Repository logo

Heuristics for de-identifying health data

dc.contributor.authorEl Emam, Khaled
dc.date.accessioned2010-07-14T15:58:10Z
dc.date.available2010-07-14T15:58:10Z
dc.date.created2008
dc.date.issued2008
dc.description.abstractBefore releasing personal health information for secondary uses, such as research or public health monitoring, organizations must de-identify the data they've collected. Several common heuristics are useful for this purpose, but they also have limitations. // NOTE // This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
dc.identifier.citationIEEE Security and Privacy, 6(4), 58-61.
dc.identifier.doi10.1109/MSP.2008.84
dc.identifier.urihttp://hdl.handle.net/10393/12987
dc.language.isoen
dc.subjectprivacy interests
dc.subjectsecurity
dc.subjectpersonal health information
dc.subjectsecondary use of data
dc.subjectde-identification
dc.subjectprivacy in healthcare
dc.titleHeuristics for de-identifying health data
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
El_Emam_Khaled_2008_Heuristics_for_de-identifying_health_data.pdf
Size:
1.09 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
license.txt
Size:
4.93 KB
Format:
Item-specific license agreed upon to submission
Description: