Journals

  1. K. El Emam, K. Moreau, E. Jonker: “How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?“ In the Journal of Medical Internet Research 13(1), 2011.
  2. K. El Emam: “Risk-based health data de-identification.” In IEEE Security and Privacy 8(3), 2010.
  3. K. El Emam, A. Brown, P. AbdelMalik, A. Neisa, M. Walker, J. Bottomley, and T. Roffey: “A method for managing re-identification risk from small geographic areas in Canada.” In BMC Medical Informatics and Decision Making 10(18), 2010.
  4. G. Koru, H. Liu, D. Zhang, and K. El Emam: “Testing the Theory of Relative Defect Proneness for Closed-Source Software.” In the Empirical Software Engineering 15(6), 2010.
  5. K. El Emam, E. Neri, E. Jonker, M. Sokolova, L. Peyton, A. Neisa, T. Scasa: “The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.” In the Journal of the American Medical Informatics Association 17(2), 2010.
  6. Birney et al.: “Prepublication data sharing.” In Nature 461(10), 2009.
  7. G. Koru and K. El Emam: “Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules and its Implications for Software Refactoring and Quality.” In IEEE Software 27(2), 2010.
  8. K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, J. Bottomley: “A Globally Optimal k-Anonymity Method for the De-identification of Health Data.” In Journal of the American Medical Informatics Association 16(5), 2009.
  9. M. Sokolova and G. Lapalme: “A Systematic Analysis of Performance Measures for Classification Tasks.” In Information Processing & Management 45, 2009.
  10. K. El Emam and P. Kosseim: “Privacy interests in prescription data. Part 2: Patient privacy.” In IEEE Security and Privacy 7(2), 2009.
  11. K. El Emam, E. Jonker, M. Sampson, K. Krleza-Jeric, A. Neisa: “The Use of Electronic Data Capture Tools in Clinical Trials: Web-Survey of 259 Canadian Trials.” In Journal of Medical Internet Research 11(1), 2009.
  12. P. Kosseim and K. El Emam: “Privacy interests in prescription data. Part 1: Prescriber privacy.” In IEEE Security and Privacy 7(1), 2009.
  13. K. El Emam, F. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk: “Evaluating Patient Re-identification Risk from Hospital Prescription Records.“In the Canadian Journal of Hospital Pharmacy 62(4), 2009.
  14. K. El Emam, A. Brown, and P. AbdelMalik: “Evaluating predictors of geographic area population size cutoffs to manage re-identification risk.” In Journal of the American Medical Informatics Association 16(2), 2009.
  15. A.G. Koru, K. El Emam, D. Zhang, and H. Liu: “An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules.” In IEEE Transactions on Software Engineering 35(2), 2009.
  16. K. El Emam: “Heuristics for de-identifying health data.” In IEEE Security and Privacy 6(4), 2008.
  17. A.G. Koru, K. El Emam, D. Zhang, H. Liu, and D. Mathew: “Theory of relative defect proneness: Replicated studies on the functional form of the size-defect relationship for software modules.” In Empirical Software Engineering Journal 13(5), 2008.
  18. K. El Emam, and F. Dankar: “Protecting privacy using k-anonymity.” In the Journal of the American Medical Informatics Association, September/October 15, 2008.
  19. K. Murto, G. Bryson, I. Abushahwan, J. King, D. Moher, K. El Emam, and W. Splinter: “Parents are reluctant to use technological means of communication in pediatric day care.” In Canadian Journal of Anesthesia 55(4), 2008.
  20. K. El Emam and G. Koru: “A Replicated Survey of IT Software Project Failures.” In IEEE Software 25(5), 2008.
  21. M. Sokolova, and S. Szpakowicz: “Strategies and Language Trends in Learning Success and Failure of Negotiation.” In Group Decision and Negotiation 16, 2007.
  22. K. El Emam, E. Neri, and E. Jonker: “An Evaluation of Personal Health Information Remnants in Second Hand Personal Computer Disk Drives.” In Journal of Medical Internet Research 9(3), September 2007.
  23. G. Koru, K. El Emam, A. Neisa, and M. Umarji: “A web survey of quality assurance practices in biomedical open-source software projects.” In Journal of Medical Internet Research 9(2), May 2007.
  24. T. Rout, K. El Emam, M. Fusani, D. Goldenson, and H-W Jung: “SPICE in retrospect: Developing a standard for process assessment.” In the Journal of Systems and Software 80(9), September 2007.
  25. K. El Emam, S. Jabbouri, S. Sams, Y. Drouet, M. Power: “Evaluating common de-identification heuristics for personal health information.” In Journal of Medical Internet Research 8(4), November 2006.