References
- Benitez, K., and B. Malin. 2010. “Evaluating Re-Identification Risks with Respect to the HIPAA Privacy Rule.” Journal of the American Medical Informatics Association 17 (2): 169–177. doi:10.1136/jamia.2009.000026. doi: 10.1136/jamia.2009.000026
- Caldicott, F. 2013. “Information: To Share Or Not To Share? The Information Governance Review.” Independent review of how information about patients is shared across the health and care system. United Kingdom, Department of Health, Published 26 April 2013. URL: https://www.gov.uk/government/publications/the-information-governance-review (retrieved 12th October, 2013).
- Cutrona, S. L. et al. January 2012. “Design for Validation of Acute Myocardial Infarction Cases in Mini-Sentinel.” Pharmacoepidemiology and Drug Safety, Supplement: The U.S. Food and Drug Administration's Mini-Sentinel Program 21 (Supplement S1): 274–281. doi:10.1002/pds.2314. doi: 10.1002/pds.2314
- El Emam, K., F. K. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk. 2009 Jul. “Evaluating the Risk of Re-Identification of Patients from Hospital Prescription Records.” Canadian Journal on Hospital Pharmacy 62 (4): 307–319. PMCID: PMC2826964.
- Evans, B. J. Fall 2011. “Much Ado About Data Ownership.” Harvard Journal of Law and Technology 15 (1): 69–130. University of Houston Law Center No. 1857986. Accessed October 12th, 2013. http://ssrn.com/abstract=1857986
- Golle, P. 2006. “Revisiting the Uniqueness of Simple Demographics in the US Population.” In Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 77–80. ACM.
- Information Commissioner's Office (ICO). 2012. United Kingdom, Anonymisation: managing data protection risk, code of practice, November, 2012, Accessed October 12th, 2013. http://www.ico.org.uk/for_organisations/data_protection/topic_guides/∼/media/documents/library/Data_Protection/Practical_application/anonymisation_code.ashx
- Kwok, P., M. Davern, E. Hair, and D. Lafky. 2011. Harder than you Think: A Case Study of re-Identification Risk of HIPAA-Compliant Records. Chicago: NORC at The University of Chicago. Abstract #302255.
- Machanavajjhala, A., D. Kifer, J. Gehrke, and M. Venkitasubramaniam. 2007. “l-Diversity: Privacy Beyond k-Anonymity.” ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1): 3. doi:10.1145/1217299.1217302.
- Ohm, P. 2010. “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, (August 13, 2009).” UCLA Law Review 57: 1701–1777. U of Colorado Law Legal Studies Research Paper No. 9–12. Accessed October 12th, 2013. http://ssrn.com/abstract=1450006
- Office for Civil Rights. 2012. Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule November 26, 2012, Accessed October 12th, 2013. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/hhs_deid_guidance.pdf
- Samarati, P. Nov/Dec 2001. “Protecting Respondents Identities in Microdata Release.” IEEE Transactions on Knowledge and Data Engineering 13 (6): 1010–1027. doi:10.1109/69.971193. doi: 10.1109/69.971193
- Sweeney, L. 2000. Simple Demographics Often Identify People Uniquely. Carnegie Mellon University, Data Privacy Working Paper 3. Pittsburgh 2000. Accessed October 12th, 2013. http://dataprivacylab.org/projects/identifiability/paper1.pdf