A systematic review of re-identification attacks on health data
about
Improving the informed consent process in international collaborative rare disease research: effective consent for effective research.Protecting the privacy of individual general practice patient electronic records for geospatial epidemiology researchDon't take your EHR to heaven, donate it to science: legal and research policies for EHR post mortemThe risk of re-identification versus the need to identify individuals in rare disease researchOptimizing annotation resources for natural language de-identification via a game theoretic frameworkAnonymising and sharing individual patient dataPrivacy and security in the era of digital health: what should translational researchers know and do about it?The project data sphere initiative: accelerating cancer research by sharing dataCorrection: a systematic review of re-identification attacks on health dataA game theoretic framework for analyzing re-identification riskSecondary use of clinical data: the Vanderbilt approachDevelopment and evaluation of a de-identification procedure for a case register sourced from mental health electronic recordsSHARE: system design and case studies for statistical health information releaseAre personal health records safe? A review of free web-accessible personal health record privacy policiesDe-identification methods for open health data: the case of the Heritage Health Prize claims datasetHealth data use, stewardship, and governance: ongoing gaps and challenges: a report from AMIA's 2012 Health Policy Meeting.Ethics, privacy and the legal framework governing medical data: opportunities or threats for biomedical and public health research?Comparative effectiveness research and big data: balancing potential with legal and ethical considerations.The custodian administered research extract server: "improving the pipeline" in linked data delivery systems.Big and disparate data: considerations for pediatric consortia.Evaluating the risk of patient re-identification from adverse drug event reports.Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data.Preparing a collection of radiology examinations for distribution and retrieval.The Promise and Perils of Open Medical Data.Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study.Data philanthropy and the design of the infraethics for information societies.Anonymisation of geographical distance matrices via Lipschitz embeddingParticipant views on consent in cancer genetics research: preparing for the precision medicine era.A multi-institution evaluation of clinical profile anonymizationPolicy recommendations for addressing privacy challenges associated with cell-based research and interventions.A review of evidence on consent bias in research.A Pragmatic Approach for Reproducible Research With Sensitive Data.Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.Questioning the limits of genomic privacy.Data re-identification: societal safeguards.Biomedical data privacy: problems, perspectives, and recent advances.Assessing privacy risks in population health publications using a checklist-based approach.A comparison of weather variables linked to infectious disease patterns using laboratory addresses and patient residence addresses.Privacy-Preserving Predictive Modeling: Harmonization of Contextual Embeddings From Different Sources.Real-time Protection of Genomic Data Sharing in Beacon Services.
P2860
Q27324539-E4986A04-8BE3-4A0F-9A67-DA31538A2919Q28249605-DCED83B7-18B9-4CA5-9698-E5BB838CA321Q28297075-5694AF4F-4178-41EC-B6DA-B1C4CAB8B50DQ28595728-1C57F4BE-4400-48E8-BA2E-58BFA1548E75Q28597276-4F250ED3-73F0-4CA3-800B-F9107EF1599BQ28602819-58D78696-770B-4D85-B57E-9DA2E11DA904Q28603125-B7F435B9-D982-4760-B21B-D256F26936C2Q28647805-3AA88DA3-EB6F-4035-9B5F-029979DEE332Q28649580-89F0B473-014C-4586-8A61-D0527E8D1951Q28651595-18607091-C0FC-4C2F-93FF-E1CB3EA1700AQ28654532-C5B8069A-D106-406A-82DD-35FA4743A64BQ28681582-1A22EAC2-B423-41BC-9BCA-2451901A6D09Q28709501-6CEC1EE4-2B1F-458D-AD03-8F3E80A7821BQ28710466-DD08D1BD-C2D9-4F57-B4BC-610977D1B43CQ28728541-B500D25D-28A0-436F-9DB7-7DD94192EC05Q30407747-ED59DAAA-7D71-4B4B-86FA-E909CBDC1F59Q30651567-56840AAE-B669-417C-8ED0-01EDBDB13237Q30883073-A70CDE98-3058-4782-9E41-1EFF3DC59B3BQ30919848-99DECB90-A210-43AA-AD02-B6CA2E86CB74Q31157745-EC97B09B-A196-452E-ADE8-0A9845C8FCBDQ34064349-482BFD5D-087F-4B8C-A3A9-5706DFFE13B1Q34317668-7613B0D8-43EE-45D1-A936-B71795A1E50EQ35680549-08E10710-686D-4073-97BA-7693E0A8F61FQ35898229-6112976C-EBFB-4CE4-9708-37243A2A4F7AQ36107943-25AE64F5-9EBC-43FF-AB54-1B5349FCD057Q36321276-9FD84BBB-E41D-4108-8D95-75E0F6EDA35EQ36439569-B66D38A1-2CAC-4297-8224-BF71763FBA15Q36698437-88EA6798-7086-4854-B435-8704FB9CB903Q37112129-967B6FAD-BE8F-47B4-8A15-07C4FB062F60Q37557772-53BC9B4E-70EB-4A41-B237-A0DE4928F300Q38091525-8BD1B58A-537C-4891-8094-D425B64C69A1Q38614013-21CFA76B-9C77-428D-8A4E-DF89CAF355D0Q38878904-6D718A0C-0F74-4289-A44F-C8CBF8D8B5B2Q42379128-27531277-13C3-44EE-A4F1-CC4552E0E0EFQ42550092-4E236CC6-602B-4914-B998-8DAE1961115FQ42988567-B7C0F6E4-5AA2-4D06-B20A-D4171E4D4AC6Q47599464-015A6A6D-E622-45EA-AFAF-97BD4815F162Q55079188-CD6328AC-51D9-4749-A40B-F3A29B8E6EC7Q55097403-BCB5AF5F-3A7F-438F-8668-C97313CB6F71Q55216276-2656E519-094C-42F1-B371-303070E145B8
P2860
A systematic review of re-identification attacks on health data
description
2011 nî lūn-bûn
@nan
2011 թուականին հրատարակուած գիտական յօդուած
@hyw
2011 թվականին հրատարակված գիտական հոդված
@hy
2011年の論文
@ja
2011年論文
@yue
2011年論文
@zh-hant
2011年論文
@zh-hk
2011年論文
@zh-mo
2011年論文
@zh-tw
2011年论文
@wuu
name
A systematic review of re-identification attacks on health data
@ast
A systematic review of re-identification attacks on health data
@en
A systematic review of re-identification attacks on health data
@nl
type
label
A systematic review of re-identification attacks on health data
@ast
A systematic review of re-identification attacks on health data
@en
A systematic review of re-identification attacks on health data
@nl
prefLabel
A systematic review of re-identification attacks on health data
@ast
A systematic review of re-identification attacks on health data
@en
A systematic review of re-identification attacks on health data
@nl
P2093
P2860
P31
P3181
P1433
P1476
A systematic review of re-identification attacks on health data
@en
P2093
Elizabeth Jonker
Khaled El Emam
Luk Arbuckle
P2860
P304
P3181
P356
10.1371/JOURNAL.PONE.0028071
P407
P577
2011-01-01T00:00:00Z