Tech Reports

A. Cavoukian and K. El Emam, “Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy,” June 2011. [Download]
Health System Use Technical Advisory Committee Data De-identification Working Group, “Best Practice Guidelines for Managing the Disclosure of De-identified Health Information,” April 2011. [Download]
K. El Emam, E. Jonker, and A. Fineberg, “The Case for De-Identifying Personal Health Information,” January 2011. [Download]
K. El Emam, “Practices for the Review of Data Requests and the Disclosure of Health Information by Health Ministries and Large Data Custodians (report for Canada Health Infoway),” November 2010. [Download]
K. El Emam and M. Sokolova, “Proceedings of the Workshop on Intelligent Methods for Protecting Privacy and Confidentiality in Data,” May 2010. [Download]
A. Cavoukian and K. El Emam, “A Positive-Sum Paradigm in Action in the Health Sector,” March 2010. [Download]
K. El Emam, P. Kosseim, and B. Malin, “Electronic Health Information and Privacy Conference 2009,” November 2009. [Download]
K. El Emam and A. Fineberg, “An Overview of Techniques for de-identifying Personal Health Information,” August 2009. [Download]
K. El Emam, P. AbdelMalik, and D. Buckeridge, “Electronic Health Information and Privacy Conference 2008,” November 2008. [Download]
K. El Emam, “De-identifying health data for secondary use: A framework,” October 2008. [Download]
P. Elm, D. R. Goldenson, K. El Emam, N. Donatelli, A. Neisa, and NDIA SE Effectiveness Committee, “A Survey of Systems Engineering Effectiveness: Initial Results,” December 2007. [Download]
K. El Emam (ed.), “Electronic Health Information and Privacy Conference 2007 – Handbook,” December 2007. [Download]
K. El Emam, G. Eysenbach, B. Pascal, and M. Martineau (eds.), “Consumer Health Informatics Summit 2007 – Handbook,” November 2007. [Download]
K. El Emam, E. Jonker, S. Sams, E. Neri, A. Neisa, T. Gao, and S. Chowdhury, “2007 – Pan-Canadian De-Identification Guidelines,” May 2007. [Download]
K. El Emam and S. Sams, “Anonymization Case Study 1: Randomizing Names and Addresses,” April 2007. [Download]
K. El Emam and G. Atherley, “Second Annual Electronic Health Information and Privacy Conference,” November 2006. [Download]
K. El Emam, “Overview of Factors Affecting the Risk of Re-Identification in Canada,” May 2006. [Download]
K. El Emam, “Data Anonymization Practices in Clinical Research: A Descriptive Study,” May 2006. [Download]
M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop,” December 2005. [Download]
M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop – Executive Summary,” December 2005. [Download]
K. El Emam, “Object-Oriented Metrics: A Review of Theory and Practice,” March 2001. [Download]
L. Briand, K. El Emam, B. Freimut, and O. Laitenberger, “A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content,” March 2001. [Download]
K. El Emam, “Description of the SWEBOK Knowledge Area Software Engineering Process,” March 2001. [Download]
B. Kitchenham, S. L. Pfleeger, L. Pickard, P. Jones, D. Hoaglin, K. El Emam, and J. Rosenberg, “Preliminary Guidelines for Empirical Research in Software Engineering,” January 2001. [Download]
S. Boodoo, K. El Emam, N. Madhavji, and O. Laitenberger, “The Optimal Team Size for UML Design Inspections,” September 2000. [Download]