1. K. El Emam: “Heuristics for de-identifying health data.” In IEEE Security and Privacy 6(4), 2008.
  2. A.G. Koru, K. El Emam, D. Zhang, H. Liu, and D. Mathew: “Theory of relative defect proneness: Replicated studies on the functional form of the size-defect relationship for software modules.” In Empirical Software Engineering Journal 13(5), 2008.
  3. K. El Emam, and F. Dankar: “Protecting privacy using k-anonymity.” In the Journal of the American Medical Informatics Association, September/October 15, 2008.
  4. K. Murto, G. Bryson, I. Abushahwan, J. King, D. Moher, K. El Emam, and W. Splinter: “Parents are reluctant to use technological means of communication in pediatric day care.” In Canadian Journal of Anesthesia 55(4), 2008.
  5. K. El Emam and G. Koru: “A Replicated Survey of IT Software Project Failures.” In IEEE Software 25(5), 2008.
  6. M. Sokolova, and S. Szpakowicz: “Strategies and Language Trends in Learning Success and Failure of Negotiation.” In Group Decision and Negotiation 16, 2007.
  7. K. El Emam, E. Neri, and E. Jonker: “An Evaluation of Personal Health Information Remnants in Second Hand Personal Computer Disk Drives.” In Journal of Medical Internet Research 9(3), September 2007.
  8. G. Koru, K. El Emam, A. Neisa, and M. Umarji: “A web survey of quality assurance practices in biomedical open-source software projects.” In Journal of Medical Internet Research 9(2), May 2007.
  9. T. Rout, K. El Emam, M. Fusani, D. Goldenson, and H-W Jung: “SPICE in retrospect: Developing a standard for process assessment.” In the Journal of Systems and Software 80(9), September 2007.
  10. K. El Emam, S. Jabbouri, S. Sams, Y. Drouet, M. Power: “Evaluating common de-identification heuristics for personal health information.” In Journal of Medical Internet Research 8(4), November 2006.
  11. K. El Emam: “Deploying mobile devices in CTs: Part two.” In Applied Clinical Trials, November 2006.
  12. K. El Emam: “Deploying mobile devices in CTs: Part one.” In Applied Clinical Trials, October 2006.
  13. K. El Emam: “Preserving privacy of participants’ personal data.” In Good Clinical Practice Journal, September 2006.
  14. M. Shah, M. Sokolova, and S. Szpakowicz: “Process-Specific Information for Learning Electronic Negotiation Outcomes.” In Fundamenta Informaticae 74, p. 351-373, 2006.
  15. M. Sokolova, M. Shah, and S. Szpakowicz: “Comparative Analysis of Text Data in Successful Face-to-Face and Electronic Negotiations.” In Group Decision and Negotiation, 15 (2), p 127-140, 2006.
  16. C. Garritty and K. El Emam: “Who’s using PDAs? Estimates of PDA use by health care providers: A systematic review of surveys.” In the Journal of Medical Internet Research 8(2), May 2006.
  17. K. Murto, U. Schwarz, G. Bryson, D. Moher, K. El Emam: “A survey: technology in a pediatric day care setting.” In Canadian Journal of Anesthesia, 53(1), 2006.
  18. M. Marchand and M. Sokolova: “Learning with Decision Lists of Data-Dependent Features.” In Journal of Machine Learning Research 6, April 2005.
  19. K. El Emam and A. Carleton: “The application of statistics in software engineering.” In Journal of Systems and Software 73(2), October 2004.
  20. J. Barnard, K. El Emam, and D. Zubrow: “Using capture-recapture models for the reinspection decision.” In Software Quality Professional 5(2), March 2003.
  21. B. Kitchenham, S-L Pfleeger, L. Pickard, P. Jones, D. Hoaglin, K. El Emam, and J. Rosenberg: “Preliminary guidelines for empirical research in software engineering.” In IEEE Transactions on Software Engineering 28(8), August 2002.
  22. K. El Emam, S. Benlarbi, N. Goel, W. Melo, H. Lounis, and S. Rai: “The optimal class size for object-oriented software.” In IEEE Transactions on Software Engineering 28(5), 2002.
  23. H-W. Jung, R. Hunter, D. Goldenson, and K. El Emam: “Findings from Phase Two of the SPICE Trials.” In Software Process: Improvement and Practice, 6, 2001.
  24. K. El Emam: “Ethics and Open Source.” In Empirical Software Engineering: An International Journal, Kluwer Academic Publishers 6(4), 2001.
  25. K. El Emam and H-W Jung: “An empirical evaluation of the ISO/IEC 15504 assessment model.” In the Journal of Systems and Software 59(1), 2001.