메뉴 건너뛰기




Volumn 6, Issue 12, 2011, Pages

A systematic review of re-identification attacks on health data

Author keywords

[No Author keywords available]

Indexed keywords

ACM DIGITAL LIBRARY; BIBLIOGRAPHIC DATABASE; CONFIDENCE INTERVAL; DATA ANALYSIS; IEEE XPLORE; MEDICAL INFORMATION SYSTEM; MEDICAL RECORD; MEDICAL RESEARCH; MEDLINE; PUBLISHING; REVIEW; ARTICLE; COMPUTER PROGRAM; COMPUTER SECURITY; CONFIDENTIALITY; ELECTRONIC MEDICAL RECORD; FACTUAL DATABASE; HEALTH INSURANCE; HUMAN; LEGAL ASPECT; PRIVACY; REPRODUCIBILITY; STATISTICAL MODEL; UNITED STATES;

EID: 82555187188     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0028071     Document Type: Review
Times cited : (340)

References (76)
  • 1
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-Preserving Data Publishing: A Survey of Recent Developments
    • Fung BCM, Wang K, Chen R, Yu PS, (2010) Privacy-Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys 42.
    • (2010) ACM Computing Surveys , vol.42
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 2
    • 82555203091 scopus 로고    scopus 로고
    • Guide to the Ontario Personal Health Information Protection Act: Irwin Law
    • Perun H, Orr M, Dimitriadis F, (2005) Guide to the Ontario Personal Health Information Protection Act: Irwin Law.
    • (2005)
    • Perun, H.1    Orr, M.2    Dimitriadis, F.3
  • 3
    • 0038324972 scopus 로고    scopus 로고
    • Standards for privacy of individually identifiable health information, final rule, 45 CFR, pt 160-164
    • U.S. Department of Health and Human Services, U.S. Department of Health and Human Services
    • U.S. Department of Health and Human Services (2002) Standards for privacy of individually identifiable health information, final rule, 45 CFR, pt 160-164. U.S. Department of Health and Human Services.
    • (2002)
  • 5
    • 35649022736 scopus 로고    scopus 로고
    • Access to medical records for research purposes: varying perceptions across research ethics boards
    • Willison DJ, Emerson C, Szala-Meneok KV, Gibson E, Schwartz L, et al. (2008) Access to medical records for research purposes: varying perceptions across research ethics boards. J Med Ethics 34: 308-314.
    • (2008) J Med Ethics , vol.34 , pp. 308-314
    • Willison, D.J.1    Emerson, C.2    Szala-Meneok, K.V.3    Gibson, E.4    Schwartz, L.5
  • 6
    • 33646000796 scopus 로고    scopus 로고
    • Genetics. No longer de-identified
    • McGuire AL, Gibbs RA, (2006) Genetics. No longer de-identified. Science 312: 370-371.
    • (2006) Science , vol.312 , pp. 370-371
    • McGuire, A.L.1    Gibbs, R.A.2
  • 7
    • 77957594024 scopus 로고    scopus 로고
    • Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
    • Ohm P, (2010) Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57: 1701-1777.
    • (2010) UCLA Law Review , vol.57 , pp. 1701-1777
    • Ohm, P.1
  • 8
    • 82555184267 scopus 로고    scopus 로고
    • Brief of Amici Curiae: Electronic Privacy Information Center (EPIC) and Legal Scholars and Technical Experts in Support of the Petitioners, William H. Sorrell, Attorney General of Vermont,et al. v. IMS Health Inc., et al
    • Brief of Amici Curiae: Electronic Privacy Information Center (EPIC) and Legal Scholars and Technical Experts in Support of the Petitioners (2011) William H. Sorrell, Attorney General of Vermont,et al. v. IMS Health Inc., et al.
    • (2011)
  • 9
    • 79957471983 scopus 로고    scopus 로고
    • Prescriptions, privacy, and the First Amendment
    • Curfman GD, Morrissey S, Drazen JM, (2011) Prescriptions, privacy, and the First Amendment. N Engl J Med 364: 2053-2055.
    • (2011) N Engl J Med , vol.364 , pp. 2053-2055
    • Curfman, G.D.1    Morrissey, S.2    Drazen, J.M.3
  • 10
    • 82555167182 scopus 로고    scopus 로고
    • The deidentification dilemma: a legislative and contractual proposal
    • Fordham Intellectual Property, Media & Entertainment Law Journal XXI
    • Gellman R, (2011) The deidentification dilemma: a legislative and contractual proposal. Fordham Intellectual Property, Media & Entertainment Law Journal XXI.
    • (2011)
    • Gellman, R.1
  • 11
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of "Personally Identifiable Information"
    • Narayanan A, Shmatikov V, (2010) Myths and fallacies of "Personally Identifiable Information". Commun ACM 53: 24-26.
    • (2010) Commun ACM , vol.53 , pp. 24-26
    • Narayanan, A.1    Shmatikov, V.2
  • 12
    • 77956396767 scopus 로고    scopus 로고
    • Is deidentification sufficient to protect health privacy in research?
    • Rothstein MA, (2010) Is deidentification sufficient to protect health privacy in research? Am J Bioeth 10: 3-11.
    • (2010) Am J Bioeth , vol.10 , pp. 3-11
    • Rothstein, M.A.1
  • 13
    • 82555203087 scopus 로고    scopus 로고
    • Dispelling the myths about de-identfication: anonymization remains a strong tool
    • Office of the Information and Privacy Commissioner of Ontario
    • Cavoukian A, El Emam K, (2011) Dispelling the myths about de-identfication: anonymization remains a strong tool. Office of the Information and Privacy Commissioner of Ontario.
    • (2011)
    • Cavoukian, A.1    El Emam, K.2
  • 14
    • 34548161843 scopus 로고    scopus 로고
    • Canadian Institutes of Health Research, Ottawa, Canadian Institutes of Health Research
    • Canadian Institutes of Health Research (2005) CIHR best practices for protecting privacy in health research Ottawa Canadian Institutes of Health Research.
    • (2005) CIHR Best Practices for Protecting Privacy in Health Research
  • 15
    • 50949103777 scopus 로고    scopus 로고
    • Personal Privacy and Public Health: Potential impacts of privacy legislation on health research in Canada
    • Harris A, Levy AR, Teschke KE, (2008) Personal Privacy and Public Health: Potential impacts of privacy legislation on health research in Canada. Canadian Journal of Public Health July-August 2008: 293-296.
    • (2008) Canadian Journal of Public Health July-August 2008 , pp. 293-296
    • Harris, A.1    Levy, A.R.2    Teschke, K.E.3
  • 16
    • 69549114557 scopus 로고    scopus 로고
    • A globally optimal k-anonymity method for the de-identification of health data
    • El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, et al. (2009) A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc 16: 670-682.
    • (2009) J Am Med Inform Assoc , vol.16 , pp. 670-682
    • El Emam, K.1    Dankar, F.K.2    Issa, R.3    Jonker, E.4    Amyot, D.5
  • 17
    • 66749176708 scopus 로고    scopus 로고
    • Written informed consent and selection bias in observational studies using medical records: systematic review
    • Kho ME, Duffett M, Willison DJ, Cook DJ, Brouwers MC, (2009) Written informed consent and selection bias in observational studies using medical records: systematic review. BMJ 338.
    • (2009) BMJ , vol.338
    • Kho, M.E.1    Duffett, M.2    Willison, D.J.3    Cook, D.J.4    Brouwers, M.C.5
  • 18
    • 82555182825 scopus 로고    scopus 로고
    • Annual report to congress on breaches of unsecured protected health information for calendar years 2009 and 2010
    • Office for Civil Rights, US Department of Health and Human Services
    • Office for Civil Rights (2011) Annual report to congress on breaches of unsecured protected health information for calendar years 2009 and 2010. US Department of Health and Human Services.
    • (2011)
  • 19
    • 33644869675 scopus 로고    scopus 로고
    • Technical difficulties: Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data
    • Becker C, Taylor M, (2006) Technical difficulties: Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data. Modern Healthcare 38: 6-7.
    • (2006) Modern Healthcare , vol.38 , pp. 6-7
    • Becker, C.1    Taylor, M.2
  • 20
    • 33644642795 scopus 로고    scopus 로고
    • Privacy fear factor arises
    • Robeznieks A, (2005) Privacy fear factor arises. Modern Healthcare 35: 6.
    • (2005) Modern Healthcare , vol.35 , pp. 6
    • Robeznieks, A.1
  • 21
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • Sweeney L, (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25: 98-9110.
    • (1997) J Law Med Ethics , vol.25 , pp. 98-9110
    • Sweeney, L.1
  • 24
    • 82555167177 scopus 로고    scopus 로고
    • Advanced Notice of Proposed Rulemaking for Revision to the Common Rule
    • U.S. Department of Health and Human Services, U.S. Department of Health and Human Services
    • U.S. Department of Health and Human Services (2011) Advanced Notice of Proposed Rulemaking for Revision to the Common Rule. U.S. Department of Health and Human Services.
    • (2011)
  • 26
    • 0000290742 scopus 로고
    • Sample size determinations for the two rater kappa statistic
    • Flack V, Afifi A, Lachenbruch P, (1988) Sample size determinations for the two rater kappa statistic. Psychometrika 53: 321-325.
    • (1988) Psychometrika , vol.53 , pp. 321-325
    • Flack, V.1    Afifi, A.2    Lachenbruch, P.3
  • 27
    • 14744284163 scopus 로고    scopus 로고
    • The kappa statistic in reliability studies: use, interpretation, and sample size requirements
    • Sim J, Wright CC, (2005) The kappa statistic in reliability studies: use, interpretation, and sample size requirements. Phys Ther 85: 257-268.
    • (2005) Phys Ther , vol.85 , pp. 257-268
    • Sim, J.1    Wright, C.C.2
  • 28
    • 84885221014 scopus 로고    scopus 로고
    • Revisiting the uniqueness of simple demographics in the US population; 2006
    • Golle P, (2006) pp. 77-80 Revisiting the uniqueness of simple demographics in the US population; 2006.
    • (2006) , pp. 77-80
    • Golle, P.1
  • 29
    • 82555182829 scopus 로고    scopus 로고
    • A study on the re-identifiability of Dutch citizens; Workshop on Privacy Enhancing Technologies (PET 2010)
    • Koot M, Noordende G, de Laat C, (2010) A study on the re-identifiability of Dutch citizens; Workshop on Privacy Enhancing Technologies (PET 2010).
    • (2010)
    • Koot, M.1    Noordende, G.2    de Laat, C.3
  • 30
    • 33749609531 scopus 로고    scopus 로고
    • Betrayed by my shadow: Learning data identity via trail matching
    • Malin B, (2005) Betrayed by my shadow: Learning data identity via trail matching. Journal of Privacy Technology June: 20050609001.
    • (2005) Journal of Privacy Technology June , pp. 20050609001
    • Malin, B.1
  • 31
    • 39049178823 scopus 로고    scopus 로고
    • A secure protocol to distribute unlinkable health data
    • Malin BA, Sweeney L, (2005) A secure protocol to distribute unlinkable health data. AMIA Annu Symp Proc pp. 485-489.
    • (2005) AMIA Annu Symp Proc , pp. 485-489
    • Malin, B.A.1    Sweeney, L.2
  • 32
    • 50849101381 scopus 로고    scopus 로고
    • Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
    • Homer N, Szelinger S, Redman M, Duggan D, Tembe W, et al. (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4.
    • (2008) PLoS Genet , vol.4
    • Homer, N.1    Szelinger, S.2    Redman, M.3    Duggan, D.4    Tembe, W.5
  • 33
    • 70350632730 scopus 로고    scopus 로고
    • A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies
    • Jacobs KB, Yeager M, Wacholder S, Craig D, Kraft P, et al. (2009) A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies. Nat Genet 41: 1253-1257.
    • (2009) Nat Genet , vol.41 , pp. 1253-1257
    • Jacobs, K.B.1    Yeager, M.2    Wacholder, S.3    Craig, D.4    Kraft, P.5
  • 34
    • 3042849144 scopus 로고    scopus 로고
    • Genetics. Genomic research and human subject privacy
    • Lin Z, Owen AB, Altman RB, (2004) Genetics. Genomic research and human subject privacy. Science 305: 183-183.
    • (2004) Science , vol.305 , pp. 183
    • Lin, Z.1    Owen, A.B.2    Altman, R.B.3
  • 35
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • Malin BA, (2005) An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc 12: 28-34.
    • (2005) J Am Med Inform Assoc , vol.12 , pp. 28-34
    • Malin, B.A.1
  • 36
    • 80053335117 scopus 로고    scopus 로고
    • Identifiability in biobanks: models, measures, and mitigation strategies
    • Malin B, Loukides G, Benitez K, Clayton E, (2011) Identifiability in biobanks: models, measures, and mitigation strategies. Human Genetics 130: 383-392.
    • (2011) Human Genetics , vol.130 , pp. 383-392
    • Malin, B.1    Loukides, G.2    Benitez, K.3    Clayton, E.4
  • 37
    • 77953149045 scopus 로고    scopus 로고
    • Evaluating re-identification risks with respect to the HIPAA privacy rule
    • Benitez K, Malin B, (2010) Evaluating re-identification risks with respect to the HIPAA privacy rule. J Am Med Inform Assoc 17: 169-177.
    • (2010) J Am Med Inform Assoc , vol.17 , pp. 169-177
    • Benitez, K.1    Malin, B.2
  • 40
    • 79955640485 scopus 로고    scopus 로고
    • Interim guidance to clinical researchers regarding compliance with the US Health Insurance Portability and Accountability Act (HIPAA)
    • UBC Clinical Research Ethics Board, Providence Health Care Research Ethics Board, University of British Columbia
    • UBC Clinical Research Ethics Board, Providence Health Care Research Ethics Board (2003) Interim guidance to clinical researchers regarding compliance with the US Health Insurance Portability and Accountability Act (HIPAA). University of British Columbia.
    • (2003)
  • 41
    • 76149120487 scopus 로고    scopus 로고
    • Preparing raw clinical data for publications: Guidance for journal editors, authors, and peer reviewers
    • Hryanszkiewicz I, Norton M, Vickers A, Altman D, (2010) Preparing raw clinical data for publications: Guidance for journal editors, authors, and peer reviewers. BMJ 340: c181.
    • (2010) BMJ , vol.340
    • Hryanszkiewicz, I.1    Norton, M.2    Vickers, A.3    Altman, D.4
  • 44
    • 0000674690 scopus 로고    scopus 로고
    • Scenarios of attack: the data intruders perspective on statistical disclosure risk
    • Elliot M, Dale A, (1999) Scenarios of attack: the data intruders perspective on statistical disclosure risk. Netherlands Official Statistics 14: 6-10.
    • (1999) Netherlands Official Statistics , vol.14 , pp. 6-10
    • Elliot, M.1    Dale, A.2
  • 45
    • 82555182826 scopus 로고
    • RMS need to safeguard computerized patient records to protect hospitals
    • Bartlett E, (1993) RMS need to safeguard computerized patient records to protect hospitals. Hospital Risk Management 15.
    • (1993) Hospital Risk Management , vol.15
    • Bartlett, E.1
  • 46
    • 33746341926 scopus 로고
    • The 'file drawer' problem and tolerance for null results
    • Rosenthal R, (1979) The 'file drawer' problem and tolerance for null results. Phsycological Bulletin 86: 638-641.
    • (1979) Phsycological Bulletin , vol.86 , pp. 638-641
    • Rosenthal, R.1
  • 47
    • 0035641470 scopus 로고    scopus 로고
    • Cumulative meta-analysis: A consideration of indicators of sufficiency and stability
    • Mullen B, Muellerleile P, Bryant B, (2001) Cumulative meta-analysis: A consideration of indicators of sufficiency and stability. Personality and Social Psychology Bulletin 27: 1450-1462.
    • (2001) Personality and Social Psychology Bulletin , vol.27 , pp. 1450-1462
    • Mullen, B.1    Muellerleile, P.2    Bryant, B.3
  • 49
    • 0034823867 scopus 로고    scopus 로고
    • Funnel plots for detecting bias in meta-analysis: Guidelines on choice of axis
    • Sterne J, Egger M, (2001) Funnel plots for detecting bias in meta-analysis: Guidelines on choice of axis. Journal of Clinical Epidemiology 54: 1046-1055.
    • (2001) Journal of Clinical Epidemiology , vol.54 , pp. 1046-1055
    • Sterne, J.1    Egger, M.2
  • 50
    • 84872011968 scopus 로고    scopus 로고
    • The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration
    • Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gotzsche PC, et al. (2009) The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 62: 1-34.
    • (2009) J Clin Epidemiol , vol.62 , pp. 1-34
    • Liberati, A.1    Altman, D.G.2    Tetzlaff, J.3    Mulrow, C.4    Gotzsche, P.C.5
  • 51
    • 68049122102 scopus 로고    scopus 로고
    • Preferred reporting items for systematic reviews and meta-analyses: the statement
    • Moher D, Liberati A, Tetzlaff J, Altman DG, (2009) Preferred reporting items for systematic reviews and meta-analyses: the statement. PLoS Med 6: e1000097.
    • (2009) PLoS Med , vol.6
    • Moher, D.1    Liberati, A.2    Tetzlaff, J.3    Altman, D.G.4
  • 53
    • 82555167173 scopus 로고    scopus 로고
    • Mike Gordon v. the Minister of Health and the Privacy Commissioner of Canada: Memorandum of Fact and Law of the Privacy Commissioner of Canada
    • Federal Court: Canada
    • Federal Court: Canada (2007) Mike Gordon v. the Minister of Health and the Privacy Commissioner of Canada: Memorandum of Fact and Law of the Privacy Commissioner of Canada. Federal Court.
    • (2007) Federal Court
  • 54
    • 82555182824 scopus 로고    scopus 로고
    • AOL Removes Search Data on Group of Web Users New York Times
    • Hansell S, (2006) AOL Removes Search Data on Group of Web Users New York Times.
    • (2006)
    • Hansell, S.1
  • 55
    • 79955596688 scopus 로고    scopus 로고
    • AOL Moves to Increase Privacy on Search Queries
    • New York Times
    • Zeller T Jr, (2006) AOL Moves to Increase Privacy on Search Queries. New York Times.
    • (2006)
    • Zeller Jr., T.1
  • 58
    • 80052967781 scopus 로고    scopus 로고
    • The Safe Harbor method of de-identification: An empirical test
    • Fourth National HIPAA Summit West
    • Lafky D, (2010) The Safe Harbor method of de-identification: An empirical test. Fourth National HIPAA Summit West.
    • (2010)
    • Lafky, D.1
  • 64
    • 21344489286 scopus 로고
    • Safe data versus safe settings: Access to microdata from the British census
    • Marsh C, Dale A, Skinner C, (1994) Safe data versus safe settings: Access to microdata from the British census. International Statistical Review 62: 35-53.
    • (1994) International Statistical Review , vol.62 , pp. 35-53
    • Marsh, C.1    Dale, A.2    Skinner, C.3
  • 68
    • 0033198316 scopus 로고    scopus 로고
    • Random-effects meta-analyses are not always conservative
    • Poole C, Greenland S, (1999) Random-effects meta-analyses are not always conservative. American Journal of Epidemiology pp. 469-475.
    • (1999) American Journal of Epidemiology , pp. 469-475
    • Poole, C.1    Greenland, S.2
  • 69
    • 79955608859 scopus 로고    scopus 로고
    • Methods for the de-identification of electronic health records
    • El Emam K, (2010) Methods for the de-identification of electronic health records. Genome Medicine 3: 25.
    • (2010) Genome Medicine , vol.3 , pp. 25
    • El Emam, K.1
  • 72
    • 33750089757 scopus 로고    scopus 로고
    • No place to hide-reverse identification of patients from published maps
    • Brownstein JS, Cassa CA, Mandl KD, (2006) No place to hide-reverse identification of patients from published maps. N Engl J Med 355: 1741-1742.
    • (2006) N Engl J Med , vol.355 , pp. 1741-1742
    • Brownstein, J.S.1    Cassa, C.A.2    Mandl, K.D.3
  • 75
    • 65249152887 scopus 로고    scopus 로고
    • Privacy Interests in Prescription Data, Part 2: Patient Privacy
    • El Emam K, Kosseim P, (2009) Privacy Interests in Prescription Data, Part 2: Patient Privacy. Security & Privacy, IEEE 7: 75-78.
    • (2009) Security & Privacy, IEEE , vol.7 , pp. 75-78
    • El Emam, K.1    Kosseim, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.