Other Publications

Workshops

K. Ghazinour, S. Matwin, M. Sokolova: “Monitoring and recommending privacy settings in social networks.” EDBT/ICDT Workshops, 2013.
K. El Emam: “Risk-based de-identification of health information.” In Proceedings of the HHS Workshop on the HIPAA Privacy Rule’s De-identification Standard, 2010.
F. K. Dankar and K. El Emam: “A method for evaluating marketer re-identification risk.” In Proceedings of the 3rd International Workshop on Privacy and Anonymity in the Information Society, 2010.
M. Sokolova, K. El Emam, S. Rose, S. Chowdhury, E. Neri, E. Jonker, and L. Peyton: “Personal health information leak prevention in heterogeneous texts.” Biomedical Information Extraction International Workshop, published in “Adaptation of Language Resources and Technology to New Domains,”  2009.
M. Sokolova and K. El Emam: “Evaluation of Learning from Screened Positive Examples.” Accepted by the 3rd workshop on Evaluation Methods for Machine Learning, in conjunction with the 25th International Conference on Machine Learning, ICML, 2008.
K. El Emam: “A Multi-method evaluation of the practices of small software projects.” In S. Garcia, C. Graettinger, and K. Kost (eds.): Proceedings of the First International Research Workshop on Process Improvement in Small Settings, Pittsburgh, Technical Report CMU/SEI 2006-SR-001, 2006.
G. Melnik and K. El Emam: “Third International Workshop on Empirical Evaluation of Agile Methods (“The Data Workshop”).” Proceedings of XP/Agile Universe 2004, Lecture Notes in Computer Science, Vol. 3134, Springer Verlag: 188, 2004.
J. Daly, K. El Emam and J. Miller: “Multi-method research in software engineering.” In Proceedings of the Second International Workshop on Empirical Studies of Software Maintenance, 1997.
G. Perez, K. El Emam, and N. H. Madhavji: “Customising software process models.” In Proceedings of the 4th European Workshop on Software Process Technology, Springer-Verlag, 1995.
K. El Emam and N. H. Madhavji: “A method for instrumenting software evolution processes and an example application.” Presentation at the International Workshop on Software Evolution Processes and Measurements, Victoria, Canada, 1994.
N. H. Madhavji, K. El Emam, and T. Bruckhaus: “An on-going study of factors causing process evolution.” Presentation at the International Workshop on the Evolution of Software Processes, Quebec, Canada, 1993.
K. El Emam, N. H. Madhavji, and K. Toubache: “Empirically driven improvements of generic process models.” In Proceedings of the 8th International Software Process Workshop, 1993.

Posters

E. Moher and K. El Emam: “Get it right or obtain it correctly: The role of readability of consent forms in determining disclosure rates.” 2014 NAPCRG Annual Meeting, November 2014.
A. Essex, K. El Emam, L. Arbuckle, M. Tucciarone: “Secure Record Linkage: Encrypt, match, analyze.” Statistics Canada International Methodology Symposium, October 2014.
K. El Emam, N. Corner, L. Arbuckle, B. Eze: “The De-Identification of a Large Electronic Medical Records Database for Secondary Analysis.” Center for Health Services and Policy Research, February 2014.
E. Moher and K. El Emam: “Threats to security: Ironic consequences of secure data collection in healthcare.” The Society for Judgment and Decision Making Annual Meeting, November 2013.
K. El Emam, L. Arbuckle: “Disclosing Small Geographic Areas while Protecting Privacy.” The Ontario Public Health Convention, April 4, 2013.
K. El Emam, L. Arbuckle: “A Risk-based Methodology to De-identify Protected Health Information for the Heritage Health Prize.” 2012 American Statistical Association Conference on Statistical Practice.
El Emam K: “Risk-based De-identification of Health Data.” 3rd North American Congress of Epidemiology, 2011.
El Emam K, Samet S, Earle C: “Secure Logistic Regression of Horizontally Partitioned Data for PharmacoVigilance.” 3rd North American Congress of Epidemiology, 2011.
Frescura A, Wong T, Mercer J, Mukhi Nizar S, Totten S, Jayaraman G, El Emam K, Babin C, Saginur R, Rodin R, Garber G, Samina Aziz, Kavanagh D:  “Rapid Real Time Surveillance and Monitoring of Pandemic Influenza Severity & Associated Risk Factors Using Primary Care Electronic Medical Records (EMR).” CPhA’s 99th Annual National Conference Montréal 2011.
K. Murto, U. Schwarz, K. Chowdary, I. Abushahwan, G. Bryson, J. King, D. Moher, K. El Emam, and W. Splinter: “A survey: Technology in a pediatric care setting.” Annual Meeting of the Canadian Anesthesiologists’ Society, 2006.
Awarded best paper in Ambulatory Anesthesia.
V. Bykerk, C. Kitamura, G. Kraag, M. Bell, B. Haraoui, E. Keystone, and K. El Emam: “Establishment of a multicenter Canadian cohort of patients with early inflammatory arthritis enabled by a real time data collection tool.” Annual European Congress of Rheumatology, 2005.
C. Bombardier, S. Solway, A. Wilkins, K. El Emam, J. Lee, and A. Sadikali: “eRheum: Integrating electronic capture and reporting of patient self-report data into the practice management of adults with Rheumatoid Arthritis.” Conference of the Canadian Rheumatology Association, 2005.
K. El Emam: “The certification of eHealth software.” Canadian Society for Telehealth Conference, 2003.

Standards

PhUSE: PhUSE De-identification Standard, May 2015.
Institute of Medicine:Sharing Clinical Trial Data: Maximizing benefits, minimizing risk. National Academies Press, 2015.
Health Information Trust Alliance: HITRUST De-Identification Framework, 2015.

Reports

A. Cavoukian and K. El Emam: “De-identification Protocols: Essential for Protecting Privacy.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, June 2014.
K. El Emam and B. Malin: “Concepts and methods for de-identifying clinical trials data.” whitepaper commissioned by the Institute of Medicine committee on Strategies for Responsible Sharing of Clinical Trial Data, 2014.
A. Cavoukian and K. El Emam: “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, 2013.
K. El Emam, E. Jonker, M. Sehatkar, J. Wunderlich and L. Gaudette: “Managing the Risk of Re-identification for Public Use Files.” Office of the Privacy Commissioner of Canada, 2011.
K. El Emam: “Managing privacy risks through data anonymization.” Business Intelligence Executive Report, Cutter Consortium, 2009.
K. El Emam: “User participation in agile projects.” Agile Project Management Executive Report, Cutter Consortium, 2007.
K. El Emam: “User participation in software projects.” Agile Project Management Advisory Service Executive Update 6(19), Cutter Consortium, 2005.
K. El Emam: “Software practices and project success.” Agile Project Management Advisory Service Executive Update 6(17), Cutter Consortium, 2005.
K. El Emam: “Does project size matter?” Agile Project Management Advisory Service Executive Update 6(14), Cutter Consortium, 2005.
K. El Emam: “Making decisions using software product metrics.” Agile Project Management Executive Report 5(9), Cutter Consortium, 2004.
K. El Emam: “The case for open source.” Business IT Strategies Executive Report 7(7), Cutter Consortium, 2004.
K. El Emam: “Finding success in small software projects.” Agile Project Management Executive Report 4(11), Cutter Consortium, 2003.
K. El Emam: “Software quality certification.” Agile Project Management Advisory Service Executive Update 4(2), Cutter Consortium, March 2003.
K. El Emam: “Getting started with software productivity benchmarking.” Agile Project Management Advisory Service, Executive Report, 3(9), Cutter Consortium, October 2002.
K. El Emam: “Software defect management best practices.” Agile Project Management Advisory Service, Executive Report 3(4), Cutter Consortium, April 2002.
D. Card and K. El Emam: “A quality risk indicator for object-oriented software.” In Proceedings of the Practical Software Measurement Technical Working Group meeting, March 2002.
K. El Emam: “Software inspection best practices.” Agile Project Management Advisory Service, Executive Report vol. 2, no. 9, Cutter Consortium, September 2001.
K. El Emam: “Risk assessment with object-oriented metrics.” In The e-Project Management Advisory from the Cutter Consortium, August 2001.

Magazine Articles

K. El Emam: “A Privacy Framework for Big Data Analytics in Public Health.” In Global Health and Diplomacy, Winter 2015.
A. Cavoukian and K. El Emam: “Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy.” In Canadian Privacy Law Review 8(9), August 2011.
B. Pascal, K. El Emam, and M. McCarrey: “Public Accountability and Transparency: the Missing Piece of the Privacy Puzzle.” In Healthcare Information Management and Communications Canada 24(4), December 2009.
K. El Emam: “Protecting personal information through anonymization: An overview.” In Cutter IT Journal, November 2006.
K. El Emam: “Industrial Evolution”. International Clinical Trials, Spring 2006.
D. Barnes and K. El Emam: “Pain Point in Clinical Trials: Mitigating the Risk.” In Biotechnology Focus, March 2006.

Blogs and Newsletter Articles

K. El Emam: “Setting the record straight on privacy dimensions in big data.” IAPP Privacy Tech, June 2, 2016.
K. El Emam, T. Jefferson, P. Doshi: “Maximizing the value of clinical study reports.” The BMJ; August 27, 2015.
D. Barth-Jones, K. El Emam, J. Bambauer, A. Cavoukian, B. Malin: “Assessing data intrusion threats” (Comment). In Science 2015; 348(6231):194-5.
K. El Emam: “On Re-identification: Not really unique in the shopping mall.” IAPP Privacy Tech, February 20, 2015.
K. El Emam: “Is it Safe to Anonymize Data?” The BMJ Blogs, February 6, 2015.
K. El Emam: “Ten Tips for Privacy Officers on How to Monetize Health Data Responsibly” IAPP Privacy Perspectives, January 9, 2015.
K. El Emam: “What are the Privacy Concerns when Sharing Clinical Trial Data?” The BMJ Blogs, December 19, 2014.
K. El Emam: “Towards Standards for Anonymizing Clinical Trials Data”, The BMJ Blogs, December 5, 2014.
K. El Emam: “Pseudonymous Data is Not Anonymous Data”, The BMJ Blogs, November 20, 2014.
K. El Emam: “Public Health Surveillance and Privacy in the Age of Ebola”, IAPP Privacy Perspectives, November 18, 2014.
A. Cavoukian, A. Dix, K. El Emam:   “Consent and Personal Control are Not Things of the Past”, IAPP Privacy Perspectives, January 8, 2014.
K. El Emam: “Anonymisation and Creepy Analytics”, The BMJ Blogs, October 22, 2013.
K. El Emam: “Quality models.” Software Quality 1(2), 2005.
K. El Emam: “Perspectives on software quality.” Software Quality 1(1), 2004.
K. El Emam and S. Rai: “Evaluating predictions of faulty software using thresholds.” In the Annual Conference of the Statistical Society of Canada, 2000.
K. El Emam and P. Fusaro: “News Column: Fraunhofer – Institute for Experimental Software Engineering.” In Software Process Improvement and Practice Journal 3(1), 1997.
L. Briand and K. El Emam: “Software engineering R&D group at CRIM.” In Software Process Improvement and Practice Journal 2(1), 1996.
K. El Emam, B. Shostak, and L. Briand: “Centre de recherche informatique de Montreal (News).” In Software Process Improvement and Practice Journal, 2(2), 1996.
K. El Emam and D. R. Goldenson: “Some initial results from the international SPICE trials.” In Software Process Newsletter, IEEE Technical Council on Software Engineering No. 6, Spring 1996.
L. Briand and K. El Emam: “Some issues in software engineering data analysis.” In the PERFECT Newsletter, 1995.