Journals

  1. K. El Emam, E. Jonker, E. Moher, L. Arbuckle: “A review of evidence on consent bias in research.” In Am J Bioeth 13(4), 2013.
  2. F.K. Dankar, K. El Emam: “Practicing Differential Privacy in Healthcare: A Review.” In Transactions on Data Privacy 6(1), 2013.
  3. K. El Emam, L. Arbuckle, E. Jonker, K. Anderson: “Two h-Index Benchmarks for Evaluating the Publication Performance of Medical Informatics Researchers.” In Journal of Medical Internet Research 14(5), 2012.
  4. K. El Emam, S. Samet, L. Arbuckle, R. Tamblyn, C. Earle, M. Kantarcioglu: “A secure distributed logistic regression protocol for the detection of rare adverse drug events.” In the Journal of the American Medical Informatics Association 7(7), 2012.
  5. F. Dankar, K. El Emam, A. Neisa, T. Roffey: “Estimating the re-identification risk of clinical data sets.” In BMC Medical Informatics and Decision Making 12 (66), 2012.
  6. K. El Emam, S. Samet, J. Hu, L. Peyton, C. Earle, G. Jayaraman, T. Wong, M. Kantarcioglu, F. Dankar, and A. Essex: “A Protocol for the Secure Linking of Registries for HPV Surveillance.“ In PLoS ONE 7(7), 2012.
  7. M. van der Velden, K. El Emam: “Not all my friends need to know: A qualitative study of teenage patients, privacy and social media.” In the Journal of the American Medical Informatics Association, Jul 6, 2012.
  8. M. Sokolova, K. El Emam, L. Arbukle, E. Neri, S. Rose, E. Jonker: “P2P Watch: Personal Health Information detection in peer-to-peer file sharing networks.” In the Journal of Medical Internet Research 14(1), 2012.
  9. M. Sokolova and G. Lapalme: “How much do we say? Using informativeness of negotiation records for early prediction of negotiation outcomes.” In Group Decision and Negotiation 21(3), 2012.
  10. K. El Emam, L. Arbuckle, G. Koru, L. Gaudette, E. Neri, S. Rose, J. Howard, J. Gluck: “De-Identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Data Set.” In the Journal of Medical Internet Research 14(1), 2012.
  11. K. El Emam, E. Jonker, L. Arbuckle, B. Malin: “A Systematic Review of Re-identification Attacks on Health Data.” In PLoS ONE 6(12), 2011.
  12. K. El Emam, D. Paton, F. Dankar, G. Koru: “De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database.” In BMC Medical Informatics and Decision Making 11(53), 2011.
  13. K. El Emam, D. Buckeridge, R. Tamblyn, A. Neisa, E. Jonker, A. Verma: “The Re-identification Risk of Canadians from Longitudinal Demographics.” In BMC Medical Informatics and Decision Making 11(46), 2011.
  14. K. El Emam, J. Mercer, K. Moreau, I. Grava-Gubins, D. Buckeridge, E. Jonker: “Physician Privacy Concerns when Disclosing Patient Data for Public Health Purposes During a Pandemic Influenza Outbreak.” In BMC Public Health 11(454), 2011.
  15. K. El Emam: “Methods for the de-identification of electronic health records for genomic research.” In Genome Medicine 3(25), 2011.
  16. K. El Emam, J. Hu, J. Mercer, L. Peyton, M. Kantarcioglu, B. Malin, D. Buckeridge, S. Samet, C. Earle: “A Secure Protocol for Protecting the Identity of Providers When Disclosing Data for Disease Surveillance.” In the Journal of the American Medical Informatics Association 18, 2011.
  17. M. Sokolova and G. Lapalme: “Learning opinions in user-generated Web content.” In the Journal of Natural Language Engineering, 2011.
  18. K. El Emam, K. Moreau, E. Jonker: “How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?“ In the Journal of Medical Internet Research 13(1), 2011.
  19. K. El Emam: “Risk-based health data de-identification.” In IEEE Security and Privacy 8(3), 2010.
  20. K. El Emam, A. Brown, P. AbdelMalik, A. Neisa, M. Walker, J. Bottomley, and T. Roffey: “A method for managing re-identification risk from small geographic areas in Canada.” In BMC Medical Informatics and Decision Making 10(18), 2010.
  21. G. Koru, H. Liu, D. Zhang, and K. El Emam: “Testing the Theory of Relative Defect Proneness for Closed-Source Software.” In the Empirical Software Engineering 15(6), 2010.
  22. K. El Emam, E. Neri, E. Jonker, M. Sokolova, L. Peyton, A. Neisa, T. Scasa: “The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.” In the Journal of the American Medical Informatics Association 17(2), 2010.
  23. Birney et al.: “Prepublication data sharing.” In Nature 461(10), 2009.
  24. G. Koru and K. El Emam: “Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules and its Implications for Software Refactoring and Quality.” In IEEE Software 27(2), 2010.
  25. K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, J. Bottomley: “A Globally Optimal k-Anonymity Method for the De-identification of Health Data.” In Journal of the American Medical Informatics Association 16(5), 2009.