Journals

  1. K. El Emam, L. Arbuckle, G. Koru, L. Gaudette, E. Neri, S. Rose, J. Howard, J. Gluck: “De-Identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Data Set.” In the Journal of Medical Internet Research 14(1), 2012.
  2. K. El Emam, E. Jonker, L. Arbuckle, B. Malin: “A Systematic Review of Re-identification Attacks on Health Data.” In PLoS ONE 6(12), 2011.
  3. K. El Emam, D. Paton, F. Dankar, G. Koru: “De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database.” In BMC Medical Informatics and Decision Making 11(53), 2011.
  4. K. El Emam, D. Buckeridge, R. Tamblyn, A. Neisa, E. Jonker, A. Verma: “The Re-identification Risk of Canadians from Longitudinal Demographics.” In BMC Medical Informatics and Decision Making 11(46), 2011.
  5. K. El Emam, J. Mercer, K. Moreau, I. Grava-Gubins, D. Buckeridge, E. Jonker: “Physician Privacy Concerns when Disclosing Patient Data for Public Health Purposes During a Pandemic Influenza Outbreak.” In BMC Public Health 11(454), 2011.
  6. K. El Emam: “Methods for the de-identification of electronic health records for genomic research.” In Genome Medicine 3(25), 2011.
  7. K. El Emam, J. Hu, J. Mercer, L. Peyton, M. Kantarcioglu, B. Malin, D. Buckeridge, S. Samet, C. Earle: “A Secure Protocol for Protecting the Identity of Providers When Disclosing Data for Disease Surveillance.” In the Journal of the American Medical Informatics Association 18, 2011.
  8. M. Sokolova and G. Lapalme: “Learning opinions in user-generated Web content.” In the Journal of Natural Language Engineering, 2011.
  9. K. El Emam, K. Moreau, E. Jonker: “How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?“ In the Journal of Medical Internet Research 13(1), 2011.
  10. K. El Emam: “Risk-based health data de-identification.” In IEEE Security and Privacy 8(3), 2010.
  11. K. El Emam, A. Brown, P. AbdelMalik, A. Neisa, M. Walker, J. Bottomley, and T. Roffey: “A method for managing re-identification risk from small geographic areas in Canada.” In BMC Medical Informatics and Decision Making 10(18), 2010.
  12. G. Koru, H. Liu, D. Zhang, and K. El Emam: “Testing the Theory of Relative Defect Proneness for Closed-Source Software.” In the Empirical Software Engineering 15(6), 2010.
  13. K. El Emam, E. Neri, E. Jonker, M. Sokolova, L. Peyton, A. Neisa, T. Scasa: “The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.” In the Journal of the American Medical Informatics Association 17(2), 2010.
  14. Birney et al.: “Prepublication data sharing.” In Nature 461(10), 2009.
  15. G. Koru and K. El Emam: “Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules and its Implications for Software Refactoring and Quality.” In IEEE Software 27(2), 2010.
  16. K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, J. Bottomley: “A Globally Optimal k-Anonymity Method for the De-identification of Health Data.” In Journal of the American Medical Informatics Association 16(5), 2009.
  17. M. Sokolova and G. Lapalme: “A Systematic Analysis of Performance Measures for Classification Tasks.” In Information Processing & Management 45, 2009.
  18. K. El Emam and P. Kosseim: “Privacy interests in prescription data. Part 2: Patient privacy.” In IEEE Security and Privacy 7(2), 2009.
  19. K. El Emam, E. Jonker, M. Sampson, K. Krleza-Jeric, A. Neisa: “The Use of Electronic Data Capture Tools in Clinical Trials: Web-Survey of 259 Canadian Trials.” In Journal of Medical Internet Research 11(1), 2009.
  20. P. Kosseim and K. El Emam: “Privacy interests in prescription data. Part 1: Prescriber privacy.” In IEEE Security and Privacy 7(1), 2009.
  21. K. El Emam, F. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk: “Evaluating Patient Re-identification Risk from Hospital Prescription Records.“In the Canadian Journal of Hospital Pharmacy 62(4), 2009.
  22. K. El Emam, A. Brown, and P. AbdelMalik: “Evaluating predictors of geographic area population size cutoffs to manage re-identification risk.” In Journal of the American Medical Informatics Association 16(2), 2009.
  23. A.G. Koru, K. El Emam, D. Zhang, and H. Liu: “An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules.” In IEEE Transactions on Software Engineering 35(2), 2009.
  24. K. El Emam: “Heuristics for de-identifying health data.” In IEEE Security and Privacy 6(4), 2008.
  25. A.G. Koru, K. El Emam, D. Zhang, H. Liu, and D. Mathew: “Theory of relative defect proneness: Replicated studies on the functional form of the size-defect relationship for software modules.” In Empirical Software Engineering Journal 13(5), 2008.