A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Exploring re-identification risks in public domains
2012
2012 Tenth Annual International Conference on Privacy, Security and Trust
While re-identification of sensitive data has been studied extensively, with the emergence of online social networks and the popularity of digital communications, the ability to use public data for re-identification ...
We conclude that targeted re-identification using traditional variables is not only possible, but fairly straightforward given the large amount of public data available. ...
A recent emphasis on re-identification within health data has also yielded a study in which Dankar and El Emam develop and assess a reidentification risk metric for an adversary trying to re-identify as ...
doi:10.1109/pst.2012.6297917
dblp:conf/pst/RamachandranSPN12
fatcat:xxco6bvbznhzzjbxy4khwipe6m
Starting from the End: What to do when Restricted Data is released
2017
Data Science Journal
Note Information about the released dataset, as well as some other information concerning the released dataset which could allow the identification of that dataset were changed. ...
Risks of re-identification are often difficult to objectively assess, especially in an era when vast amounts of information about people is available in the public domain (Ramachandran et al. 2012) . ...
Firstly, if harm came to the participants, for example through their re-identification in the public domain, this could have a serious reputational risk for the researcher and the institution. ...
doi:10.5334/dsj-2017-010
fatcat:5t4grr476ng5tlk7mgavk7doq4
Starting from the end: what to do when restricted data is released
[article]
2016
bioRxiv
pre-print
In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released. ...
Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted ...
Notes Information about the released dataset, as well as some other information concerning the released dataset which could allow the identification of that dataset were changed. ...
doi:10.1101/085100
fatcat:oesxfleozrdfzadzslv26exnhm
Extracting conclusion sections from PubMed abstracts for rapid key assertion integration in biomedical research
2009
Nature Precedings
Conclusion sections are identified as valuable resources for machine-augmented key assertion identification and integration in the biomedical domain. ...
Acknowledgements The work presented in this paper has been funded in part by a postdoctoral fellowship from the Konrad Lorenz Institute for Evolution and Cognition Research, Austria and by the Science ...
Conclusions / Outlook Conclusion sections are valuable resources for machine-augmented key assertion identification and integration in the biomedical domain. ...
doi:10.1038/npre.2009.3775.1
fatcat:2hfrwqedgrdu3oruqt5wnfpcom
Extracting conclusion sections from PubMed abstracts for rapid key assertion integration in biomedical research
2009
Nature Precedings
Conclusion sections are identified as valuable resources for machine-augmented key assertion identification and integration in the biomedical domain. ...
Acknowledgements The work presented in this paper has been funded in part by a postdoctoral fellowship from the Konrad Lorenz Institute for Evolution and Cognition Research, Austria and by the Science ...
Conclusions / Outlook Conclusion sections are valuable resources for machine-augmented key assertion identification and integration in the biomedical domain. ...
doi:10.1038/npre.2009.3775
fatcat:n7mda6quubamjbrj2mny6iya2u
Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment
2007
15th IEEE International Requirements Engineering Conference (RE 2007)
We then describe techniques to systematically understand the multi-dimensional correlations among these requirements with application to security risk assessment. ...
In this paper we outline our approach to discover and understand multi-dimensional correlations among regulatory security certification requirements in the context of a complex software system. ...
, and finally exploring the multidimensional interdependencies that exist among requirements through other domain concepts in the PDO. ...
doi:10.1109/re.2007.46
dblp:conf/re/GandhiL07
fatcat:ey3jfzjwjvhmvah7ksumgghyl4
Preschoolers' Developmental Profiles and School-Readiness in a Low-Income Canadian City: A Cross-Sectional Survey
2020
International Journal of Environmental Research and Public Health
In Phase 1, 223 families were screened; 100 children were at risk of delays (45%); 13% were at risk in ≥3 developmental domains; 26% were at risk in the fine motor domain. ...
In Phase 2, 49 children were assessed; 69% were at risk of school-readiness delays; 22% had potential motor delays; 37% were at risk in the social domain. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/ijerph17072529
pmid:32272730
fatcat:gk5r4ucskfhidocuv5cngrzqkq
Proposal and Assessment of De-identification Strategy to Enhance Anonymity of Observational Medical Outcomes Partnership Common Data Model in Public Cloud Computing Environment: Study for Medical Data Anonymity (Preprint)
2020
Journal of Medical Internet Research
of which could increase the risk of re-identification. ...
The CDM database, which was constructed according to the rules established by OHDSI, exhibited a low re-identification risk: the highest re-identifiable record rate ("11.3%") in the dataset was exhibited ...
Finally, in the risk analysis step, ARX analyzes the risk of re-identification under the chosen transformation using 3 re-identification attacker models: prosecutor, journalist, and marketer [17] . ...
doi:10.2196/19597
pmid:33177037
fatcat:3jp3r52rofcqri7a7il6b7tqki
Beyond safe harbor
2010
Proceedings of the ACM international conference on Health informatics - IHI '10
In response, we propose a novel approach to automatically discover alternative de-identification policies that contain no more re-identification risk than Safe Harbor. ...
We model this task as a lattice-search problem, introduce a measure to capture the re-identification risk, and develop an algorithm that efficiently discovers polices by exploring the lattice. ...
Our approach uses Safe Harbor to set a threshold of re-identification risk admissible in a shared dataset, and then explores the space of alternative de-identification policies in an efficient and effective ...
doi:10.1145/1882992.1883017
pmid:25525631
pmcid:PMC4267471
dblp:conf/ihi/BenitezLM10
fatcat:kxptd3mkkbgxhau55fbn7ahe6y
Revisiting The Concept Of Risk Analysis Within The Context Of Geospatial Database Design: A Collaborative Framework
2013
Zenodo
Risk analysis is rarely undertaken iteratively as part of the present GDD methods in conformance to requirement engineering (RE) guidelines and risk standards. ...
This may lead to ill-defined requirements and ultimately in higher risks of geospatial data misuse. ...
As seen above, in the non-spatial domain, the RE research community has made significant progress along many fronts. ...
doi:10.5281/zenodo.1334226
fatcat:djkhewtwpneo3jtn3bssofrpyu
Resilience Engineering indicators and safety management: A systematic review
2020
Safety and Health at Work
disparity in the identification of RE indicators. ...
Despite the fact that RE resides in the safety domain, there is no common set of RE indicators to measure and assess resilient in the work environment. ...
Methodology This research uses a systematic literature review (SLR) to explore the RE indicators that support and create a safe work environment in high-risk industries in the domain of safety. ...
doi:10.1016/j.shaw.2020.03.009
pmid:32596006
pmcid:PMC7303539
fatcat:np7p6sq4ajatbiwsyeeexqrsne
Ethical Controversies of Familial Searching: The Views of Stakeholders in the United Kingdom and in Poland
2019
Science, Technology and Human Values
We argue that the views of stakeholders about the ethical controversies of familial searching lead to prescribing specific notions of social risks, public good, and the accountability of the state. ...
the domain of missing persons together. ...
Acknowledgements The authors are extremely grateful to the participants who agreed to take part in this research and to Nina Amelung for collaboration in conducting the interviews. ...
doi:10.1177/0162243919828219
fatcat:pguiebmynjapflykvkwbjjlplq
Droplet-Transmitted Infection Risk Ranking Based on Close Proximity Interaction
2020
Frontiers in Neurorobotics
The complete workflow includes three essential sub-tasks: (1) person re-identification (REID), to identify the diagnosed patient and infected individuals across different cameras, (2) depth estimation, ...
Our method is expected to be effective in accelerating the process of identifying the potentially infected group and ultimately contribute to the well-being of public health. ...
The state-of-the-art methods in person re-identification still face significant challenges in a complicated environment. The current accuracy of re-identification in our method is 88%. ...
doi:10.3389/fnbot.2019.00113
pmid:32038220
pmcid:PMC6985151
fatcat:rcxxlu7cg5eahfp7f25jjklfsq
Page 2487 of Psychological Abstracts Vol. 77, Issue 10
[page]
1990
Psychological Abstracts
The analysis is supportive of the framework’s applicability to the domain of desired risk. ...
Machlis, Gary E. & Rosa, he in A. (U Idaho, Mos- cow) Desired risk: the social of risk framework. Risk Analysis, 1990(Mar), Vol 10(1), 161-168. ...
De-Identifying Swedish EHR Text Using Public Resources in the General Domain
2020
Studies in Health Technology and Informatics
In this study, we add non-sensitive public datasets to EHR training data; (i) scientific medical text and (ii) Wikipedia word vectors. ...
These results suggest that non-sensitive text from the general domain can be used to train robust models for de-identifying Swedish clinical text; and this could be useful in cases where the data is both ...
Whether non-sensitive medical text such as scientific medical publications or even text from the general domain is useful for de-identification, is still a matter without fully resolved clarity. ...
doi:10.3233/shti200140
pmid:32570364
fatcat:7o3gyfiuhzen5cqjuwncnxmsq4
« Previous
Showing results 1 — 15 out of 113,817 results