-
2
-
-
0030660127
-
Effects of record linkage errors on registry-based follow-up studies
-
Brenner, H., Schmidtmann, I. and Stegmaier, C. (1997). Effects of record linkage errors on registry-based follow-up studies, Statistics in Medicine, 16, pp. 2633-2643.
-
(1997)
Statistics in Medicine
, vol.16
, pp. 2633-2643
-
-
Brenner, H.1
Schmidtmann, I.2
Stegmaier, C.3
-
4
-
-
13444256330
-
-
Retrieved April 8, 2008, from
-
Churches, T. and Christen, P. (2004). Some methods for blindfolded record linkage, BMC Medical Informatics and Decision Making, 4, pp. 1-17. Retrieved April 8, 2008, from http://www.biomedcentral. com/content/pdf/1472-6947-4-9.pdf
-
(2004)
Some Methods for Blindfolded Record Linkage, BMC Medical Informatics and Decision Making
, vol.4
, pp. 1-17
-
-
Churches, T.1
Christen, P.2
-
5
-
-
0034915752
-
-
Customer Service Staff, Harvard Pilgrim, telephone interview with author, June 9, 2004.
-
Cook, L.J., Olson, L.M. and Dean, J.M. (2001). Probabilistic records linkage: Relationships between file sizes, identifiers, and match weights, Methods of Information in Medicine, 40, pp. 196-203. Customer Service Staff, Harvard Pilgrim, telephone interview with author, June 9, 2004.
-
(2001)
Probabilistic Records Linkage: Relationships between File Sizes, Identifiers, and Match Weights, Methods of Information in Medicine
, vol.40
, pp. 196-203
-
-
Cook, L.J.1
Olson, L.M.2
Dean, J.M.3
-
7
-
-
85025328365
-
-
7th ACM Conference on Computer and Communications Security (ACMCCS 2000), The First Workshop on Security and Privacy in E-Commerce., November 2000, Athens.
-
Du, W. and Atallah, M. (2000). Protocols for secure remote database access with approximate matching. 7th ACM Conference on Computer and Communications Security (ACMCCS 2000), The First Workshop on Security and Privacy in E-Commerce. November 2000, Athens.
-
(2000)
Protocols for Secure Remote Database Access with Approximate Matching.
-
-
Du, W.1
Atallah, M.2
-
9
-
-
85025331928
-
-
April, Retrieved August 20, 2008, from
-
Government Accountability Office. (2001, April). Record linkage and privacy. Retrieved August 20, 2008, from http://www.gao.gov/ new.items/d01126sp.pdf
-
(2001)
Record Linkage and Privacy
-
-
-
10
-
-
69549083553
-
-
Proceedings of the 11th World Congress on Medical Informatics, 2004, Part 1. M. Fieschi, E. Coiera, and Y. Li (eds.), Retrieved June 20, 2008, from
-
Grannis, S., Overhage, J.M. and McDonald, C. (2004). Real world performance of approximate string comparators for use in patient matching, in Proceedings of the 11th World Congress on Medical Informatics, 2004, Part 1. M. Fieschi, E. Coiera, and Y. Li (eds.), pp. 43-7. Retrieved June 20, 2008, from http://www.cs.mun.ca/-harold/ Courses/Old/CS6772.F04/Diary/5604Grannis.pdf
-
(2004)
Real World Performance of Approximate String Comparators for Use in Patient Matching
, pp. 43-47
-
-
Grannis, S.1
Overhage, J.M.2
McDonald, C.3
-
11
-
-
38949103680
-
Combating the insider cyber threat, security & privacy
-
Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A. and Hull, T.D. (2008). Combating the insider cyber threat, Security & Privacy, IEEE, 1, pp. 61-64.
-
(2008)
IEEE
, vol.1
, pp. 61-64
-
-
Greitzer, F.L.1
Moore, A.P.2
Cappelli, D.M.3
Rews, D.H.4
Carroll, L.A.5
Hull, T.D.6
-
12
-
-
0029478393
-
A two-phase encryption scheme for enhancing database security
-
Hwang, M-S and Yang, W-P. (1995). A two-phase encryption scheme for enhancing database security, Journal of Systems Software, 31, pp. 257-265.
-
(1995)
Journal of Systems Software
, vol.31
, pp. 257-265
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
14
-
-
12344335940
-
-
Retrieved February 26, 2008, from
-
Jones, M.N. and Mewhort, D.J.K. (2004). Case-sensitive letter and bigram frequency counts from large-scale English corpora, Behavior Research Methods, Instruments, & Computers, 3, pp. 388-396. Retrieved February 26, 2008, from http://psyc.queensu.ca/-hiplab/LAB_PUBS/BAR120.pdf
-
(2004)
Case-Sensitive Letter and Bigram Frequency Counts from Large-Scale English Corpora, Behavior Research Methods, Instruments, & Computers
, vol.3
, pp. 388-396
-
-
Jones, M.N.1
Mewhort, D.2
-
15
-
-
0034208574
-
Elements of a comprehensive security solution
-
Katz, D. (2006). Elements of a comprehensive security solution, Health Management Technology, 21, pp. 12-6.
-
(2006)
Health Management Technology
, vol.21
, pp. 12-16
-
-
Katz, D.1
-
16
-
-
0032616440
-
-
Chronic Diseases in Canada, V. 20. Retrieved August 20, 2008, from
-
Liu, S. and Wen, S-W. (2000). Development of record linkage of hospital discharge data for the study of neonatal readmission. Chronic Diseases in Canada, V. 20. Retrieved August 20, 2008, from http:// www.phac-aspc.gc.ca/publicat/cdic-mcc/ 20-2/c_e.html
-
(2000)
Development of Record Linkage of Hospital Discharge Data for the Study of Neonatal Readmission.
-
-
Liu, S.1
Wen, S.-W.2
-
17
-
-
85025356224
-
-
December, Retrieved May 18, 2008, from
-
Medical Expenditures Panel Survey. (2007, December). National health care expenses in the U.S. civilian noninstitutionalized population, 2005. Retrieved May 18, 2008, from http://www.meps.ahrq.gov/mepsweb/ data_files/publications/st193/stat193.pdf#xml=http://meps. ahrq.gov/cgi- bin/texis/webinator/search/pdfhi.txt?query=cost+of+health+care+ 2005&pr=MEPSPUBS&prox=page&rorder=500&rprox=500&rdfreq= 500&rwfreq=500&rlead=500&sufs=0&order=r&cq=&id=48b63f222c
-
(2007)
National Health Care Expenses in the U.S. Civilian Noninstitutionalized Population, 2005
-
-
-
19
-
-
70350372200
-
-
Retrieved August 20, 2008, from
-
Palace, B. Data mining: What is data mining? Retrieved August 20, 2008, from http://www.anderson.ucla.edu/faculty/jason.frand/ teacher/technologies/palace/datamining.htm
-
Data Mining: What is Data Mining?
-
-
Palace, B.1
-
20
-
-
85025367978
-
Coaxing additional sales from clients
-
Parlin, K. and Hawthorne, J. (2003). Coaxing additional sales from clients, Internet World, 9, pp. 0-12.
-
(2003)
Internet World
, vol.9
, pp. 12
-
-
Parlin, K.1
Hawthorne, J.2
-
23
-
-
85025339077
-
-
November 2, Retrieved July 17, 2008, from
-
Radcliff, D. (1998, November 2). Invisible loot, Industry Week. Retrieved July 17, 2008, from http://www.industryweek.com/CurrentArticles/ ASP/articles.asp?ArticleId=298
-
(1998)
Invisible Loot, Industry Week
-
-
Radcliff, D.1
-
24
-
-
85025362867
-
-
Retrieved April 8, 2008, from
-
Sam's String Metrics. (2006). Dice's coefficient. Retrieved April 8, 2008, from http://www.dcs.shef.ac.uk/-sam/stringmetrics.html#dice
-
(2006)
Dice's Coefficient.
-
-
-
25
-
-
85025355176
-
-
Retrieved February 23, 2008, from
-
Social Security Administration. (2003). Is there any significance to the numbers assigned in the social security number? Retrieved February 23, 2008, from http://ssa-custhelp.ssa.gov/cgi-bin/ssa.cfg/php/enduser/ std_adp.php?p_sid=mtTFC74h&p_lva=&p_faqid=87&p_created= 955483216&p_sp=cF9zcmNoPSZwX2dyaWRzb3J0PSZwX3Jvd19jbnQ9 NjImcF9jYXRfbHZsMT0xN iZwX3 BhZ2U9MQ**&p_li
-
(2003)
Is There Any Significance to the Numbers Assigned in the Social Security Number?
-
-
-
26
-
-
57149136725
-
-
Retrieved June 24, 2008, from
-
Social Security Administration. (2008). Social security number allocations. Retrieved June 24, 2008, from http://www.socialsecurity.gov/ employer/ stateweb.htm
-
(2008)
Social Security Number Allocations
-
-
-
27
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA, May 14-17, 2000.
-
Song, D-X, Wagner, D. and Perrig, A. (2000). Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy. Berkeley, CA, May 14-17, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Song, D.-X.1
Wagner, D.2
Perrig, A.3
-
28
-
-
85025358796
-
-
Technical Sales Staff, October 29)
-
Technical Sales Staff. (2007, October 29). Vontu, interview with author.
-
(2007)
Vontu, Interview with Author
-
-
-
29
-
-
66249148065
-
Data mining methods for linking data coming from several sources
-
3rd Joint UN/ECE-Eurostat Work session on statistical data confidentiality. Retrieved August 20, 2008
-
Torra, V., Domingo-Ferrer, J. and Torres, A. (2003). Data mining methods for linking data coming from several sources,. Monographs in official statistics. 3rd Joint UN/ECE-Eurostat Work session on statistical data confidentiality. Retrieved August 20, 2008, from http://www.iiia.csic.es/-vtorra/publications/unrestricted/con- fUNECE. 2003.143.150.pdf
-
(2003)
Monographs in Official Statistics
-
-
Torra, V.1
Domingo-Ferrer, J.2
Torres, A.3
-
30
-
-
64749094275
-
-
Cambridge, MA: Massachusetts Institute of Technology. Retrieved February 14, 2008, from
-
Trepetin, S. (2006). Privacy in context: The costs and benefits of a new deidentification method. Cambridge, MA: Massachusetts Institute of Technology. Retrieved February 14, 2008, from http://dspace.mit.edu/bitstream/1721.1/37975/1/148046911.pdf
-
(2006)
Privacy in Context: The Costs and Benefits of a New Deidentification Method
-
-
Trepetin, S.1
-
31
-
-
0038324972
-
-
December 28, Retrieved May 1 5, 2008, from
-
U.S. Department of Health and Human Services. (2000, December 28). Standards for privacy of individually identifiable health information (part 2), pp. 82511-82560. Retrieved May 1 5, 2008, from http://www.hhs.gov/ocr/ part2.pdf
-
(2000)
Standards for Privacy of Individually Identifiable Health Information
, pp. 82511-82560
-
-
-
32
-
-
85025340595
-
-
March 17, Retrieved February 7, 2008, from
-
U.S. Census Bureau. (2005, March 17). Names file. Retrieved February 7, 2008, from http://www.census.gov/genealogy/names/names_ files.html
-
(2005)
Names File
-
-
-
33
-
-
85025352153
-
-
February 15, Retrieved June 21, 2008, from
-
U.S. Census Bureau. (2008, February 15). Frequently accurring surnames from census 2000. Retrieved June 21, 2008, from http://www.census.gov/genealogy/www/freqnames2k.html
-
(2008)
Frequently Accurring Surnames from Census 2000
-
-
-
34
-
-
0034431889
-
Evaluation of the encryption procedure and record linkage in the belgian national cancer registry
-
Van Eycken, E., Haustermans, K., Buntinx, F., Ceuppens, A., Weyler, J., Wauters, E., Van Oyen, H., DeSchaever, M., Van Den Berge, D. and Haelterman, M. (2000). Evaluation of the encryption procedure and record linkage in the Belgian National Cancer Registry, Archives of Public Health, 58, pp. 281-294.
-
(2000)
Archives of Public Health
, vol.58
, pp. 281-294
-
-
Van Eycken, E.1
Haustermans, K.2
Buntinx, F.3
Ceuppens, A.4
Weyler, J.5
Wauters, E.6
Van Oyen, H.7
DeSchaever, M.8
Van Den Berge, D.9
Haelterman, M.10
-
35
-
-
85020233041
-
-
Retrieved September 2, 2008, from
-
Wikipedia. Kronecker delta. Retrieved September 2, 2008, from http:// en.wikipedia.org/wiki/Kronecker_delta
-
Kronecker Delta
-
-
|