-
2
-
-
84887018723
-
-
Canadian Newspaper Association [Online]. Available
-
Canadian Newspaper Association, National Freedom of Information Audit 2007 [Online]. Available: http://www.newspaperscanada.ca/public-affairs/freedom- information
-
(2007)
National Freedom of Information Audit
-
-
-
3
-
-
82555187188
-
A systematic review of re-identification attacks on health data
-
10.1371/journal.pone.0028071 22164229
-
A systematic review of re-identification attacks on health data. El Emam K, Jonker E, Arbuckle L, Malin B, PLoS ONE 2011 6 12 28071 10.1371/journal.pone. 0028071 22164229
-
(2011)
PLoS ONE
, vol.6
, Issue.12
, pp. 528071
-
-
El Emam, K.1
Jonker, E.2
Arbuckle, L.3
Malin, B.4
-
4
-
-
84887017062
-
-
[Online]. Available:
-
Health Canada, Canada Vigilance Program 2009 [Online]. Available: http://hc-sc.gc.ca/dhp-mps/medeff/vigilance-eng.php
-
(2009)
Canada Vigilance Program
-
-
Canada, H.1
-
7
-
-
77950267684
-
-
FDA Washington [Online]. Available:
-
FDA, Adverse Event Reporting System (AERS) Washington 2009 [Online]. Available: http://www.fda.gov/Drugs/GuidanceComplianceRegulatoryInformation/ Surveillance/AdverseDrugEffects/default.htm
-
(2009)
Adverse Event Reporting System (AERS)
-
-
-
8
-
-
67049119563
-
Systematic investigation of time windows for adverse event data mining for recently approved drugs
-
10.1177/0091270009333484 19451402
-
Systematic investigation of time windows for adverse event data mining for recently approved drugs. Hochberg AM, Hauben M, Pearson RK, O'Hara D, Reisinger SJ, J Clin Pharmacol 2009 49 626 633 10.1177/0091270009333484 19451402
-
(2009)
J Clin Pharmacol
, vol.49
, pp. 626-633
-
-
Hochberg, A.M.1
Hauben, M.2
Pearson, R.K.3
O'Hara, D.4
Reisinger, S.J.5
-
9
-
-
35148890461
-
Using data mining to predict safety actions from FDA adverse event reporting system data
-
Using data mining to predict safety actions form FDA adverse event reporting system data. Hochberg AM, Reisinger SJ, Ronald DJO, Pearson K, Hall K, Drug Inf J 2007 41 5 633 643 (Pubitemid 47546045)
-
(2007)
Drug Information Journal
, vol.41
, Issue.5
, pp. 633-643
-
-
Hochberg, A.M.1
Reisinger, S.J.2
Pearson, R.K.3
O'Hara, D.J.4
Hall, K.5
-
11
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
Protecting respondents' identities in microdata release. Samarati P, IEEE Trans Knowl Data Eng 2001 13 6 1010 1027 10.1109/69.971193 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
12
-
-
84995047878
-
On identification disclosure and prediction disclosure for microdata
-
10.1111/j.1467-9574.1992.tb01324.x
-
On identification disclosure and prediction disclosure for microdata. Skinner CJ, Statistica Neerlandica 1992 46 1 21 32 10.1111/j.1467-9574.1992. tb01324.x
-
(1992)
Statistica Neerlandica
, vol.46
, Issue.1
, pp. 21-32
-
-
Skinner, C.J.1
-
13
-
-
69549110786
-
-
Washington: Office of Management and Budget
-
Subcommittee on Disclosure Limitation Methodology-Federal Committee on Statistical Methodology, Working paper 22: report on statistical disclosure control Washington: Office of Management and Budget 1994
-
(1994)
Working Paper 22: Report on Statistical Disclosure Control
-
-
-
14
-
-
34248175725
-
ACM Transactions on Knowledge Discovery from Data: Introduction
-
DOI 10.1145/1217299.1217300
-
l-diversity: privacy beyond k-anonymity. Machanavajjhala A, Gehrke J, Kifer D, Trans Knowl Discov Data 2007 1 1 1 47 10.1145/1217299.1217300 (Pubitemid 46712368)
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
, pp. 1217300
-
-
Han, J.1
-
15
-
-
33846936304
-
Evaluating common de-identification heuristics for personal health information
-
DOI 10.2196/jmir.8.4.e28
-
Evaluating common de-identification heuristics for personal health information. El Emam K, Jabbouri S, Sams S, Drouet Y, Power M, J Med Internet Res 2006 8 4 28 10.2196/jmir.8.4.e28 17213047 (Pubitemid 47450199)
-
(2006)
Journal of Medical Internet Research
, vol.8
, Issue.4
-
-
El Emam, K.1
Jabbouri, S.2
Sams, S.3
Drouet, Y.4
Power, M.5
-
16
-
-
77951623059
-
-
[Online]. Available:
-
El Emam K, Jonker E, Sams S, Neri E, Neisa A, Gao T, Chowdhury S, Pan-Canadian De-Identification Guidelines for Personal Health Information 2007 [Online]. Available: http://www.ehealthinformation.ca/documents/OPCReportv11.pdf
-
(2007)
Pan-Canadian De-Identification Guidelines for Personal Health Information
-
-
El Emam, K.1
Jonker, E.2
Sams, S.3
Neri, E.4
Neisa, A.5
Gao, T.6
Chowdhury, S.7
-
17
-
-
34748885498
-
-
Washington: Proceedings of the American Medical Informatics Association Annual Symposium
-
Malin B, Re-identification of familial database records Washington: Proceedings of the American Medical Informatics Association Annual Symposium 2006 524 528
-
(2006)
Re-identification of Familial Database Records
, pp. 524-528
-
-
Malin, B.1
-
18
-
-
84863508974
-
Estimating the re-identification risk of clinical data sets
-
10.1186/1472-6947-12-66 22776564
-
Estimating the re-identification risk of clinical data sets. Dankar F, El Emam K, Neisa A, Roffey T, BMC Med Inform Decis Mak 2012 12 66 10.1186/1472-6947-12-66 22776564
-
(2012)
BMC Med Inform Decis Mak
, vol.12
, pp. 66
-
-
Dankar, F.1
El Emam, K.2
Neisa, A.3
Roffey, T.4
-
19
-
-
69549120726
-
-
Winnipeg
-
Manitoba Center for Health Policy, Privacy code Winnipeg 2002
-
(2002)
Privacy Code
-
-
-
20
-
-
69549110786
-
-
Washington: Federal Committee on Statistical Methodology
-
Subcommittee on Disclosure Limitation Methodology, Working paper 22: Report on statistical disclosure control Washington: Federal Committee on Statistical Methodology 1994
-
(1994)
Working Paper 22: Report on Statistical Disclosure Control
-
-
-
21
-
-
70349146001
-
-
[Online]. Available:
-
Statistics Canada, Therapeutic abortion survey 2007 [Online]. Available: http://www.statcan.ca/cgi-bin/imdb/p2SV.pl?Function=getSurvey&SDDS= 3209&lang=en&db=IMDB&dbg=f&adm=8&dis=2#b9
-
(2007)
Therapeutic Abortion Survey
-
-
Canada, S.1
-
22
-
-
84887025198
-
-
Victoria: Office of the Information and Privacy Commissioner of British Columbia
-
Flaherty DH, Order No. 261-1998 Victoria: Office of the Information and Privacy Commissioner of British Columbia 1998
-
(1998)
Order No. 261-1998
-
-
Flaherty, D.H.1
-
23
-
-
84887015592
-
-
Victoria: Office of the Information and Privacy Commissioner of Ontario [Online]. Available
-
Fineburg A, Order P-644 Victoria: Office of the Information and Privacy Commissioner of Ontario 1994 [Online]. Available: http://www.ipc.on.ca/images/ Findings/Attached-PDF/P-644.pdf
-
(1994)
Order P-644
-
-
Fineburg, A.1
-
24
-
-
0018160897
-
Access to social security microdata files for research and statistical purposes
-
Access to social security microdata files for research and statistical purposes. Alexander L, Jabine T, Soc Secur Bull 1978 41 8 3 17 (Pubitemid 9024515)
-
(1978)
Social Security Bulletin
, vol.41
, Issue.8
, pp. 3-17
-
-
Alexander, L.A.1
Jabine, T.B.2
-
25
-
-
79955616123
-
-
Ministry of Health and Long Term care (Ontario) Toronto: Ontario Ministry of Health and Long Term care
-
Ministry of Health and Long Term care (Ontario), Corporate Policy 3-1-21 Toronto: Ontario Ministry of Health and Long Term care 1984
-
(1984)
Corporate Policy 3-1-21
-
-
-
26
-
-
33847342133
-
Method to assess identifiability in electronic data files
-
DOI 10.1093/aje/kwk049
-
Method to assess identifiability in electronic data files. Howe H, Lake A, Shen T, Am J Epidemiol 2007 165 5 597 601 17182982 (Pubitemid 46340557)
-
(2007)
American Journal of Epidemiology
, vol.165
, Issue.5
, pp. 597-601
-
-
Howe, H.L.1
Lake, A.J.2
Shen, T.3
-
27
-
-
77955837213
-
-
Springfield: NAACCR CINA Deluxe Advisory Group Report, North American Association of Central Cancer Registries
-
Howe H, Lake A, Lehnherr M, Roney D, Unique record identification on public use files as tested on the 1994-1998 CINA analytic file Springfield: NAACCR CINA Deluxe Advisory Group Report, North American Association of Central Cancer Registries 2002
-
(2002)
Unique Record Identification on Public Use Files As Tested on the 1994-1998 CINA Analytic File
-
-
Howe, H.1
Lake, A.2
Lehnherr, M.3
Roney, D.4
-
28
-
-
49249087521
-
Heuristics for de-identifying health data
-
Heuristics for de-identifying health data. El Emam K, IEEE Secur Privacy 2008 6 4 72 75
-
(2008)
IEEE Secur Privacy
, vol.6
, Issue.4
, pp. 72-75
-
-
El Emam, K.1
-
29
-
-
79960907469
-
K-Anonymity
-
New York: Springer Yu T, Jajodia S
-
k-Anonymity. Ciriani V, De Capitani di Vimercati S, Foresti S, Samarati P, Secure Data Management in Decentralized Systems New York: Springer, Yu T, Jajodia S, 2007 462
-
(2007)
Secure Data Management in Decentralized Systems
, pp. 462
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
30
-
-
84887026086
-
-
[Online]. Available
-
Online Obituaries 2009 [Online]. Available: http://www3.sympatico.ca/ jacquest/online.htm
-
(2009)
Online Obituaries
-
-
-
31
-
-
84887023233
-
-
[Online]. Available:
-
remembering.ca 2009 [Online]. Available: http://classifieds.canada.com/ remembering/index.html
-
(2009)
Remembering.Ca
-
-
-
32
-
-
84887021967
-
-
[Online]. Available: http://www.ospreyobituaries.com/sitepages/?sr=1
-
Your Life Moments 2009 [Online]. Available: http://www.ospreyobituaries. com/sitepages/?sr=1
-
(2009)
Your Life Moments
-
-
-
33
-
-
49249103738
-
Protecting privacy using k-anonymity
-
10.1197/jamia.M2716 18579830
-
Protecting privacy using k-anonymity. El Emam K, Dankar F, J Am Med Inform Assoc 2008 15 627 637 10.1197/jamia.M2716 18579830
-
(2008)
J Am Med Inform Assoc
, vol.15
, pp. 627-637
-
-
El Emam, K.1
Dankar, F.2
-
41
-
-
84887016295
-
Electronic Health Information and Privacy Conference, 3 November
-
Ottawa
-
Pendleton J, The growing threat of medical identity theft in Canada Ottawa Electronic Health Information and Privacy Conference, 3 November. 2008 2 35 [ http://www.ehealthinformation.ca/documents/EHIP2008.pdf ]
-
(2008)
The Growing Threat of Medical Identity Theft in Canada
, pp. 2-35
-
-
Pendleton, J.1
-
43
-
-
19144373610
-
For sale: Your secret medical record for 150
-
For sale: your secret medical record for 150. Rogers L, Leppard D, Sunday Times 1995 1 2
-
(1995)
Sunday Times
, pp. 1-2
-
-
Rogers, L.1
Leppard, D.2
-
45
-
-
77955809691
-
Hackers Break into Virginia Health Professions Database
-
Demand Ransom [Online] Available:
-
Krebs B, Hackers Break Into Virginia Health Professions Database, Demand Ransom Washington Post. 2009 [Online] Available: http://voices.washingtonpost. com/securityfix/2009/05/hackers-break-into-virginia-he.html.
-
(2009)
Washington Post
-
-
Krebs, B.1
-
46
-
-
84887020484
-
-
[Online]. Available:
-
Statistics Canada, Deaths, by month, Canada, provinces and territories 2008 [Online]. Available: http://cansim2.statcan.gc.ca/cgi-win/cnsmcgi.pgm?Lang= E&RegTkt=&C2Sub=&Array-Pick=1&RootDir=CII/&Vec= &ResultTemplate=CII/CII-Pick&ArrayId=1020502&C2DB=PRD
-
(2008)
Deaths, by Month, Canada, Provinces and Territories
-
-
Canada, S.1
-
49
-
-
35048852762
-
A view on statistical disclosure control for microdata
-
A view on statistical disclosure control for microdata. de Waal A, Willenborg L, Survey Methodol 1996 22 1 95 103
-
(1996)
Survey Methodol
, vol.22
, Issue.1
, pp. 95-103
-
-
De Waal, A.1
Willenborg, L.2
-
55
-
-
52649134322
-
-
Washington, DC, USA: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
-
Tao Y, Xiao X, Li J, Zhang D, On Anti-Corruption Privacy Preserving Publication Washington, DC, USA: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering 2008 725 734
-
(2008)
On Anti-Corruption Privacy Preserving Publication
, pp. 725-734
-
-
Tao, Y.1
Xiao, X.2
Li, J.3
Zhang, D.4
-
56
-
-
55149114917
-
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
-
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge. Lakshmanan LVS, Ng RT, Ramesh G, ACM Trans Knowl Discov Data 2008 2 3 1 13
-
(2008)
ACM Trans Knowl Discov Data
, vol.2
, Issue.3
, pp. 1-13
-
-
Lakshmanan, L.V.S.1
Ng, R.T.2
Ramesh, G.3
-
57
-
-
29844443183
-
-
New York, NY, USA: Proceedings of the 2005 ACM SIGMOD international conference on Management of data
-
Lakshmanan LVS, Ng RT, Ramesh G, To do or not to do: the dilemma of disclosing anonymized data New York, NY, USA: Proceedings of the 2005 ACM SIGMOD international conference on Management of data 2005 61 72
-
(2005)
To Do or Not to Do: The Dilemma of Disclosing Anonymized Data
, pp. 61-72
-
-
Lakshmanan, L.V.S.1
Ng, R.T.2
Ramesh, G.3
-
58
-
-
69549114557
-
A globally optimal k-anonymity method for the De-identification of health data
-
10.1197/jamia.M3144 19567795
-
A globally optimal k-anonymity method for the De-identification of health data. El Emam K, Dankar F, Issa R, Jonker E, Amyot D, Cogo E, Corriveau JP, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J, J Am Med Inform Assoc 2009 16 5 670 682 10.1197/jamia.M3144 19567795
-
(2009)
J Am Med Inform Assoc
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
Corriveau, J.P.7
Walker, M.8
Chowdhury, S.9
Vaillancourt, R.10
Roffey, T.11
Bottomley, J.12
-
59
-
-
33751359260
-
Achieving k-anonymity by clustering in attribute hierarchical structures
-
Data Warehousing and Knowledge Discovery - 8th International Conference, DaWaK 2006, Proceedings LNCS
-
Achieving k-anonymity by clustering in attribute hierarchical structures. Li J, Wong RC, DaWaK, volume 4081 of Lecture Notes in Computer Science Berlin: Springer 2006 405 416 (Pubitemid 44811914)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4081
, pp. 405-416
-
-
Jiuyong, L.1
Wong, R.C.-W.2
Fu, A.W.-C.3
Jian, P.4
-
60
-
-
50649094225
-
Anonymization by local recoding in data with attribute hierarchical taxonomies
-
Anonymization by local recoding in data with attribute hierarchical taxonomies. Li J, Wong RCW, Fu AWC, Pei J, IEEE Trans Knowl Data Eng 2008 20 9 1181 1194
-
(2008)
IEEE Trans Knowl Data Eng
, vol.20
, Issue.9
, pp. 1181-1194
-
-
Li, J.1
Wong, R.C.W.2
Fu, A.W.C.3
Pei, J.4
-
62
-
-
70450093345
-
-
Nanchang, China: IEEE International Conference on Granular Computing, 2009
-
Juan Y, Jianmin H, Jianmin C, Zanzhu X, TopDown-KACA: An efficient local-recoding algorithm for k-anonymity Nanchang, China: IEEE International Conference on Granular Computing, 2009 2009 727 732
-
(2009)
TopDown-KACA: An Efficient Local-recoding Algorithm for K-anonymity
, pp. 727-732
-
-
Juan, Y.1
Jianmin, H.2
Jianmin, C.3
Zanzhu, X.4
-
63
-
-
33749582207
-
-
New York: NY, USA
-
Xu J, Wang W, Pei J, Wang X, Shi B, Fu AWC, "Utility-based anonymization using local recoding", in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining New York: NY, USA 2006 785 790
-
(2006)
Utility-based Anonymization Using Local Recoding", in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.C.6
-
65
-
-
68849085448
-
The New sentinel network - Improving the evidence of medical-product safety
-
10.1056/NEJMp0905338 19635947
-
The New sentinel network-improving the evidence of medical-product safety. Platt R, Wilson M, Chan A, Benner JS, Marchibroda J, McClellan M, NEJM 2009 361 7 645 647 10.1056/NEJMp0905338 19635947
-
(2009)
NEJM
, vol.361
, Issue.7
, pp. 645-647
-
-
Platt, R.1
Wilson, M.2
Chan, A.3
Benner, J.S.4
Marchibroda, J.5
McClellan, M.6
|