1,746
Views
8
CrossRef citations to date
0
Altmetric
Articles

A review of Automatic end-to-end De-Identification: Is High Accuracy the Only Metric?

, &

Figures & data

Figure 1. Example of an end-to-end de-identification process.

Figure 1. Example of an end-to-end de-identification process.

Table 1. De-identification systems summary. Machine learning indicates systems that uses machine learning techniques only. Hybrid systems indicates systems that used a combination of machine learning techniques and hand crafted rules.

Table 2. De-identification systems with overall F-measure 0.95.

Table 3. De-identification systems with overall F-measure 0.95.

Table 4. F-measure 0.95 for HIPAA categories for de-identification. On occasions where F-measure was not 0.95, the highest score is presented. CONTACT: URL and IP address; ID: BioID, Healthplan, Social Security no, and Vehicle license plate no; Face photo; and Any other unique code are PHIs that were not present in any of the dataset, hence not included here.

Table 5. Techniques used for the F-measures presented in for HIPAA PHI categories.

Table 6. The best F-measure for i2b2 extra categories for de-identification. This table includes categories not included in , but were introduced by i2b2 competitions as additional categories (Stubbs et al. (Citation2015); Stubbs and Uzuner (Citation2015a)). It also provides the techniques used to achieve these F-measures.

Table 7. Common practices used in surrogate generation and replacement of PHI as outlined in (Johnson et al. (Citation2016); Pantazos, Lauesen, and Lippert (Citation2017); Stubbs and Uzuner (Citation2015b); Stubbs et al. (Citation2015b)).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.