{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:41:51Z","timestamp":1726497711430},"reference-count":85,"publisher":"Oxford University Press (OUP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9,1]]},"DOI":"10.1197\/jamia.m3144","type":"journal-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T02:48:34Z","timestamp":1246416514000},"page":"670-682","source":"Crossref","is-referenced-by-count":155,"title":["A Globally Optimal k-Anonymity Method for the De-Identification of Health Data"],"prefix":"10.1093","volume":"16","author":[{"given":"Khaled","family":"El Emam","sequence":"first","affiliation":[]},{"given":"Fida Kamal","family":"Dankar","sequence":"additional","affiliation":[]},{"given":"Romeo","family":"Issa","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Amyot","sequence":"additional","affiliation":[]},{"given":"Elise","family":"Cogo","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Corriveau","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Walker","sequence":"additional","affiliation":[]},{"given":"Sadrul","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Regis","family":"Vaillancourt","sequence":"additional","affiliation":[]},{"given":"Tyson","family":"Roffey","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Bottomley","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2009,9,1]]},"reference":[{"issue":"18","key":"key\n\t\t\t\t20171113095722_b1","doi-asserted-by":"crossref","first-page":"2164","DOI":"10.1001\/jama.298.18.2164","article-title":"Influence of the HIPAA privacy rule on health research.","volume":"298","year":"2007","journal-title":"J Am Med Assoc"},{"key":"key\n\t\t\t\t20171113095722_b2","article-title":"Health research and the privacy of health information\u2014The HIPAA privacy rule","author":"Institute of Medicine","year":"2008"},{"key":"key\n\t\t\t\t20171113095722_b3","volume-title":"Effect of the HIPAA privacy rule on health research: Proceedings of a workshop presented to the National Cancer Policy Forum","author":"Institute of Medicine","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b4","volume-title":"HIPAA creating barriers to research and discovery","author":"Association of Academic Health Centers","year":"2008"},{"issue":"4","key":"key\n\t\t\t\t20171113095722_b5","doi-asserted-by":"crossref","first-page":"313","DOI":"10.7326\/0003-4819-145-4-200608150-00019","article-title":"Health insurance portability and accountability Act privacy rule causes ongoing concerns among clinicians and researchers.","volume":"145","year":"2006","journal-title":"Ann Intern Med"},{"key":"key\n\t\t\t\t20171113095722_b6","volume-title":"Impact of the HIPAA Privacy Rule on Health Services Research, Abt Associates, Inc for the Agency for Healthcare Research and Quality","year":"2005"},{"issue":"1","key":"key\n\t\t\t\t20171113095722_b7","first-page":"4","article-title":"The privacy rule and research: Protecting privacy at what cost?","volume":"8","year":"2007","journal-title":"Res Pract"},{"key":"key\n\t\t\t\t20171113095722_b8","article-title":"Testimony on behalf of the Association of American Medical Colleges before the National Committee on Vital and Health Statistics Subcommittee on Privacy","author":"Association of American Medical Colleges","year":"2003"},{"issue":"3","key":"key\n\t\t\t\t20171113095722_b9","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.ajo.2005.09.022","article-title":"HIPAA and research: How have the first two years gone?","volume":"141","year":"2006","journal-title":"Am J Opthalmol"},{"key":"key\n\t\t\t\t20171113095722_b10","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1146\/annurev.med.57.121304.131257","article-title":"The health insurance portability and accountability Act of 1996 (HIPAA) privacy rule: Implications for clinical research.","volume":"57","year":"2006","journal-title":"Am Med Rev"},{"issue":"6","key":"key\n\t\t\t\t20171113095722_b11","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1097\/01.ede.0000092151.80136.ce","article-title":"HIPAA: The end of epidemiology, or a new social contract?","volume":"14","year":"2003","journal-title":"Epidemiology"},{"issue":"2","key":"key\n\t\t\t\t20171113095722_b12","first-page":"139","article-title":"HIPAA\u2014Implications for research.","volume":"24","year":"2005","journal-title":"Orthop Nurs"},{"issue":"3","key":"key\n\t\t\t\t20171113095722_b13","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1056\/NEJM200201173460312","article-title":"The effect of the new federal medical privacy rule on research.","volume":"346","year":"2002","journal-title":"N Engl J Med"},{"issue":"6","key":"key\n\t\t\t\t20171113095722_b14","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1097\/01.sla.0000128307.98274.dc","article-title":"Health insurance portability and accountability Act (HIPAA) regulations: Effect on medical record research.","volume":"239","year":"2004","journal-title":"Ann Surg"},{"key":"key\n\t\t\t\t20171113095722_b15","article-title":"National Cancer Advisory Board.","volume-title":"The HIPAA Privacy Rule: Feedback from NCI Cancer Centers, Cooperative Groups and Specialized Programs of Research Excellence","author":"National Cancer Institute","year":"2003"},{"issue":"9","key":"key\n\t\t\t\t20171113095722_b16","doi-asserted-by":"crossref","first-page":"685","DOI":"10.7326\/0003-4819-144-9-200605020-00012","article-title":"Informed consent for research and authorization under the Health Insurance Portability and Accountability Act Privacy Rule: An integrated approach.","volume":"144","year":"2006","journal-title":"Ann Intern Med"},{"key":"key\n\t\t\t\t20171113095722_b17","volume-title":"Personal data for public good: using health information in medical research","author":"The Academy of Medical Sciences","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b18","article-title":"The HIPAA Privacy Rule: Lacks Patient Benefit, Impedes Patient Growth","year":"2009"},{"key":"key\n\t\t\t\t20171113095722_b19","first-page":"293","article-title":"Personal privacy and public health: Potential impacts of privacy legislation on health research in Canada.","year":"2008"},{"key":"key\n\t\t\t\t20171113095722_b20","first-page":"2","article-title":"Policy by procrastination: Secondary use of electronic health records for health research purposes.","year":"2008","journal-title":"McGil. J Law Health"},{"issue":"S1","key":"key\n\t\t\t\t20171113095722_b21","first-page":"2","article-title":"Learning from experience: Privacy and the secondary use of data in health research.","volume":"8","year":"2003","journal-title":"J Health Serv Res Policy"},{"key":"key\n\t\t\t\t20171113095722_b22","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1136\/jme.2006.020032","article-title":"Access to medical records for research purposes: Varying perceptions across Research Ethics Boards.","volume":"34","year":"2008","journal-title":"J Med Ethics"},{"key":"key\n\t\t\t\t20171113095722_b23","article-title":"Protecting Privacy When Disclosing Information: k-anonymity and its enforcement through generalisation and suppression","year":"1998","journal-title":"SRI International"},{"issue":"6","key":"key\n\t\t\t\t20171113095722_b24","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents' identities in microdata release.","volume":"13","year":"2001","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"key\n\t\t\t\t20171113095722_b25","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression.","volume":"10","year":"2002","journal-title":"Int J Uncertainty, Fuzziness and Knowl-Based Syst"},{"key":"key\n\t\t\t\t20171113095722_b26","article-title":"De Capitani di Vimercati SSF, Samarati P. k-anonymity.","volume-title":"Secure Data Management in Decentralized Systems,","year":"2007"},{"key":"key\n\t\t\t\t20171113095722_b27","article-title":"Data privacy through optimal k-anonymization. Proceedings of the 21st International Conference on Data Engineering","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b28","volume-title":"Transforming data to satisfy privacy constraints. Proceedings of the ACM SIGKDD International Conference on Data Mining and Knowledge Discovery","year":"2002"},{"key":"key\n\t\t\t\t20171113095722_b29","volume-title":"On Multidimensional k-Anonymity with Local Recoding Generalization, IEEE, 23rd International Conference on Data Engineering","year":"2007"},{"key":"key\n\t\t\t\t20171113095722_b30","volume-title":"Utility-based anonymization using local recoding. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b31","volume-title":"(Alpa, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b32","article-title":"Approximation algorithms for k-anonymity.","volume-title":"Journal of Privacy Technology","year":"2005"},{"issue":"3","key":"key\n\t\t\t\t20171113095722_b33","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records.","volume":"2","year":"1986","journal-title":"J Off Stat"},{"issue":"2","key":"key\n\t\t\t\t20171113095722_b34","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1197\/jamia.M2902","article-title":"Evaluating predictors of geographic area population size cutoffs to manage re-identification risk.","volume":"16","year":"2009","journal-title":"J Am Med Inform Assoc"},{"issue":"4","key":"key\n\t\t\t\t20171113095722_b35","doi-asserted-by":"crossref","first-page":"e28","DOI":"10.2196\/jmir.8.4.e28","article-title":"Evaluating common de-identification heuristics for personal health information.","volume":"8","year":"2006","journal-title":"J Med Internet Res"},{"key":"key\n\t\t\t\t20171113095722_b36","article-title":"Pan-Canadian de-identification guidelines for Personal health information (report prepared for the office of the privacy commissioner of Canada)","year":"2007"},{"key":"key\n\t\t\t\t20171113095722_b37","volume-title":"CIHR Best Practices for Protecting Privacy in Health Research","author":"Canadian Institutes of Health Research","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b38","article-title":"ISO\/TS 25,237. Health Informatics: Pseudonymization","year":"2008"},{"key":"key\n\t\t\t\t20171113095722_b39","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1197\/jamia.M2716","article-title":"Protecting privacy using k-anonymity.","volume":"15","year":"2008","journal-title":"J Am Med Inform Assoc"},{"key":"key\n\t\t\t\t20171113095722_b40","article-title":"Assessing Disclosure Risk and Data Utility: A Multiple Objectives Decision Problem.","volume-title":"Joint, ECE\/Eurostat work session on statistical data confidentiality","year":"2003"},{"key":"key\n\t\t\t\t20171113095722_b41","article-title":"Guidelines for protecting privacy and confidentiality in the design, conduct and evaluation of health research","author":"Canadian Institutes for Health Research","year":"2004"},{"issue":"2","key":"key\n\t\t\t\t20171113095722_b42","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TKDE.2008.129","article-title":"k-Anonymization with minimal loss of information.","volume":"21","year":"2009","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"key\n\t\t\t\t20171113095722_b43","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1177\/004912417700600206","article-title":"The treatment of missing data in multivariate analysis.","volume":"6","year":"1977","journal-title":"Soc Methods and Res"},{"key":"key\n\t\t\t\t20171113095722_b44","article-title":"Statistical Analysis with Missing Data","year":"1987"},{"issue":"4","key":"key\n\t\t\t\t20171113095722_b45","article-title":"Risk assessment in statistical microdata protection via advanced record linkage.","volume":"13","year":"2003","journal-title":"J Stat Comput"},{"issue":"5","key":"key\n\t\t\t\t20171113095722_b46","first-page":"18","article-title":"Achieving k-anonymity privacy protection using generalization and suppression.","volume":"10","year":"2002","journal-title":"Int. J Uncertainty, Fuzziness and Knowl-Based Syst"},{"key":"key\n\t\t\t\t20171113095722_b47","article-title":"Computational Disclosure Control: A Primer on Data Privacy Protection","year":"2001"},{"key":"key\n\t\t\t\t20171113095722_b48","article-title":"Mondrian multidimensional k-anonymity. Proceedings of the 22nd International Conference on Data Engineering","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b49","article-title":"Flexible anonymization for privacy preserving data publishing: A systematic search based approach.","volume-title":"Proceedings of the SIAM International Conference on Data Mining","year":"2007"},{"issue":"2","key":"key\n\t\t\t\t20171113095722_b50","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1233321.1233324","article-title":"Utility-based anonymization for privacy preservation with less information loss.","volume":"8","year":"2006","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"key\n\t\t\t\t20171113095722_b51","article-title":"Thoughts on k-anonymization. Second international workshop on privacy.","year":"2006","journal-title":"Data Manag"},{"key":"key\n\t\t\t\t20171113095722_b52","article-title":"Note on the Individual Risk of Disclosure","year":"2003"},{"key":"key\n\t\t\t\t20171113095722_b53","article-title":"L-diversity: Privacy beyond k-anonymity.","volume-title":"Proceedings of the International Conference on Data Engineering","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b54","article-title":"Data privacy through optimal k-Anonymization.","volume-title":"Proceedings of the 21st International Conference on Data Engineering","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b55","article-title":"Data privacy through optimal k-Anonymization.","volume-title":"Proceedings of the Sixth IEEE International Conference on Data Mining","year":"2006"},{"key":"key\n\t\t\t\t20171113095722_b56","first-page":"17","article-title":"Information loss through global recoding and local suppression.","volume":"14","year":"1999","journal-title":"Neth Off Statistics"},{"key":"key\n\t\t\t\t20171113095722_b57","article-title":"Elements of Statistical Disclosure Control","year":"2001"},{"key":"key\n\t\t\t\t20171113095722_b58","article-title":"Disclosure control methods and information loss for microdata.","volume-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies","year":"2001"},{"key":"key\n\t\t\t\t20171113095722_b59","article-title":"Computational Disclosure Control for Medical Microdata: The Datafly System. Record Linkage Techniques","year":"1997"},{"key":"key\n\t\t\t\t20171113095722_b60","article-title":"Guaranteeing anonymity when sharing medical data: The Datafly system.","volume-title":"Proceedings of the American Medical Informatics Association Symposium","year":"1997"},{"key":"key\n\t\t\t\t20171113095722_b61","article-title":"k-Anonymity","volume-title":"Secure Data Management in Decentralized Systems","year":"2007"},{"key":"key\n\t\t\t\t20171113095722_b62","article-title":"Incognito: Efficient full domain k-anonymity.","volume-title":"International Conference of the ACM Special Interest Group on Management of Data","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b63","article-title":"Uniqueness of Simple Demographics in the US Population","year":"2000"},{"key":"key\n\t\t\t\t20171113095722_b64","article-title":"Reidentification of Individuals in Chicago's Homicide Database: A Technical and Legal Study","year":"2001"},{"issue":"4","key":"key\n\t\t\t\t20171113095722_b65","first-page":"307","article-title":"Evaluating patient re-identification risk from hospital prescription records.","volume":"62","year":"2009","journal-title":"Can J Hosp Pharm"},{"key":"key\n\t\t\t\t20171113095722_b66","article-title":"Private Lives and Public Policies: Confidentiality and accessibility of Government Statistics","year":"1993"},{"issue":"1","key":"key\n\t\t\t\t20171113095722_b67","first-page":"95","article-title":"A view on statistical disclosure control for microdata.","volume":"22","year":"1996","journal-title":"Surv Methodol"},{"key":"key\n\t\t\t\t20171113095722_b68","article-title":"Chenard ?. Ministere de L'Agriculture, des Pecheries et de L'Alimentation","author":"Office of the Privacy Commissioner of Quebec (CAI)","year":"1997"},{"key":"key\n\t\t\t\t20171113095722_b69","author":"National Center for Education Statistics","year":"2003"},{"key":"key\n\t\t\t\t20171113095722_b70","article-title":"Cancer Care Ont","author":"Cancer Care Ontario Data Use and Disclosure Policy","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b71","article-title":"Security and confidentiality policies and procedures","year":"2004"},{"key":"key\n\t\t\t\t20171113095722_b72","year":"2004"},{"key":"key\n\t\t\t\t20171113095722_b73","year":"2002"},{"key":"key\n\t\t\t\t20171113095722_b74","article-title":"Federal Committee on Statistical Methodology Working Paper 22, Report on statistical disclosure control, Office of Management and Budget","author":"Subcommittee on Disclosure Limitation Methodology","year":"1994"},{"key":"key\n\t\t\t\t20171113095722_b75","article-title":"Therapeutic abortion survey, 2007","author":"Statistics Canada","year":"1994"},{"key":"key\n\t\t\t\t20171113095722_b76","author":"Office of the Information and Privacy Commissioner of British Columbia"},{"key":"key\n\t\t\t\t20171113095722_b77","author":"Office of the Information and Privacy Commissioner of Ontario.","year":"1994"},{"issue":"8","key":"key\n\t\t\t\t20171113095722_b78","first-page":"3","article-title":"Access to social security microdata files for research and statistical purposes.","volume":"41","year":"1978","journal-title":"Soc Sec Bull"},{"key":"key\n\t\t\t\t20171113095722_b79","author":"Ministry of Health.","year":"1984"},{"key":"key\n\t\t\t\t20171113095722_b80","article-title":"Computational ComplexityCambridge","year":"2008"},{"key":"key\n\t\t\t\t20171113095722_b81","article-title":"Cutter Consortium","author":"Software Inspection Best Practices","year":"2001"},{"key":"key\n\t\t\t\t20171113095722_b82","article-title":"The ROI from Software Quality","year":"2005"},{"key":"key\n\t\t\t\t20171113095722_b83","article-title":"Anonymizing tables. Proceedings of the 10th, International Conference on Database Theory (ICDT05)","year":"2005"},{"issue":"4","key":"key\n\t\t\t\t20171113095722_b84","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","article-title":"Security-control methods for statistical databases: A comparative study.","volume":"21","year":"1989","journal-title":"ACM Comput Surv"},{"key":"key\n\t\t\t\t20171113095722_b85","article-title":"Report on Statistical Disclosure Limitation Methodology, Office of Management and Budget","author":"Federal Committee on Statistical Methodology","year":"2005"}],"container-title":["Journal of the American Medical Informatics Association"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jamia\/article-pdf\/16\/5\/670\/21736049\/jamia.m3144.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T14:57:40Z","timestamp":1510585060000},"score":1,"resource":{"primary":{"URL":"http:\/\/academic.oup.com\/jamia\/article\/16\/5\/670\/804120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,1]]},"references-count":85,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2009,9,1]]},"published-print":{"date-parts":[[2009,9,1]]}},"URL":"https:\/\/doi.org\/10.1197\/jamia.m3144","relation":{},"ISSN":["1067-5027","1527-974X"],"issn-type":[{"value":"1067-5027","type":"print"},{"value":"1527-974X","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2009,9]]},"published":{"date-parts":[[2009,9,1]]}}}