-
1
-
-
33845429600
-
Toward a national framework for the secondary use of health data: An American Medical Informatics Association white paper
-
C. Safran, M. Bloomrosen, E. Hammond, S. Labkoff, K.-F. S, P. Tang, and D. Detmer, "Toward a national framework for the secondary use of health data: An American Medical Informatics Association white paper," Journal of the American Medical Informatics Association, vol. 14, pp. 1-9, 2007.
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, pp. 1-9
-
-
Safran, C.1
Bloomrosen, M.2
Hammond, E.3
Labkoff, S.4
S, K.-F.5
Tang, P.6
Detmer, D.7
-
4
-
-
0000072558
-
Finding a needle in a haystack or identifying anonymous census records
-
T. Dalenius, "Finding a needle in a haystack or identifying anonymous census records," Journal of Official Statistics, vol. 2, pp. 329-336, 1986.
-
(1986)
Journal of Official Statistics
, vol.2
, pp. 329-336
-
-
Dalenius, T.1
-
6
-
-
33846936304
-
Evaluating common de-identification heuristics for personal health information
-
K. El Emam, S. Jabbouri, S. Sams, Y. Drouet, and M. Power, "Evaluating common de-identification heuristics for personal health information," Journal of Medical Internet Research, vol. 8, p. e28, 2006.
-
(2006)
Journal of Medical Internet Research
, vol.8
-
-
El Emam, K.1
Jabbouri, S.2
Sams, S.3
Drouet, Y.4
Power, M.5
-
7
-
-
77951623059
-
-
report prepared for the Office of the Privacy Commissioner of Canada
-
K. El Emam, E. Jonker, S. Sams, E. Neri, A. Neisa, T. Gao, and S. Chowdhury, "Pan-Canadian De-Identification Guidelines for Personal Health Information (report prepared for the Office of the Privacy Commissioner of Canada)," 2007.
-
(2007)
Pan-Canadian De-Identification Guidelines for Personal Health Information
-
-
El Emam, K.1
Jonker, E.2
Sams, S.3
Neri, E.4
Neisa, A.5
Gao, T.6
Chowdhury, S.7
-
8
-
-
34548161843
-
-
Canadian Institutes of Health Research, Canadian Institutes of Health Research
-
Canadian Institutes of Health Research, "CIHR best practices for protecting privacy in health research," Canadian Institutes of Health Research 2005.
-
(2005)
CIHR Best Practices for Protecting Privacy in Health Research
-
-
-
11
-
-
60049086085
-
Privacy Interests in Prescription Records, Part 1: Prescriber Privacy
-
P. Kosseim and K. El Emam, "Privacy Interests in Prescription Records, Part 1: Prescriber Privacy," IEEE Security and Privacy, vol. 7, pp. 72-76, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 72-76
-
-
Kosseim, P.1
El Emam, K.2
-
12
-
-
65249152887
-
Privacy Interests in Prescription Records, Part 2: Patient Privacy
-
K. El Emam and P. Kosseim, "Privacy Interests in Prescription Records, Part 2: Patient Privacy," IEEE Security and Privacy, vol. 7, pp. 75-78, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 75-78
-
-
El Emam, K.1
Kosseim, P.2
-
13
-
-
69549117388
-
Evaluating patient re-identification risk from hospital prescription records
-
K. El Emam, F. K. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk, "Evaluating patient re-identification risk from hospital prescription records," Canadian Journal of Hospital Pharmacy, vol. 62, pp. 307-319, 2009.
-
(2009)
Canadian Journal of Hospital Pharmacy
, vol.62
, pp. 307-319
-
-
El Emam, K.1
Dankar, F.K.2
Vaillancourt, R.3
Roffey, T.4
Lysyk, M.5
-
16
-
-
70350369355
-
-
Springer-verlag
-
S. Stolfo, S. Bellovin, S. Herkshop, A. Keromytis, S. Sinclair, and S. Smith, Insider attack and cyber security: Springer-verlag, 2008.
-
(2008)
Insider Attack and Cyber Security
-
-
Stolfo, S.1
Bellovin, S.2
Herkshop, S.3
Keromytis, A.4
Sinclair, S.5
Smith, S.6
-
18
-
-
32644465248
-
-
Carnegie Mellon University and the United States Secret Service
-
M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," in Carnegie Mellon University and the United States Secret Service, 2004.
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
19
-
-
27844543023
-
-
Carnegie Mellon University and the United States Secret Service
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers, "Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors," in Carnegie Mellon University and the United States Secret Service, 2005.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
20
-
-
67650355861
-
-
Carnegie Mellon University and the United States Secret Service
-
E. Kowalski, T. Conway, S. Keverline, M. Williams, D. Cappelli, B. Willke, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Government Sector," in Carnegie Mellon University and the United States Secret Service, 2008.
-
(2008)
Insider Threat Study: Illicit Cyber Activity in the Government Sector
-
-
Kowalski, E.1
Conway, T.2
Keverline, S.3
Williams, M.4
Cappelli, D.5
Willke, B.6
Moore, A.7
-
22
-
-
36749027891
-
2006 e-crime watch survey
-
US Secret Service, Carnegie Mellon University, and Microsoft Corporation
-
CSO Magazine, "2006 e-crime watch survey," US Secret Service, Carnegie Mellon University, and Microsoft Corporation 2006.
-
(2006)
CSO Magazine
-
-
-
23
-
-
49249119924
-
Insiders behaving badly
-
J. Predd, J. Hunker, and C. Bulford, "Insiders behaving badly," IEEE Security and Privacy, vol. 6, pp. 66-70, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 66-70
-
-
Predd, J.1
Hunker, J.2
Bulford, C.3
-
29
-
-
77955796645
-
-
Available at
-
[Available at: http://www.ehealthinformation.ca/dataloss].
-
-
-
-
31
-
-
77955808028
-
Alleged LTTE front had voter lists
-
S. Bell, "Alleged LTTE front had voter lists," in National Post, 2006.
-
(2006)
National Post
-
-
Bell, S.1
-
32
-
-
77955785477
-
Privacy chief probes how group got voter lists
-
S. Bell, "Privacy chief probes how group got voter lists," in National Post, 2006.
-
(2006)
National Post
-
-
Bell, S.1
-
33
-
-
77955787145
-
Voters lists 'most disturbing' items seized in Tamil raids, documents say
-
May 7
-
C. Freeze and C. Clark, "Voters lists 'most disturbing' items seized in Tamil raids, documents say," in Globe and Mail, May 7, 2008.
-
(2008)
Globe and Mail
-
-
Freeze, C.1
Clark, C.2
-
34
-
-
0348062787
-
Disclosure risk assessment in statistical microdata protection via advanced record linkage
-
J. Domingo-Ferrer and V. Torra, "Disclosure risk assessment in statistical microdata protection via advanced record linkage," Statistics and Computing, vol. 13, 2003.
-
(2003)
Statistics and Computing
, vol.13
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
35
-
-
20444450227
-
Assessing global disclosure risk in masked microdata
-
T. M. Truta, F. Fotouhi, and D. Barth-Jones, "Assessing global disclosure risk in masked microdata," in Proceedings of the Workshop on Privacy and Electronic Society (WPES2004), in conjunction with 11th ACM CCS, 2004, pp. 85-93.
-
Proceedings of the Workshop on Privacy and Electronic Society (WPES2004), in Conjunction with 11th ACM CCS, 2004
, pp. 85-93
-
-
Truta, T.M.1
Fotouhi, F.2
Barth-Jones, D.3
-
37
-
-
54949127921
-
Assessing identification risk in survey microdata using log-linear models
-
C. Skinner and N. Shlomo, "Assessing identification risk in survey microdata using log-linear models," Journal of the American Statistical Association, vol. 103, pp. 989-1001, 2008.
-
(2008)
Journal of the American Statistical Association
, vol.103
, pp. 989-1001
-
-
Skinner, C.1
Shlomo, N.2
-
38
-
-
0001883017
-
Disclosure control of microdata
-
J. Bethlehem, W. Keller, and J. Pannekoek, "Disclosure control of microdata," Journal of the American Statistical Association, vol. 85, pp. 38-45, 1990.
-
(1990)
Journal of the American Statistical Association
, vol.85
, pp. 38-45
-
-
Bethlehem, J.1
Keller, W.2
Pannekoek, J.3
-
40
-
-
0001289403
-
The Moment Generating Function and Negative Integer Moments
-
N. Cressie, A. S. Davis, J. Folks, and G. E. Policello, "The Moment Generating Function and Negative Integer Moments," American Statistician, vol. 35, pp. 148-150, 1981.
-
(1981)
American Statistician
, vol.35
, pp. 148-150
-
-
Cressie, N.1
Davis, A.S.2
Folks, J.3
Policello, G.E.4
-
42
-
-
33847342133
-
Method to assess identifiability in electronic data files
-
H. Howe, A. Lake, and T. Shen, "Method to assess identifiability in electronic data files," American Journal of Epidemiology, vol. 165, pp. 597-601, 2007.
-
(2007)
American Journal of Epidemiology
, vol.165
, pp. 597-601
-
-
Howe, H.1
Lake, A.2
Shen, T.3
-
48
-
-
77955830878
-
-
Available at
-
[Available at: http://www.everyclickmatters.com/victim/assessmenttool. html].
-
-
-
-
50
-
-
19144373610
-
For sale: Your secret medical record for 150
-
L. Rogers and D. Leppard, "For sale: Your secret medical record for 150," in Sunday Times, 1995, p. 2.
-
(1995)
Sunday Times
, pp. 2
-
-
Rogers, L.1
Leppard, D.2
-
51
-
-
77955776780
-
Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions
-
D. Kravets, "Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions," in Wired, 2008.
-
(2008)
Wired
-
-
Kravets, D.1
-
52
-
-
77955809691
-
Hackers Break into Virginia Health Professions Database, Demand Ransom
-
vol. May 4
-
B. Krebs, "Hackers Break Into Virginia Health Professions Database, Demand Ransom," in Washington Post. vol. May 4, 2009.
-
(2009)
Washington Post
-
-
Krebs, B.1
|