations are seen by some authors as too soft to discourage attempts at re-identifying data, however, the same authors recommend consistency over severity in prosecuting the misuse of health data [<xref ref-type="bibr" rid="ref71">71</xref>].</p>
        </sec>
        <sec>
          <title>Accountability</title>
          <p>The legal responsibilities and the ethical obligations are shared by all those involved in the collection or in the use of the data (ie, institutions or individuals) [<xref ref-type="bibr" rid="ref10">10</xref>]. Research participants generally believe that anyone who uses their information, regardless of when and under which circumstances, share these responsibilities [<xref ref-type="bibr" rid="ref50">50</xref>].</p>
        </sec>
        <sec>
          <title>Institutional Review Boards</title>
          <p>Review boards play an important role in the secondary use of health data. Although de-identified or anonymized data, in some cases, are not considered individually identifiable health information, research projects involving such data generally require IRB submission and approval. In these situations, the IRB assesses the information the subjects received, what they consented to, and whether the proposed research could be conflicting with their interests [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref72">72</xref>]. Eventually, if the IRB approves the project in question, it waives the obligation for informed consent [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref31">31</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Experts’ Recommendations</title>
        <p>The highest level of protection can only be provided by multidisciplinary approaches combining organizational, legal, ethical, and technical safeguards [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref72">72</xref>-<xref ref-type="bibr" rid="ref74">74</xref>]. Relying exclusively on one of these aspects would be a mistake [<xref ref-type="bibr" rid="ref75">75</xref>]. More information and training should be provided to researchers about privacy protection and about the risks associated with data sharing [<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. Numerous researchers express the necessity to review and update the current legal framework [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. Many authors consider the ambiguity of the vocabulary and the misuse of terms as a problem that urgently requires a cooperative effort from the expert community [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. When applying anonymization techniques, researchers generally recommend favoring privacy over data quality in the process of de-identification and anonymization [<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The development and the application of privacy-enhancing techniques to health data has come to represent a research domain in its own right. This domain is growing rapidly, as demonstrated by the increasing number of publications and the arrival and geographical spread of new research groups. Researchers come from different disciplines and often have qualifications in several fields themselves. Computer science, biomedical informatics, and medicine are the most prevalent backgrounds overall; the main purpose driving the development and application of privacy-enhancing techniques to medical data is to facilitate biomedical research.</p>
        <p>At the beginning of the 2000s, great hopes leaned on our abilities to develop technical safeguards that would unleash the potential of the secondary use of medical data. Almost 20 years later, our knowledge and competences have significantly improved, although every advance has come with new interrogations and challenges. Methods are still difficult to generalize or scale and inevitably alter the data quality, which can notably hinder its use for research. A successful exercise lessens the risk of re-identification while maintaining a sufficient level of data quality for research to be performed. In this aim, legal and contractual safeguards are essential and their use can be tailored (ie, made stricter or more lenient) to each situation to mitigate the technical limitations. The research community emphasizes that the different approaches (ie, organizational, legal, ethical, and technical) are complementary and necessary to provide an acceptable level of protection. What is an acceptable level of protection, however, is not easily defined. It varies both in the views of different experts and in the legislations of the different countries.</p>
        <p>This work confirms and further illustrates the existence of a disconcerting confusion in the domain’s vocabulary affecting the understanding of the concepts at multiple levels. The vagueness and lack of consensus among the experts is worrying and requires actions. The life sciences research community is aware of this situation and is calling for clear and standardized definitions and for cross-border regulatory frameworks.</p>
      </sec>
      <sec>
        <title>Propositions</title>
        <sec>
          <title>Clear Definitions</title>
          <p>Appropriate use of the terms <italic>de-identification</italic> and <italic>anonymization</italic> should be promoted and incentivized. As a first step in this direction, the authors of this work suggest that future publications on the subject include definitions or state which definitions are referred to. Although not universal, clear definitions are provided in two major legislations on personal data protection (ie, the GDPR and the HIPAA) and should be used where appropriate.</p>
          <p>The GDPR defines anonymous information as “an information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable” [<xref ref-type="bibr" rid="ref77">77</xref>]. It is an irreversible state. Accordingly, the term <italic>anonymous</italic> should not be used to describe the process of rendering data less identifiable, which is the prevailing representation of de-identification and anonymization in the biomedical literature. To refer to the concept of rendering data less identifiable, or to the techniques that are used in this aim, the GDPR defines the term <italic>pseudonymization</italic>: “the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.”</p>
          <p>Finally, the term <italic>de-identification</italic> comes from the American legislation where definitions are provided: HIPAA §164.514(a) and (b). Authors using this term in their publications should refer to these definitions.</p>
        </sec>
        <sec>
          <title>Development of Clear Guidelines</title>
          <p>In a manner that already exists in most clinical disciplines, international guidelines regarding privacy protection should be developed, agreed upon, and made widely available to the stakeholders in the field of biomedical research. These guidelines should clarify the concepts, the definitions, and the techniques, as well as their results and risks.</p>
        </sec>
        <sec>
          <title>Improved Dissemination and Education</title>
          <p>A striking result of this work is the lack of information dissemination and education at all levels. It is critical that the research community gains access to the appropriate information, definitions, and guidelines on the subjects of data privacy and data protection. The public and the media should benefit from this improved access and understanding. Building trust is essential for life sciences research to leverage today’s technological capabilities in accessing, sharing, and analyzing data. With this aim, information dissemination is key (see <xref ref-type="boxed-text" rid="box4">Textbox 4</xref>).</p>
      </sec>
      <sec>
        <title>Limitations of This Work</title>
        <p>There are several limitations to this work. As for any scoping review based on free-text searches, contributions may have been missed despite having maximized the search sensitivity. Privacy protection of health data is a rapidly evolving domain. Between the end of the scoping review and January 2019, 14 additional publications would have to be assessed for eligibility (ie, 114 vs 100).</p>
        <p>The fact that the literature search was limited to MEDLINE introduces a strong but deliberate selection bias toward the domain of life sciences. Within life sciences, <italic>genomics</italic>, <italic>personalized health</italic>, and <italic>precision medicine</italic> may be overrepresented due to their growing popularity in recent years and their characteristic need for large amounts of sensitive data.</p>
        <p>During the data collection, it was not possible to find the background of 7 authors. This represents 4.3% of the total author count (N=163), which should not impact the validity of the results.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Health data is increasingly produced and used. This wealth of information should not be left dormant as it represents a real potential to fuel research and improve medicine. Multidisciplinary safeguards (ie, ethical, organizational, legal, and technical) are required to guarantee the privacy of health data subjected to secondary use. Creating an overall trusted environment to leverage scientific research in life sciences is essential. It requires building on safe and strong foundations, to have processes and structures in place to enforce these foundations, and to communicate widely with the public and the media.</p>
          <boxed-text id="box4" position="float">
            <title>Recommendations for future work.</title>
            <list list-type="bullet">
              <list-item>
                <p>Future publications should include definitions or state which definitions are referred to.</p>
              </list-item>
              <list-item>
                <p>Existing definitions proposed by major legislations (ie, the Health Insurance Portability and Accountability Act [HIPAA] and the General Data Protection Regulation [GDPR]) should be used where applicable.</p>
              </list-item>
              <list-item>
                <p>Global and specific guidelines should be developed to define the field of application, the process, the expected results, and the risk of the different technical approaches to privacy protection.</p>
              </list-item>
              <list-item>
                <p>Information dissemination and education should be improved across the research community for all stakeholders.</p>
              </list-item>
            </list>
          </boxed-text>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>List of the 60 articles reviewed in this work.</p>
        <media xlink:href="jmir_v21i5e13484_app1.pdf" xlink:title="PDF File (Adobe PDF File), 500KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">DUA</term>
          <def>
            <p>data use agreement</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">GO FAIR</term>
          <def>
            <p>Global Open Findable, Accessible, Interoperable, and Reusable</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">IRB</term>
          <def>
            <p>institutional review board</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">MBA</term>
          <def>
            <p>Master of Business Administration</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">MD</term>
          <def>
            <p>Doctor of Medicine</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">MeSH</term>
          <def>
            <p>Medical Subject Headings</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">NIH</term>
          <def>
            <p>National Institutes of Health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">NLP</term>
          <def>
            <p>natural language processing</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">ORCID</term>
          <def>
            <p>Open Researcher and Contributor ID</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">PHI</term>
          <def>
            <p>protected health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">[ti]</term>
          <def>
            <p>Title</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">[tiab]</term>
          <def>
            <p>Title/Abstract</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>We would like to thank W Martin, LLM, for his precious help in better understanding some legal concepts.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>RC performed the preliminary literature survey; codesigned the study protocol; performed the screening and inclusion process, data collection, and data analysis; and wrote the manuscript. VF performed the screening and inclusion process and data collection and helped in writing the manuscript. CGB participated in the discussions concerning the eligibility of some articles and helped with the interpretation of the results. AR participated in the data analysis and created the figures. CL codesigned the study protocol and participated in the data analysis and the redaction of the manuscript. The manuscript has been reviewed and approved by all authors.</p>
      </fn>
      <fn fn-type="conflict">
        <p>CL is Editor-in-Chief for JMIR Medical Informatics.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <source>Final NIH Statement on Sharing Research Data</source>  
        <year>2003</year>  
        <month>02</month>  
        <day>26</day>  
        <access-date>2019-01-24</access-date>
        <publisher-loc>Bethesda, MD</publisher-loc>
        <publisher-name>National Institutes of Health</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://grants.nih.gov/grants/guide/notice-files/NOT-OD-03-032.html">https://grants.nih.gov/grants/guide/notice-files/NOT-OD-03-032.html</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="75fHDUrPp"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <collab>Institute of Medicine (IOM)</collab>
        </person-group>
        <source>Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk</source>  
        <year>2015</year>  
        <publisher-loc>Washington, DC</publisher-loc>
        <publisher-name>The National Academies Press</publisher-name></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Safran</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Bloomrosen</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Hammond</surname>
            <given-names>WE</given-names>
          </name>
          <name name-style="western">
            <surname>Labkoff</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Markel-Fox</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Tang</surname>
            <given-names>PC</given-names>
          </name>
          <name name-style="western">
            <surname>Detmer</surname>
            <given-names>DE</given-names>
          </name>
          <collab>Expert Panel</collab>
        </person-group>
        <article-title>Toward a national framework for the secondary use of health data: An American Medical Informatics Association White Paper</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2007</year>  
        <volume>14</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>9</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/17077452"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1197/jamia.M2273</pub-id>
        <pub-id pub-id-type="medline">17077452</pub-id>
        <pub-id pub-id-type="pii">M2273</pub-id>
        <pub-id pub-id-type="pmcid">PMC2329823</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pisani</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Whitworth</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Zaba</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Abou-Zahr</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Time for fair trade in research data</article-title>
        <source>Lancet</source>  
        <year>2010</year>  
        <month>02</month>  
        <day>27</day>  
        <volume>375</volume>  
        <issue>9716</issue>  
        <fpage>703</fpage>  
        <lpage>705</lpage>  
        <pub-id pub-id-type="doi">10.1016/S0140-6736(09)61486-0</pub-id>
        <pub-id pub-id-type="medline">19913902</pub-id>
        <pub-id pub-id-type="pii">S0140-6736(09)61486-0</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dukes</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Clement-Stoneham</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <source>Data Sharing Policy. Version 2.2</source>  
        <year>2016</year>  
        <month>09</month>  
        <access-date>2018-02-13</access-date>
        <publisher-loc>London, UK</publisher-loc>
        <publisher-name>Medical Research Council</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mrc.ac.uk/documents/pdf/mrc-data-sharing-policy/">https://www.mrc.ac.uk/documents/pdf/mrc-data-sharing-policy/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6xCclmaMF"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Rodgers</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Anonymising and sharing individual patient data</article-title>
        <source>BMJ</source>  
        <year>2015</year>  
        <month>03</month>  
        <day>20</day>  
        <volume>350</volume>  
        <fpage>h1139</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25794882"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/bmj.h1139</pub-id>
        <pub-id pub-id-type="medline">25794882</pub-id>
        <pub-id pub-id-type="pmcid">PMC4707567</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Dankar</surname>
            <given-names>FK</given-names>
          </name>
          <name name-style="western">
            <surname>Issa</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Jonker</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Amyot</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Cogo</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Corriveau</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Walker</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Chowdhury</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Vaillancourt</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Roffey</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Bottomley</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>A globally optimal k-anonymity method for the de-identification of health data</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2009</year>  
        <volume>16</volume>  
        <issue>5</issue>  
        <fpage>670</fpage>  
        <lpage>682</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/19567795"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1197/jamia.M3144</pub-id>
        <pub-id pub-id-type="medline">19567795</pub-id>
        <pub-id pub-id-type="pii">M3144</pub-id>
        <pub-id pub-id-type="pmcid">PMC2744718</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sengupta</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Calman</surname>
            <given-names>NS</given-names>
          </name>
          <name name-style="western">
            <surname>Hripcsak</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>A model for expanded public health reporting in the context of HIPAA</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2008</year>  
        <volume>15</volume>  
        <issue>5</issue>  
        <fpage>569</fpage>  
        <lpage>574</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/18579843"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1197/jamia.M2207</pub-id>
        <pub-id pub-id-type="medline">18579843</pub-id>
        <pub-id pub-id-type="pii">M2207</pub-id>
        <pub-id pub-id-type="pmcid">PMC2528028</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Willison</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Emerson</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Szala-Meneok</surname>
            <given-names>KV</given-names>
          </name>
          <name name-style="western">
            <surname>Gibson</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Schwartz</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Weisbaum</surname>
            <given-names>KM</given-names>
          </name>
          <name name-style="western">
            <surname>Fournier</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Brazil</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Coughlin</surname>
            <given-names>MD</given-names>
          </name>
        </person-group>
        <article-title>Access to medical records for research purposes: Varying perceptions across research ethics boards</article-title>
        <source>J Med Ethics</source>  
        <year>2008</year>  
        <month>04</month>  
        <volume>34</volume>  
        <issue>4</issue>  
        <fpage>308</fpage>  
        <lpage>314</lpage>  
        <pub-id pub-id-type="doi">10.1136/jme.2006.020032</pub-id>
        <pub-id pub-id-type="medline">18375687</pub-id>
        <pub-id pub-id-type="pii">34/4/308</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tucker</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Branson</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Dilleen</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Hollis</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Loughlin</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Nixon</surname>
            <given-names>MJ</given-names>
          </name>
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>Z</given-names>
          </name>
        </person-group>
        <article-title>Protecting patient privacy when sharing patient-level data from clinical trials</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2016</year>  
        <month>07</month>  
        <day>08</day>  
        <volume>16 Suppl 1</volume>  
        <fpage>77</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedresmethodol.biomedcentral.com/articles/10.1186/s12874-016-0169-4"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12874-016-0169-4</pub-id>
        <pub-id pub-id-type="medline">27410040</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12874-016-0169-4</pub-id>
        <pub-id pub-id-type="pmcid">PMC4943495</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bierer</surname>
            <given-names>BE</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Barnes</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Sim</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <article-title>A global, neutral platform for sharing trial data</article-title>
        <source>N Engl J Med</source>  
        <year>2016</year>  
        <month>06</month>  
        <day>23</day>  
        <volume>374</volume>  
        <issue>25</issue>  
        <fpage>2411</fpage>  
        <lpage>2413</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp1605348</pub-id>
        <pub-id pub-id-type="medline">27168194</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Karp</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Scheuermann</surname>
            <given-names>RH</given-names>
          </name>
        </person-group>
        <article-title>Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research</article-title>
        <source>J Investig Med</source>  
        <year>2010</year>  
        <month>01</month>  
        <volume>58</volume>  
        <issue>1</issue>  
        <fpage>11</fpage>  
        <lpage>18</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20051768"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2310/JIM.0b013e3181c9b2ea</pub-id>
        <pub-id pub-id-type="medline">20051768</pub-id>
        <pub-id pub-id-type="pii">00042871-201001000-00004</pub-id>
        <pub-id pub-id-type="pmcid">PMC2836827</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Meystre</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Friedlin</surname>
            <given-names>FJ</given-names>
          </name>
          <name name-style="western">
            <surname>South</surname>
            <given-names>BR</given-names>
          </name>
          <name name-style="western">
            <surname>Shen</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Samore</surname>
            <given-names>MH</given-names>
          </name>
        </person-group>
        <article-title>Automatic de-identification of textual documents in the electronic health record: A review of recent research</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2010</year>  
        <month>08</month>  
        <day>02</day>  
        <volume>10</volume>  
        <fpage>70</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedresmethodol.biomedcentral.com/articles/10.1186/1471-2288-10-70"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1471-2288-10-70</pub-id>
        <pub-id pub-id-type="medline">20678228</pub-id>
        <pub-id pub-id-type="pii">1471-2288-10-70</pub-id>
        <pub-id pub-id-type="pmcid">PMC2923159</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gkoulalas-Divanis</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Publishing data from electronic health records while preserving privacy: A survey of algorithms</article-title>
        <source>J Biomed Inform</source>  
        <year>2014</year>  
        <month>08</month>  
        <volume>50</volume>  
        <fpage>4</fpage>  
        <lpage>19</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(14)00140-3"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2014.06.002</pub-id>
        <pub-id pub-id-type="medline">24936746</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(14)00140-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Jonker</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Arbuckle</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>A systematic review of re-identification attacks on health data</article-title>
        <source>PLoS One</source>  
        <year>2011</year>  
        <volume>6</volume>  
        <issue>12</issue>  
        <fpage>e28071</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0028071"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0028071</pub-id>
        <pub-id pub-id-type="medline">22164229</pub-id>
        <pub-id pub-id-type="pii">PONE-D-11-14348</pub-id>
        <pub-id pub-id-type="pmcid">PMC3229505</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fernández-Alemán</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Señor</surname>
            <given-names>IC</given-names>
          </name>
          <name name-style="western">
            <surname>Lozoya</surname>
            <given-names>PÁ</given-names>
          </name>
          <name name-style="western">
            <surname>Toval</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Security and privacy in electronic health records: A systematic literature review</article-title>
        <source>J Biomed Inform</source>  
        <year>2013</year>  
        <month>06</month>  
        <volume>46</volume>  
        <issue>3</issue>  
        <fpage>541</fpage>  
        <lpage>562</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(12)00186-4"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2012.12.003</pub-id>
        <pub-id pub-id-type="medline">23305810</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(12)00186-4</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Vatsalan</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Christen</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Verykios</surname>
            <given-names>VS</given-names>
          </name>
        </person-group>
        <article-title>A taxonomy of privacy-preserving record linkage techniques</article-title>
        <source>Inf Syst</source>  
        <year>2013</year>  
        <month>9</month>  
        <volume>38</volume>  
        <issue>6</issue>  
        <fpage>946</fpage>  
        <lpage>969</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.is.2012.11.005</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dankar</surname>
            <given-names>FK</given-names>
          </name>
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>Transactions on Data Privacy</source>  
        <year>2013</year>  
        <month>04</month>  
        <access-date>2019-05-23</access-date>
        <publisher-loc>Catalonia, Spain</publisher-loc>
        <publisher-name>IIIA-CSIC</publisher-name>
        <comment>Practicing differential privacy in health care: A review 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://pdfs.semanticscholar.org/65a5/37c9cd327c2925676f59ddffa01cf4afbe51.pdf">https://pdfs.semanticscholar.org/65a5/37c9cd327c2925676f59ddffa01cf4afbe51.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78aeXVavZ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lasko</surname>
            <given-names>TA</given-names>
          </name>
          <name name-style="western">
            <surname>Vinterbo</surname>
            <given-names>SA</given-names>
          </name>
        </person-group>
        <article-title>Spectral anonymization of data</article-title>
        <source>IEEE Trans Knowl Data Eng</source>  
        <year>2010</year>  
        <month>03</month>  
        <day>01</day>  
        <volume>22</volume>  
        <issue>3</issue>  
        <fpage>437</fpage>  
        <lpage>446</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21373375"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/TKDE.2009.88</pub-id>
        <pub-id pub-id-type="medline">21373375</pub-id>
        <pub-id pub-id-type="pmcid">PMC3046817</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Knoppers</surname>
            <given-names>BM</given-names>
          </name>
          <name name-style="western">
            <surname>Saginur</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>The Babel of genetic data terminology</article-title>
        <source>Nat Biotechnol</source>  
        <year>2005</year>  
        <month>08</month>  
        <volume>23</volume>  
        <issue>8</issue>  
        <fpage>925</fpage>  
        <lpage>927</lpage>  
        <pub-id pub-id-type="doi">10.1038/nbt0805-925</pub-id>
        <pub-id pub-id-type="medline">16082354</pub-id>
        <pub-id pub-id-type="pii">nbt0805-925</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Phillips</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Knoppers</surname>
            <given-names>BM</given-names>
          </name>
        </person-group>
        <article-title>The discombobulation of de-identification</article-title>
        <source>Nat Biotechnol</source>  
        <year>2016</year>  
        <month>12</month>  
        <day>08</day>  
        <volume>34</volume>  
        <issue>11</issue>  
        <fpage>1102</fpage>  
        <lpage>1103</lpage>  
        <pub-id pub-id-type="doi">10.1038/nbt.3696</pub-id>
        <pub-id pub-id-type="medline">27824850</pub-id>
        <pub-id pub-id-type="pii">nbt.3696</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
        <source>Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information</source>  
        <year>2019</year>  
        <access-date>2019-01-24</access-date>
        <publisher-loc>Washington, DC</publisher-loc>
        <publisher-name>US Department of Health and Human Services</publisher-name>
        <comment>Cases currently under investigation 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75fKWiXfo"/></comment> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Culnane</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Rubinstein</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Teague</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <source>Health Data in an Open World</source>  
        <year>2017</year>  
        <month>12</month>  
        <day>18</day>  
        <access-date>2019-05-12</access-date>
        <publisher-loc>Melbourne, Australia</publisher-loc>
        <publisher-name>The University of Melbourne</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/ftp/arxiv/papers/1712/1712.05627.pdf">https://arxiv.org/ftp/arxiv/papers/1712/1712.05627.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="78byKIiYt"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tricco</surname>
            <given-names>AC</given-names>
          </name>
          <name name-style="western">
            <surname>Lillie</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Zarin</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>O'Brien</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Colquhoun</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Kastner</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Levac</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Ng</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Sharpe</surname>
            <given-names>JP</given-names>
          </name>
          <name name-style="western">
            <surname>Wilson</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Kenny</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Warren</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Wilson</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Stelfox</surname>
            <given-names>HT</given-names>
          </name>
          <name name-style="western">
            <surname>Straus</surname>
            <given-names>SE</given-names>
          </name>
        </person-group>
        <article-title>A scoping review on the conduct and reporting of scoping reviews</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2016</year>  
        <month>02</month>  
        <day>09</day>  
        <volume>16</volume>  
        <fpage>15</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedresmethodol.biomedcentral.com/articles/10.1186/s12874-016-0116-4"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12874-016-0116-4</pub-id>
        <pub-id pub-id-type="medline">26857112</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12874-016-0116-4</pub-id>
        <pub-id pub-id-type="pmcid">PMC4746911</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Levac</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Colquhoun</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>O'Brien</surname>
            <given-names>KK</given-names>
          </name>
        </person-group>
        <article-title>Scoping studies: Advancing the methodology</article-title>
        <source>Implement Sci</source>  
        <year>2010</year>  
        <month>09</month>  
        <day>20</day>  
        <volume>5</volume>  
        <fpage>69</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://implementationscience.biomedcentral.com/articles/10.1186/1748-5908-5-69"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1748-5908-5-69</pub-id>
        <pub-id pub-id-type="medline">20854677</pub-id>
        <pub-id pub-id-type="pii">1748-5908-5-69</pub-id>
        <pub-id pub-id-type="pmcid">PMC2954944</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Peters</surname>
            <given-names>MDJ</given-names>
          </name>
          <name name-style="western">
            <surname>Godfrey</surname>
            <given-names>CM</given-names>
          </name>
          <name name-style="western">
            <surname>Khalil</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>McInerney</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Parker</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Soares</surname>
            <given-names>CB</given-names>
          </name>
        </person-group>
        <article-title>Guidance for conducting systematic scoping reviews</article-title>
        <source>Int J Evid Based Healthc</source>  
        <year>2015</year>  
        <month>09</month>  
        <volume>13</volume>  
        <issue>3</issue>  
        <fpage>141</fpage>  
        <lpage>146</lpage>  
        <pub-id pub-id-type="doi">10.1097/XEB.0000000000000050</pub-id>
        <pub-id pub-id-type="medline">26134548</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
        <source>US National Library of Medicine</source>  
        <year>2019</year>  
        <access-date>2018-05-24</access-date>
        <comment>Fact Sheet: MEDLINE® Journal Selection 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nlm.nih.gov/lstrc/jsel.html">https://www.nlm.nih.gov/lstrc/jsel.html</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78byuh1EF"/></comment> </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kushida</surname>
            <given-names>CA</given-names>
          </name>
          <name name-style="western">
            <surname>Nichols</surname>
            <given-names>DA</given-names>
          </name>
          <name name-style="western">
            <surname>Jadrnicek</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Miller</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Walsh</surname>
            <given-names>JK</given-names>
          </name>
          <name name-style="western">
            <surname>Griffin</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies</article-title>
        <source>Med Care</source>  
        <year>2012</year>  
        <month>07</month>  
        <volume>50 Suppl</volume>  
        <fpage>S82</fpage>  
        <lpage>S101</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22692265"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1097/MLR.0b013e3182585355</pub-id>
        <pub-id pub-id-type="medline">22692265</pub-id>
        <pub-id pub-id-type="pii">00005650-201207001-00017</pub-id>
        <pub-id pub-id-type="pmcid">PMC6502465</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kayaalp</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Patient privacy in the era of big data</article-title>
        <source>Balkan Med J</source>  
        <year>2018</year>  
        <month>12</month>  
        <day>20</day>  
        <volume>35</volume>  
        <issue>1</issue>  
        <fpage>8</fpage>  
        <lpage>17</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.4274/balkanmedj.2017.0966"/>
        </comment>  
        <pub-id pub-id-type="doi">10.4274/balkanmedj.2017.0966</pub-id>
        <pub-id pub-id-type="medline">28903886</pub-id>
        <pub-id pub-id-type="pmcid">PMC5820452</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Baerlocher</surname>
            <given-names>MO</given-names>
          </name>
          <name name-style="western">
            <surname>Newton</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Gautam</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Tomlinson</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Detsky</surname>
            <given-names>AS</given-names>
          </name>
        </person-group>
        <article-title>The meaning of author order in medical research</article-title>
        <source>J Investig Med</source>  
        <year>2007</year>  
        <month>05</month>  
        <volume>55</volume>  
        <issue>4</issue>  
        <fpage>174</fpage>  
        <lpage>180</lpage>  
        <pub-id pub-id-type="doi">10.2310/6650.2007.06044</pub-id>
        <pub-id pub-id-type="medline">17651671</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>HJ</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>MJ</given-names>
          </name>
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Shin</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Lyu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Park</surname>
            <given-names>YR</given-names>
          </name>
          <name name-style="western">
            <surname>Yoo</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Establishing the role of honest broker: Bridging the gap between protecting personal health data and clinical research efficiency</article-title>
        <source>PeerJ</source>  
        <year>2015</year>  
        <volume>3</volume>  
        <fpage>e1506</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.7717/peerj.1506"/>
        </comment>  
        <pub-id pub-id-type="doi">10.7717/peerj.1506</pub-id>
        <pub-id pub-id-type="medline">26713253</pub-id>
        <pub-id pub-id-type="pii">1506</pub-id>
        <pub-id pub-id-type="pmcid">PMC4690386</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ye</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>ES</given-names>
          </name>
        </person-group>
        <article-title>Attribute Utility Motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers</article-title>
        <source>AMIA Annu Symp Proc</source>  
        <year>2011</year>  
        <volume>2011</volume>  
        <fpage>1573</fpage>  
        <lpage>1582</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22195223"/>
        </comment>  
        <pub-id pub-id-type="medline">22195223</pub-id>
        <pub-id pub-id-type="pmcid">PMC3243250</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chazard</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Mouret</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Ficheur</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Schaffar</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Beuscart</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Beuscart</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Proposal and evaluation of FASDIM, a Fast And Simple De-Identification Method for unstructured free-text clinical records</article-title>
        <source>Int J Med Inform</source>  
        <year>2014</year>  
        <month>04</month>  
        <volume>83</volume>  
        <issue>4</issue>  
        <fpage>303</fpage>  
        <lpage>312</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.11.005</pub-id>
        <pub-id pub-id-type="medline">24370391</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(13)00246-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pantazos</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Lauesen</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Lippert</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Preserving medical correctness, readability and consistency in de-identified health records</article-title>
        <source>Health Informatics J</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>23</volume>  
        <issue>4</issue>  
        <fpage>291</fpage>  
        <lpage>303</lpage>  
        <pub-id pub-id-type="doi">10.1177/1460458216647760</pub-id>
        <pub-id pub-id-type="medline">27199298</pub-id>
        <pub-id pub-id-type="pii">1460458216647760</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>O'Neill</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Dexter</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>The risks to patient privacy from publishing data from clinical anesthesia studies</article-title>
        <source>Anesth Analg</source>  
        <year>2016</year>  
        <month>12</month>  
        <volume>122</volume>  
        <issue>6</issue>  
        <fpage>2017</fpage>  
        <lpage>2027</lpage>  
        <pub-id pub-id-type="doi">10.1213/ANE.0000000000001331</pub-id>
        <pub-id pub-id-type="medline">27172145</pub-id></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Grouin</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Rosier</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Dameron</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Zweigenbaum</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Testing tactics to localize de-identification</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2009</year>  
        <volume>150</volume>  
        <fpage>735</fpage>  
        <lpage>739</lpage>  
        <pub-id pub-id-type="medline">19745408</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Townend</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>EU laws on privacy in genomic databases and biobanking</article-title>
        <source>J Law Med Ethics</source>  
        <year>2016</year>  
        <month>12</month>  
        <volume>44</volume>  
        <issue>1</issue>  
        <fpage>128</fpage>  
        <lpage>142</lpage>  
        <pub-id pub-id-type="doi">10.1177/1073110516644204</pub-id>
        <pub-id pub-id-type="medline">27256129</pub-id>
        <pub-id pub-id-type="pii">44/1/128</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sariyar</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Schlünder</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <article-title>Reconsidering anonymization-related concepts and the term "identification" against the backdrop of the European legal framework</article-title>
        <source>Biopreserv Biobank</source>  
        <year>2016</year>  
        <month>10</month>  
        <volume>14</volume>  
        <issue>5</issue>  
        <fpage>367</fpage>  
        <lpage>374</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27104620"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1089/bio.2015.0100</pub-id>
        <pub-id pub-id-type="medline">27104620</pub-id>
        <pub-id pub-id-type="pmcid">PMC5073223</pub-id></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kohlmayer</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>Efficient and effective pruning strategies for health data de-identification</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2016</year>  
        <month>04</month>  
        <day>30</day>  
        <volume>16</volume>  
        <fpage>49</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-016-0287-2"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12911-016-0287-2</pub-id>
        <pub-id pub-id-type="medline">27130179</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12911-016-0287-2</pub-id>
        <pub-id pub-id-type="pmcid">PMC4851781</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shin</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Park</surname>
            <given-names>YR</given-names>
          </name>
          <name name-style="western">
            <surname>Shin</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>HJ</given-names>
          </name>
          <name name-style="western">
            <surname>Park</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Lyu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>JH</given-names>
          </name>
        </person-group>
        <article-title>A de-identification method for bilingual clinical texts of various note types</article-title>
        <source>J Korean Med Sci</source>  
        <year>2015</year>  
        <month>01</month>  
        <volume>30</volume>  
        <issue>1</issue>  
        <fpage>7</fpage>  
        <lpage>15</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://jkms.org/DOIx.php?id=10.3346/jkms.2015.30.1.7"/>
        </comment>  
        <pub-id pub-id-type="doi">10.3346/jkms.2015.30.1.7</pub-id>
        <pub-id pub-id-type="medline">25552878</pub-id>
        <pub-id pub-id-type="pmcid">PMC4278030</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kohlmayer</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Eckert</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>A flexible approach to distributed data anonymization</article-title>
        <source>J Biomed Inform</source>  
        <year>2014</year>  
        <month>08</month>  
        <volume>50</volume>  
        <fpage>62</fpage>  
        <lpage>76</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(13)00193-7"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2013.12.002</pub-id>
        <pub-id pub-id-type="medline">24333850</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(13)00193-7</pub-id></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Heatherly</surname>
            <given-names>RD</given-names>
          </name>
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Denny</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Haines</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Roden</surname>
            <given-names>DM</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>BA</given-names>
          </name>
        </person-group>
        <article-title>Enabling genomic-phenomic association discovery without sacrificing anonymity</article-title>
        <source>PLoS One</source>  
        <year>2013</year>  
        <volume>8</volume>  
        <issue>2</issue>  
        <fpage>e53875</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0053875"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0053875</pub-id>
        <pub-id pub-id-type="medline">23405076</pub-id>
        <pub-id pub-id-type="pii">PONE-D-12-36146</pub-id>
        <pub-id pub-id-type="pmcid">PMC3566194</pub-id></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Gkoulalas-Divanis</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Anonymization of electronic medical records for validating genome-wide association studies</article-title>
        <source>Proc Natl Acad Sci U S A</source>  
        <year>2010</year>  
        <month>04</month>  
        <day>27</day>  
        <volume>107</volume>  
        <issue>17</issue>  
        <fpage>7898</fpage>  
        <lpage>7903</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.pnas.org/cgi/pmidlookup?view=long&amp;pmid=20385806"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1073/pnas.0911686107</pub-id>
        <pub-id pub-id-type="medline">20385806</pub-id>
        <pub-id pub-id-type="pii">0911686107</pub-id>
        <pub-id pub-id-type="pmcid">PMC2867915</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tamersoy</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Nergiz</surname>
            <given-names>ME</given-names>
          </name>
          <name name-style="western">
            <surname>Saygin</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Anonymization of longitudinal electronic medical records</article-title>
        <source>IEEE Trans Inf Technol Biomed</source>  
        <year>2012</year>  
        <month>05</month>  
        <volume>16</volume>  
        <issue>3</issue>  
        <fpage>413</fpage>  
        <lpage>423</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22287248"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1109/TITB.2012.2185850</pub-id>
        <pub-id pub-id-type="medline">22287248</pub-id>
        <pub-id pub-id-type="pmcid">PMC3779068</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Benitez</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Masys</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Never too old for anonymity: A statistical standard for demographic data sharing via the HIPAA Privacy Rule</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2011</year>  
        <volume>18</volume>  
        <issue>1</issue>  
        <fpage>3</fpage>  
        <lpage>10</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21169618"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/jamia.2010.004622</pub-id>
        <pub-id pub-id-type="medline">21169618</pub-id>
        <pub-id pub-id-type="pii">18/1/3</pub-id>
        <pub-id pub-id-type="pmcid">PMC3005867</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Denny</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>The disclosure of diagnosis codes can breach research participants' privacy</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2010</year>  
        <volume>17</volume>  
        <issue>3</issue>  
        <fpage>322</fpage>  
        <lpage>327</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20442151"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/jamia.2009.002725</pub-id>
        <pub-id pub-id-type="medline">20442151</pub-id>
        <pub-id pub-id-type="pii">17/3/322</pub-id>
        <pub-id pub-id-type="pmcid">PMC2995712</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Gkoulalas-Divanis</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Utility-aware anonymization of diagnosis codes</article-title>
        <source>IEEE J Biomed Health Inform</source>  
        <year>2013</year>  
        <month>01</month>  
        <volume>17</volume>  
        <issue>1</issue>  
        <fpage>60</fpage>  
        <lpage>70</lpage>  
        <pub-id pub-id-type="doi">10.1109/TITB.2012.2212281</pub-id>
        <pub-id pub-id-type="medline">22893444</pub-id></nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kohlmayer</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>The importance of context: Risk-based de-identification of biomedical data</article-title>
        <source>Methods Inf Med</source>  
        <year>2016</year>  
        <month>08</month>  
        <day>05</day>  
        <volume>55</volume>  
        <issue>4</issue>  
        <fpage>347</fpage>  
        <lpage>355</lpage>  
        <pub-id pub-id-type="doi">10.3414/ME16-01-0012</pub-id>
        <pub-id pub-id-type="medline">27322502</pub-id>
        <pub-id pub-id-type="pii">16-01-0012</pub-id></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Heatherly</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Rasmussen</surname>
            <given-names>LV</given-names>
          </name>
          <name name-style="western">
            <surname>Peissig</surname>
            <given-names>PL</given-names>
          </name>
          <name name-style="western">
            <surname>Pacheco</surname>
            <given-names>JA</given-names>
          </name>
          <name name-style="western">
            <surname>Harris</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Denny</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>BA</given-names>
          </name>
        </person-group>
        <article-title>A multi-institution evaluation of clinical profile anonymization</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2016</year>  
        <month>04</month>  
        <volume>23</volume>  
        <issue>e1</issue>  
        <fpage>e131</fpage>  
        <lpage>e137</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26567325"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1093/jamia/ocv154</pub-id>
        <pub-id pub-id-type="medline">26567325</pub-id>
        <pub-id pub-id-type="pii">ocv154</pub-id>
        <pub-id pub-id-type="pmcid">PMC4954623</pub-id></nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Goodman</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Johnson</surname>
            <given-names>CO</given-names>
          </name>
          <name name-style="western">
            <surname>Bowen</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Wenzel</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Edwards</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>De-identified genomic data sharing: The research participant perspective</article-title>
        <source>J Community Genet</source>  
        <year>2017</year>  
        <month>07</month>  
        <volume>8</volume>  
        <issue>3</issue>  
        <fpage>173</fpage>  
        <lpage>181</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28382417"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s12687-017-0300-1</pub-id>
        <pub-id pub-id-type="medline">28382417</pub-id>
        <pub-id pub-id-type="pii">10.1007/s12687-017-0300-1</pub-id>
        <pub-id pub-id-type="pmcid">PMC5496839</pub-id></nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kohlmayer</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Spengler</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>A scalable and pragmatic method for the safe sharing of high-quality health data</article-title>
        <source>IEEE J Biomed Health Inform</source>  
        <year>2018</year>  
        <month>12</month>  
        <volume>22</volume>  
        <issue>2</issue>  
        <fpage>611</fpage>  
        <lpage>622</lpage>  
        <pub-id pub-id-type="doi">10.1109/JBHI.2017.2676880</pub-id>
        <pub-id pub-id-type="medline">28358693</pub-id></nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Bild</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>A generic method for assessing the quality of de-identified health data</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2016</year>  
        <volume>228</volume>  
        <fpage>312</fpage>  
        <lpage>316</lpage>  
        <pub-id pub-id-type="medline">27577394</pub-id></nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Moher</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Privacy and anonymity challenges when collecting data for public health purposes</article-title>
        <source>J Law Med Ethics</source>  
        <year>2013</year>  
        <month>03</month>  
        <volume>41 Suppl 1</volume>  
        <fpage>37</fpage>  
        <lpage>41</lpage>  
        <pub-id pub-id-type="doi">10.1111/jlme.12036</pub-id>
        <pub-id pub-id-type="medline">23590738</pub-id></nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Majeed</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Ullah</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Vulnerability- and diversity-aware anonymization of personally identifiable information for improving user privacy and utility of publishing data</article-title>
        <source>Sensors (Basel)</source>  
        <year>2017</year>  
        <month>05</month>  
        <day>08</day>  
        <volume>17</volume>  
        <issue>5</issue>  
        <fpage>1</fpage>  
        <lpage>23</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.mdpi.com/resolver?pii=s17051059"/>
        </comment>  
        <pub-id pub-id-type="doi">10.3390/s17051059</pub-id>
        <pub-id pub-id-type="medline">28481298</pub-id>
        <pub-id pub-id-type="pii">s17051059</pub-id>
        <pub-id pub-id-type="pmcid">PMC5469664</pub-id></nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Xia</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Heatherly</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Ding</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>BA</given-names>
          </name>
        </person-group>
        <article-title>R-U policy frontiers for health data de-identification</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2015</year>  
        <month>09</month>  
        <volume>22</volume>  
        <issue>5</issue>  
        <fpage>1029</fpage>  
        <lpage>1041</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25911674"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1093/jamia/ocv004</pub-id>
        <pub-id pub-id-type="medline">25911674</pub-id>
        <pub-id pub-id-type="pii">ocv004</pub-id>
        <pub-id pub-id-type="pmcid">PMC4986667</pub-id></nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hrynaszkiewicz</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Norton</surname>
            <given-names>ML</given-names>
          </name>
          <name name-style="western">
            <surname>Vickers</surname>
            <given-names>AJ</given-names>
          </name>
          <name name-style="western">
            <surname>Altman</surname>
            <given-names>DG</given-names>
          </name>
        </person-group>
        <article-title>Preparing raw clinical data for publication: Guidance for journal editors, authors, and peer reviewers</article-title>
        <source>Trials</source>  
        <year>2010</year>  
        <month>01</month>  
        <day>29</day>  
        <volume>11</volume>  
        <fpage>9</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/1745-6215-11-9"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1745-6215-11-9</pub-id>
        <pub-id pub-id-type="medline">20113465</pub-id>
        <pub-id pub-id-type="pii">1745-6215-11-9</pub-id>
        <pub-id pub-id-type="pmcid">PMC2825513</pub-id></nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Privacy preserving data anonymization of spontaneous ADE reporting system dataset</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2016</year>  
        <month>12</month>  
        <day>18</day>  
        <volume>16 Suppl 1</volume>  
        <fpage>58</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-016-0293-4"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12911-016-0293-4</pub-id>
        <pub-id pub-id-type="medline">27454754</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12911-016-0293-4</pub-id>
        <pub-id pub-id-type="pmcid">PMC4959360</pub-id></nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bartholomäus</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Hense</surname>
            <given-names>HW</given-names>
          </name>
          <name name-style="western">
            <surname>Heidinger</surname>
            <given-names>O</given-names>
          </name>
        </person-group>
        <article-title>Blinded Anonymization: A method for evaluating cancer prevention programs under restrictive data protection regulations</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2015</year>  
        <volume>210</volume>  
        <fpage>424</fpage>  
        <lpage>428</lpage>  
        <pub-id pub-id-type="medline">25991179</pub-id></nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fernandes</surname>
            <given-names>AC</given-names>
          </name>
          <name name-style="western">
            <surname>Cloete</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Broadbent</surname>
            <given-names>MT</given-names>
          </name>
          <name name-style="western">
            <surname>Hayes</surname>
            <given-names>RD</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Jackson</surname>
            <given-names>RG</given-names>
          </name>
          <name name-style="western">
            <surname>Roberts</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Tsang</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Soncul</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Liebscher</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Stewart</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Callard</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <article-title>Development and evaluation of a de-identification procedure for a case register sourced from mental health electronic records</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2013</year>  
        <month>07</month>  
        <day>11</day>  
        <volume>13</volume>  
        <fpage>71</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/1472-6947-13-71"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1472-6947-13-71</pub-id>
        <pub-id pub-id-type="medline">23842533</pub-id>
        <pub-id pub-id-type="pii">1472-6947-13-71</pub-id>
        <pub-id pub-id-type="pmcid">PMC3751474</pub-id></nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Dankar</surname>
            <given-names>FK</given-names>
          </name>
          <name name-style="western">
            <surname>Vaillancourt</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Roffey</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Lysyk</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Evaluating the risk of re-identification of patients from hospital prescription records</article-title>
        <source>Can J Hosp Pharm</source>  
        <year>2009</year>  
        <month>07</month>  
        <volume>62</volume>  
        <issue>4</issue>  
        <fpage>307</fpage>  
        <lpage>319</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22478909"/>
        </comment>  
        <pub-id pub-id-type="medline">22478909</pub-id>
        <pub-id pub-id-type="pmcid">PMC2826964</pub-id></nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Meystre</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Heider</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Trice</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Underwood</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Clinical text automatic de-identification to support large scale data reuse and sharing: Pilot results</article-title>
        <source>Proceedings of the AMIA 2018 Annual Symposium</source>  
        <year>2018</year>  
        <month>11</month>  
        <day>05</day>  
        <conf-name>AMIA 2018 Annual Symposium</conf-name>
        <conf-date>November 3-7, 2018</conf-date>
        <conf-loc>San Francisco, CA</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://symposium2018.zerista.com/event/member/509567"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shaw</surname>
            <given-names>DM</given-names>
          </name>
        </person-group>
        <article-title>Blinded by the light: Anonymization should be used in peer review to prevent bias, not protect referees</article-title>
        <source>EMBO Rep</source>  
        <year>2015</year>  
        <month>08</month>  
        <volume>16</volume>  
        <issue>8</issue>  
        <fpage>894</fpage>  
        <lpage>897</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://embor.embopress.org/cgi/pmidlookup?view=long&amp;pmid=26174615"/>
        </comment>  
        <pub-id pub-id-type="doi">10.15252/embr.201540943</pub-id>
        <pub-id pub-id-type="medline">26174615</pub-id>
        <pub-id pub-id-type="pii">embr.201540943</pub-id>
        <pub-id pub-id-type="pmcid">PMC4552481</pub-id></nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sinnott</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Ajayi</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Stell</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Young</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Towards a virtual anonymisation grid for unified access to remote clinical data</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2008</year>  
        <volume>138</volume>  
        <fpage>90</fpage>  
        <lpage>101</lpage>  
        <pub-id pub-id-type="medline">18560111</pub-id></nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Sinnott</surname>
            <given-names>RO</given-names>
          </name>
          <name name-style="western">
            <surname>Verspoor</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>A semantic-based k-anonymity scheme for health record linkage</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2017</year>  
        <volume>239</volume>  
        <fpage>84</fpage>  
        <lpage>90</lpage>  
        <pub-id pub-id-type="medline">28756441</pub-id></nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tamersoy</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Loukides</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Denny</surname>
            <given-names>JC</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Anonymization of administrative billing codes with repeated diagnoses through censoring</article-title>
        <source>AMIA Annu Symp Proc</source>  
        <year>2010</year>  
        <month>11</month>  
        <day>13</day>  
        <volume>2010</volume>  
        <fpage>782</fpage>  
        <lpage>786</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21347085"/>
        </comment>  
        <pub-id pub-id-type="medline">21347085</pub-id>
        <pub-id pub-id-type="pmcid">PMC3041421</pub-id></nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Thorogood</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Zawati</surname>
            <given-names>MH</given-names>
          </name>
        </person-group>
        <article-title>International guidelines for privacy in genomic biobanking (or the unexpected virtue of pluralism)</article-title>
        <source>J Law Med Ethics</source>  
        <year>2015</year>  
        <volume>43</volume>  
        <issue>4</issue>  
        <fpage>690</fpage>  
        <lpage>702</lpage>  
        <pub-id pub-id-type="doi">10.1111/jlme.12312</pub-id>
        <pub-id pub-id-type="medline">26711410</pub-id></nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Narayanan</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Felten</surname>
            <given-names>EW</given-names>
          </name>
        </person-group>
        <source>randomwalker.info</source>  
        <year>2014</year>  
        <month>07</month>  
        <day>09</day>  
        <access-date>2019-01-24</access-date>
        <comment>No silver bullet: De-identification still doesn't work 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf">http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="75fQcTcoA"/></comment> </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Foufi</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Gaudet-Blavignac</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Chevrier</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Lovis</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>De-identification of medical narrative data</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2017</year>  
        <volume>244</volume>  
        <fpage>23</fpage>  
        <lpage>27</lpage>  
        <pub-id pub-id-type="medline">29039370</pub-id></nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>O'Keefe</surname>
            <given-names>CM</given-names>
          </name>
          <name name-style="western">
            <surname>Westcott</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>O'Sullivan</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ickowicz</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Churches</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Anonymization for outputs of population health and health services research conducted via an online data center</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2017</year>  
        <month>05</month>  
        <day>01</day>  
        <volume>24</volume>  
        <issue>3</issue>  
        <fpage>544</fpage>  
        <lpage>549</lpage>  
        <pub-id pub-id-type="doi">10.1093/jamia/ocw152</pub-id>
        <pub-id pub-id-type="medline">28011594</pub-id>
        <pub-id pub-id-type="pii">ocw152</pub-id></nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fullerton</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>SS</given-names>
          </name>
        </person-group>
        <article-title>Secondary uses and the governance of de-identified data: Lessons from the human genome diversity panel</article-title>
        <source>BMC Med Ethics</source>  
        <year>2011</year>  
        <month>09</month>  
        <day>26</day>  
        <volume>12</volume>  
        <fpage>16</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/1472-6939-12-16"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1472-6939-12-16</pub-id>
        <pub-id pub-id-type="medline">21943371</pub-id>
        <pub-id pub-id-type="pii">1472-6939-12-16</pub-id>
        <pub-id pub-id-type="pmcid">PMC3195203</pub-id></nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Phillips</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Dove</surname>
            <given-names>ES</given-names>
          </name>
          <name name-style="western">
            <surname>Knoppers</surname>
            <given-names>BM</given-names>
          </name>
        </person-group>
        <article-title>Criminal prohibition of wrongful re‑identification: Legal solution or minefield for big data?</article-title>
        <source>J Bioeth Inq</source>  
        <year>2017</year>  
        <month>12</month>  
        <volume>14</volume>  
        <issue>4</issue>  
        <fpage>527</fpage>  
        <lpage>539</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28913771"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s11673-017-9806-9</pub-id>
        <pub-id pub-id-type="medline">28913771</pub-id>
        <pub-id pub-id-type="pii">10.1007/s11673-017-9806-9</pub-id>
        <pub-id pub-id-type="pmcid">PMC5715031</pub-id></nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kohlmayer</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Prasser</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kuhn</surname>
            <given-names>KA</given-names>
          </name>
        </person-group>
        <article-title>The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss</article-title>
        <source>J Biomed Inform</source>  
        <year>2015</year>  
        <month>12</month>  
        <volume>58</volume>  
        <fpage>37</fpage>  
        <lpage>48</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(15)00200-2"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2015.09.007</pub-id>
        <pub-id pub-id-type="medline">26385376</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(15)00200-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Arbuckle</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Moher</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Bartlett</surname>
            <given-names>SJ</given-names>
          </name>
          <name name-style="western">
            <surname>Ahmed</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: Anonymization and ethics considerations for capturing and sharing patient-reported outcomes</article-title>
        <source>J Clin Epidemiol</source>  
        <year>2017</year>  
        <month>09</month>  
        <volume>89</volume>  
        <fpage>168</fpage>  
        <lpage>172</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.jclinepi.2017.04.016</pub-id>
        <pub-id pub-id-type="medline">28433677</pub-id>
        <pub-id pub-id-type="pii">S0895-4356(17)30412-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Preventing unintended disclosure of personally identifiable data following anonymisation</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2017</year>  
        <volume>235</volume>  
        <fpage>313</fpage>  
        <lpage>317</lpage>  
        <pub-id pub-id-type="medline">28423805</pub-id></nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cimino</surname>
            <given-names>JJ</given-names>
          </name>
        </person-group>
        <article-title>The false security of blind dates: Chrononymization's lack of impact on data privacy of laboratory data</article-title>
        <source>Appl Clin Inform</source>  
        <year>2012</year>  
        <volume>3</volume>  
        <issue>4</issue>  
        <fpage>392</fpage>  
        <lpage>403</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23646086"/>
        </comment>  
        <pub-id pub-id-type="doi">10.4338/ACI-2012-07-RA-0028</pub-id>
        <pub-id pub-id-type="medline">23646086</pub-id>
        <pub-id pub-id-type="pmcid">PMC3613034</pub-id></nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>South</surname>
            <given-names>BR</given-names>
          </name>
          <name name-style="western">
            <surname>Mowery</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Suo</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Leng</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Ferrández</surname>
            <given-names>Ó</given-names>
          </name>
          <name name-style="western">
            <surname>Meystre</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Chapman</surname>
            <given-names>WW</given-names>
          </name>
        </person-group>
        <article-title>Evaluating the effects of machine pre-annotation and an interactive annotation interface on manual de-identification of clinical text</article-title>
        <source>J Biomed Inform</source>  
        <year>2014</year>  
        <month>08</month>  
        <volume>50</volume>  
        <fpage>162</fpage>  
        <lpage>172</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(14)00119-1"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jbi.2014.05.002</pub-id>
        <pub-id pub-id-type="medline">24859155</pub-id>
        <pub-id pub-id-type="pii">S1532-0464(14)00119-1</pub-id>
        <pub-id pub-id-type="pmcid">PMC5627768</pub-id></nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>The European Parliament and the Council of the European Union</collab>
        </person-group>
        <source>Official Journal of the European Union. Volume 59</source>  
        <year>2016</year>  
        <month>05</month>  
        <day>04</day>  
        <access-date>2019-05-27</access-date>
        <publisher-loc>Luxembourg</publisher-loc>
        <publisher-name>Publications Office of the European Union</publisher-name>
        <comment>Legislation 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL&amp;from=EN</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="78gSMqiNn"/></comment> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
