Format
Sort by

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 103

1.

Methods for the de-identification of electronic health records for genomic research.

El Emam K.

Genome Med. 2011 Apr 27;3(4):25. doi: 10.1186/gm239.

2.

A systematic review of re-identification attacks on health data.

El Emam K, Jonker E, Arbuckle L, Malin B.

PLoS One. 2011;6(12):e28071. doi: 10.1371/journal.pone.0028071. Epub 2011 Dec 2. Erratum in: PLoS One. 2015;10(4):e0126772.

4.

Evaluating common de-identification heuristics for personal health information.

El Emam K, Jabbouri S, Sams S, Drouet Y, Power M.

J Med Internet Res. 2006 Nov 21;8(4):e28.

5.

HIPAA--Implications for research.

Erlen JA.

Orthop Nurs. 2005 Mar-Apr;24(2):139-42.

PMID:
15902013
6.

A database de-identification framework to enable direct queries on medical data for secondary use.

Erdal BS, Liu J, Ding J, Chen J, Marsh CB, Kamal J, Clymer BD.

Methods Inf Med. 2012;51(3):229-41. doi: 10.3414/ME11-01-0048. Epub 2012 Feb 7.

PMID:
22311158
8.

The Health Insurance Portability and Accountability Act Privacy Rule: a practical guide for researchers.

Gunn PP, Fremont AM, Bottrell M, Shugarman LR, Galegher J, Bikson T.

Med Care. 2004 Apr;42(4):321-7. Review.

PMID:
15076808
9.

Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data.

McGraw D.

J Am Med Inform Assoc. 2013 Jan 1;20(1):29-34. doi: 10.1136/amiajnl-2012-000936. Epub 2012 Jun 26.

10.
11.
12.
13.

Evaluating re-identification risks with respect to the HIPAA privacy rule.

Benitez K, Malin B.

J Am Med Inform Assoc. 2010 Mar-Apr;17(2):169-77. doi: 10.1136/jamia.2009.000026.

14.

Strategies for maintaining patient privacy in i2b2.

Murphy SN, Gainer V, Mendis M, Churchill S, Kohane I.

J Am Med Inform Assoc. 2011 Dec;18 Suppl 1:i103-8. doi: 10.1136/amiajnl-2011-000316. Epub 2011 Oct 7.

15.

Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule.

Malin B, Benitez K, Masys D.

J Am Med Inform Assoc. 2011 Jan-Feb;18(1):3-10. doi: 10.1136/jamia.2010.004622.

16.

De-identification methods for open health data: the case of the Heritage Health Prize claims dataset.

El Emam K, Arbuckle L, Koru G, Eze B, Gaudette L, Neri E, Rose S, Howard J, Gluck J.

J Med Internet Res. 2012 Feb 27;14(1):e33. doi: 10.2196/jmir.2001.

17.

Automatic de-identification of textual documents in the electronic health record: a review of recent research.

Meystre SM, Friedlin FJ, South BR, Shen S, Samore MH.

BMC Med Res Methodol. 2010 Aug 2;10:70. doi: 10.1186/1471-2288-10-70. Review.

18.

Evaluating HIPAA compliance: a guide for researchers, privacy boards, and IRBs.

Artnak KE, Benson M.

Nurs Outlook. 2005 Mar-Apr;53(2):79-87. Review.

PMID:
15858526
19.

The HIPAA privacy rule: practical advice for academic and research institutions.

Gunter KP.

Healthc Financ Manage. 2002 Feb;56(2):50-4.

PMID:
11842502
20.
Items per page

Supplemental Content

Write to the Help Desk