Heuristics for de-identifying health data
| dc.contributor.author | El Emam, Khaled | |
| dc.date.accessioned | 2010-07-14T15:58:10Z | |
| dc.date.available | 2010-07-14T15:58:10Z | |
| dc.date.created | 2008 | |
| dc.date.issued | 2008 | |
| dc.description.abstract | Before releasing personal health information for secondary uses, such as research or public health monitoring, organizations must de-identify the data they've collected. Several common heuristics are useful for this purpose, but they also have limitations. // NOTE // This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
| dc.identifier.citation | IEEE Security and Privacy, 6(4), 58-61. | |
| dc.identifier.doi | 10.1109/MSP.2008.84 | |
| dc.identifier.uri | http://hdl.handle.net/10393/12987 | |
| dc.language.iso | en | |
| dc.subject | privacy interests | |
| dc.subject | security | |
| dc.subject | personal health information | |
| dc.subject | secondary use of data | |
| dc.subject | de-identification | |
| dc.subject | privacy in healthcare | |
| dc.title | Heuristics for de-identifying health data | |
| dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- El_Emam_Khaled_2008_Heuristics_for_de-identifying_health_data.pdf
- Size:
- 1.09 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 4.93 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
