Filters








113,817 Hits in 4.1 sec

Exploring re-identification risks in public domains

Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle
2012 2012 Tenth Annual International Conference on Privacy, Security and Trust  
While re-identification of sensitive data has been studied extensively, with the emergence of online social networks and the popularity of digital communications, the ability to use public data for re-identification  ...  We conclude that targeted re-identification using traditional variables is not only possible, but fairly straightforward given the large amount of public data available.  ...  A recent emphasis on re-identification within health data has also yielded a study in which Dankar and El Emam develop and assess a reidentification risk metric for an adversary trying to re-identify as  ... 
doi:10.1109/pst.2012.6297917 dblp:conf/pst/RamachandranSPN12 fatcat:xxco6bvbznhzzjbxy4khwipe6m

Starting from the End: What to do when Restricted Data is released

Marta Teperek, Rhys Morgan, Michelle Ellefson, Danny Kingsley
2017 Data Science Journal  
Note Information about the released dataset, as well as some other information concerning the released dataset which could allow the identification of that dataset were changed.  ...  Risks of re-identification are often difficult to objectively assess, especially in an era when vast amounts of information about people is available in the public domain (Ramachandran et al. 2012) .  ...  Firstly, if harm came to the participants, for example through their re-identification in the public domain, this could have a serious reputational risk for the researcher and the institution.  ... 
doi:10.5334/dsj-2017-010 fatcat:5t4grr476ng5tlk7mgavk7doq4

Starting from the end: what to do when restricted data is released [article]

Marta Teperek, Rhys Morgan, Michelle Renee Ellefson, Danny Kingsley
2016 bioRxiv   pre-print
In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released.  ...  Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted  ...  Notes Information about the released dataset, as well as some other information concerning the released dataset which could allow the identification of that dataset were changed.  ... 
doi:10.1101/085100 fatcat:oesxfleozrdfzadzslv26exnhm

Extracting conclusion sections from PubMed abstracts for rapid key assertion integration in biomedical research

Matthias Samwald
2009 Nature Precedings  
Conclusion sections are identified as valuable resources for machine-augmented key assertion identification and integration in the biomedical domain.  ...  Acknowledgements The work presented in this paper has been funded in part by a postdoctoral fellowship from the Konrad Lorenz Institute for Evolution and Cognition Research, Austria and by the Science  ...  Conclusions / Outlook Conclusion sections are valuable resources for machine-augmented key assertion identification and integration in the biomedical domain.  ... 
doi:10.1038/npre.2009.3775.1 fatcat:2hfrwqedgrdu3oruqt5wnfpcom

Extracting conclusion sections from PubMed abstracts for rapid key assertion integration in biomedical research

Matthias Samwald
2009 Nature Precedings  
Conclusion sections are identified as valuable resources for machine-augmented key assertion identification and integration in the biomedical domain.  ...  Acknowledgements The work presented in this paper has been funded in part by a postdoctoral fellowship from the Konrad Lorenz Institute for Evolution and Cognition Research, Austria and by the Science  ...  Conclusions / Outlook Conclusion sections are valuable resources for machine-augmented key assertion identification and integration in the biomedical domain.  ... 
doi:10.1038/npre.2009.3775 fatcat:n7mda6quubamjbrj2mny6iya2u

Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment

Robin A. Gandhi, Seok-Won Lee
2007 15th IEEE International Requirements Engineering Conference (RE 2007)  
We then describe techniques to systematically understand the multi-dimensional correlations among these requirements with application to security risk assessment.  ...  In this paper we outline our approach to discover and understand multi-dimensional correlations among regulatory security certification requirements in the context of a complex software system.  ...  , and finally exploring the multidimensional interdependencies that exist among requirements through other domain concepts in the PDO.  ... 
doi:10.1109/re.2007.46 dblp:conf/re/GandhiL07 fatcat:ey3jfzjwjvhmvah7ksumgghyl4

Preschoolers' Developmental Profiles and School-Readiness in a Low-Income Canadian City: A Cross-Sectional Survey

Chantal Camden, Léa Héguy, Megan Casoli, Mathieu Roy, Lisa Rivard, Jade Berbari, Mélanie Couture, PPOP Research Team PPOP Research Team
2020 International Journal of Environmental Research and Public Health  
In Phase 1, 223 families were screened; 100 children were at risk of delays (45%); 13% were at risk in ≥3 developmental domains; 26% were at risk in the fine motor domain.  ...  In Phase 2, 49 children were assessed; 69% were at risk of school-readiness delays; 22% had potential motor delays; 37% were at risk in the social domain.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/ijerph17072529 pmid:32272730 fatcat:gk5r4ucskfhidocuv5cngrzqkq

Proposal and Assessment of De-identification Strategy to Enhance Anonymity of Observational Medical Outcomes Partnership Common Data Model in Public Cloud Computing Environment: Study for Medical Data Anonymity (Preprint)

Seungho Jeon, Jeongeun Seo, Sukyoung Kim, Jeongmoon Lee, Jongho Kim, Jangwook Sohn, Jongsub Moon, Hyung Joon Joo
2020 Journal of Medical Internet Research  
of which could increase the risk of re-identification.  ...  The CDM database, which was constructed according to the rules established by OHDSI, exhibited a low re-identification risk: the highest re-identifiable record rate ("11.3%") in the dataset was exhibited  ...  Finally, in the risk analysis step, ARX analyzes the risk of re-identification under the chosen transformation using 3 re-identification attacker models: prosecutor, journalist, and marketer [17] .  ... 
doi:10.2196/19597 pmid:33177037 fatcat:3jp3r52rofcqri7a7il6b7tqki

Beyond safe harbor

Kathleen Benitez, Grigorios Loukides, Bradley Malin
2010 Proceedings of the ACM international conference on Health informatics - IHI '10  
In response, we propose a novel approach to automatically discover alternative de-identification policies that contain no more re-identification risk than Safe Harbor.  ...  We model this task as a lattice-search problem, introduce a measure to capture the re-identification risk, and develop an algorithm that efficiently discovers polices by exploring the lattice.  ...  Our approach uses Safe Harbor to set a threshold of re-identification risk admissible in a shared dataset, and then explores the space of alternative de-identification policies in an efficient and effective  ... 
doi:10.1145/1882992.1883017 pmid:25525631 pmcid:PMC4267471 dblp:conf/ihi/BenitezLM10 fatcat:kxptd3mkkbgxhau55fbn7ahe6y

Revisiting The Concept Of Risk Analysis Within The Context Of Geospatial Database Design: A Collaborative Framework

J. Grira, Y. Bédard, S. Roche
2013 Zenodo  
Risk analysis is rarely undertaken iteratively as part of the present GDD methods in conformance to requirement engineering (RE) guidelines and risk standards.  ...  This may lead to ill-defined requirements and ultimately in higher risks of geospatial data misuse.  ...  As seen above, in the non-spatial domain, the RE research community has made significant progress along many fronts.  ... 
doi:10.5281/zenodo.1334226 fatcat:djkhewtwpneo3jtn3bssofrpyu

Resilience Engineering indicators and safety management: A systematic review

Udara Ranasinghe, Marcus Jefferies, Peter Davis, Manikam Pillay
2020 Safety and Health at Work  
disparity in the identification of RE indicators.  ...  Despite the fact that RE resides in the safety domain, there is no common set of RE indicators to measure and assess resilient in the work environment.  ...  Methodology This research uses a systematic literature review (SLR) to explore the RE indicators that support and create a safe work environment in high-risk industries in the domain of safety.  ... 
doi:10.1016/j.shaw.2020.03.009 pmid:32596006 pmcid:PMC7303539 fatcat:np7p6sq4ajatbiwsyeeexqrsne

Ethical Controversies of Familial Searching: The Views of Stakeholders in the United Kingdom and in Poland

Rafaela Granja, Helena Machado
2019 Science, Technology and Human Values  
We argue that the views of stakeholders about the ethical controversies of familial searching lead to prescribing specific notions of social risks, public good, and the accountability of the state.  ...  the domain of missing persons together.  ...  Acknowledgements The authors are extremely grateful to the participants who agreed to take part in this research and to Nina Amelung for collaboration in conducting the interviews.  ... 
doi:10.1177/0162243919828219 fatcat:pguiebmynjapflykvkwbjjlplq

Droplet-Transmitted Infection Risk Ranking Based on Close Proximity Interaction

Shihui Guo, Jubo Yu, Xinyu Shi, Hongran Wang, Feibin Xie, Xing Gao, Min Jiang
2020 Frontiers in Neurorobotics  
The complete workflow includes three essential sub-tasks: (1) person re-identification (REID), to identify the diagnosed patient and infected individuals across different cameras, (2) depth estimation,  ...  Our method is expected to be effective in accelerating the process of identifying the potentially infected group and ultimately contribute to the well-being of public health.  ...  The state-of-the-art methods in person re-identification still face significant challenges in a complicated environment. The current accuracy of re-identification in our method is 88%.  ... 
doi:10.3389/fnbot.2019.00113 pmid:32038220 pmcid:PMC6985151 fatcat:rcxxlu7cg5eahfp7f25jjklfsq

Page 2487 of Psychological Abstracts Vol. 77, Issue 10 [page]

1990 Psychological Abstracts  
The analysis is supportive of the framework’s applicability to the domain of desired risk.  ...  Machlis, Gary E. & Rosa, he in A. (U Idaho, Mos- cow) Desired risk: the social of risk framework. Risk Analysis, 1990(Mar), Vol 10(1), 161-168.  ... 

De-Identifying Swedish EHR Text Using Public Resources in the General Domain

Taridzo Chomutare, Kassaye Yitbarek Yigzaw, Andrius Budrionis, Alexandra Makhlysheva, Fred Godtliebsen, Hercules Dalianis
2020 Studies in Health Technology and Informatics  
In this study, we add non-sensitive public datasets to EHR training data; (i) scientific medical text and (ii) Wikipedia word vectors.  ...  These results suggest that non-sensitive text from the general domain can be used to train robust models for de-identifying Swedish clinical text; and this could be useful in cases where the data is both  ...  Whether non-sensitive medical text such as scientific medical publications or even text from the general domain is useful for de-identification, is still a matter without fully resolved clarity.  ... 
doi:10.3233/shti200140 pmid:32570364 fatcat:7o3gyfiuhzen5cqjuwncnxmsq4
« Previous Showing results 1 — 15 out of 113,817 results