TY - CHAP AU - Hsiao, C. J. AU - Hing, E. AU - Socey, T. C. AU - Cai, B. PY - 2010 DA - 2010// TI - Electronic medical record/electronic health record systems of office-based physicians: United States, 2009, and preliminary 2010 state estimates BT - National Center for Health Statistics Health E-stat ID - Hsiao2010 ER - TY - JOUR AU - Safran, C. AU - Bloomrosen, M. AU - Hammand, W. E. AU - Labkoff, S. AU - Markel-Fox, S. AU - Tang, P. C. AU - Detmer, D. E. PY - 2007 DA - 2007// TI - Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper JO - J Am Med Inform Assoc VL - 14 UR - https://doi.org/10.1197/jamia.M2273 DO - 10.1197/jamia.M2273 ID - Safran2007 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - k-anonymity: a model for protecting privacy JO - International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER - TY - JOUR AU - Wellner, B. AU - Huyck, M. AU - Mardis, S. AU - Aberdeen, J. AU - Morgan, A. AU - Peshkin, L. AU - Yeh, A. AU - Hitzeman, J. AU - Hirschman, L. PY - 2007 DA - 2007// TI - Rapidly retargetable approaches to de-identification in medical records JO - Journal of the American Medical Informatics Association : JAMIA VL - 14 UR - https://doi.org/10.1197/jamia.M2435 DO - 10.1197/jamia.M2435 ID - Wellner2007 ER - TY - JOUR AU - Emam, K. E. PY - 2008 DA - 2008// TI - Heuristics for de-identifying health data JO - IEEE Security & Privacy VL - 6 UR - https://doi.org/10.1109/MSP.2008.84 DO - 10.1109/MSP.2008.84 ID - Emam2008 ER - TY - JOUR AU - Emam, K. AU - Dankar, F. AU - Issa, R. AU - Jonker, E. AU - Amyot, D. AU - Cogo, E. AU - Corriveau, J. AU - Walker, M. AU - Chowdhury, S. AU - Vaillancourt, R. AU - Roffey, T. AU - Bottomley, J. PY - 2009 DA - 2009// TI - A globally optimal k-anonymity method for the de-identification of health data JO - Journal of the American Medical Informatics Association : JAMIA VL - 16 UR - https://doi.org/10.1197/jamia.M3144 DO - 10.1197/jamia.M3144 ID - Emam2009 ER - TY - CHAP AU - Deutsch, A. AU - Papakonstantinou, Y. PY - 2005 DA - 2005// TI - Privacy in database publishing BT - In ICDT ID - Deutsch2005 ER - TY - CHAP AU - Xiao, X. AU - Tao, Y. PY - 2006 DA - 2006// TI - Anatomy: simple and effective privacy preservation BT - Proceedings of the 32nd international conference on Very large data bases ID - Xiao2006 ER - TY - CHAP AU - Machanavajjhala, A. AU - Kifer, D. AU - Gehrke, J. AU - Venkitasubramaniam, M. PY - 2007 DA - 2007// TI - L-diversity: Privacy beyond k-anonymity BT - A CM Transactions on Knowledge Discovery from Data ID - Machanavajjhala2007 ER - TY - CHAP AU - Li, N. AU - Li, T. AU - Venkatasubramanian, S. PY - 2007 DA - 2007// TI - t-Closeness: privacy beyond k-anonymity and l-diversity BT - Proceedings of the 23rd International Conference on Data Engineering ID - Li2007 ER - TY - JOUR AU - Annas, G. J. PY - 2003 DA - 2003// TI - HIPPA regulations: a new era of medical-record privacy JO - The New England Journal of Medicine VL - 348 UR - https://doi.org/10.1056/NEJMlim035027 DO - 10.1056/NEJMlim035027 ID - Annas2003 ER - TY - JOUR AU - Adamic, L. A. AU - Adar, E. PY - 2005 DA - 2005// TI - How to search a social network JO - Social Networks VL - 27 UR - https://doi.org/10.1016/j.socnet.2005.01.007 DO - 10.1016/j.socnet.2005.01.007 ID - Adamic2005 ER - TY - CHAP AU - Lampe, C. AU - Ellison, N. AU - Steinfield, C. PY - 2006 DA - 2006// TI - A face(book) in the crowd: social searching vs. social browsing BT - Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work ID - Lampe2006 ER - TY - CHAP AU - Preibusch, S. AU - Hoser, B. AU - Gürses, S. AU - Berendt, B. PY - 2007 DA - 2007// TI - Ubiquitous social networks - opportunities and challenges for privacy-aware user modeling BT - Proceedings of Workshop on Data Mining for User Modelling ID - Preibusch2007 ER - TY - BOOK AU - Barnes, S. PY - 2007 DA - 2007// TI - A privacy paradox: social networking in the United States ID - Barnes2007 ER - TY - CHAP AU - Caverlee, J. AU - Webb, S. PY - 2008 DA - 2008// TI - A large-scale study of MySpace: observations and implications for online social networks BT - Proceedings of the 2nd International Conference on Weblogs and Social Media PB - Seattle CY - WA ID - Caverlee2008 ER - TY - CHAP AU - Martin, D. J. AU - Kifer, D. AU - Machanavajjhala, A. AU - Gehrke, J. AU - Halpern, J. Y. PY - 2007 DA - 2007// TI - Worst-case background knowledge for privacy-preserving data publishing BT - Proceedings of the 23rd International Conference on Data Engineering ID - Martin2007 ER - TY - CHAP AU - Chen, B. C. AU - Ramakrishnan, R. AU - LeFevre, K. PY - 2007 DA - 2007// TI - Privacy skyline: privacy with multidimensional adversarial knowledge BT - Proceedings of the 33rd international conference on Very large data bases ID - Chen2007 ER - TY - CHAP AU - Valli, C. PY - 2006 DA - 2006// TI - The insider threat to medical records: has the network age changed anything? BT - In Proceedings of Security and Management ID - Valli2006 ER - TY - CHAP AU - Williams, P. A. H. PY - 2005 DA - 2005// TI - The underestimation of threats to patient data in clinical practice BT - 3rd Australian Information Security Management Conference PB - Perth CY - WA ID - Williams2005 ER - TY - CHAP AU - Luo, B. AU - Lee, D. PY - 2009 DA - 2009// TI - On protecting private information in social networks: a proposal BT - ICDE Workshop on Modeling, Managing, and Mining of Evolving Social Networks ID - Luo2009 ER - TY - CHAP AU - Sweeney, L. PY - 2000 DA - 2000// BT - Uniqueness of Simple Demographics in the U.S. Population ID - Sweeney2000 ER - TY - JOUR AU - Wagner, R. A. AU - Fischer, M. J. PY - 1974 DA - 1974// TI - The String-to-String Correction Problem JO - Journal of the ACM VL - 21 UR - https://doi.org/10.1145/321796.321811 DO - 10.1145/321796.321811 ID - Wagner1974 ER -