References
- 개인정보보호종합포털, 개인정보 비식별조치 가이드라인, https://www.privacy.go.kr/nns/ntc/selectBoardArticle.do?nttld=7186
- ISO, ISO/TS 25237, Health informatics - Pseudonymization, 2008
- lHE (Integrating the Healthcare Enterprise), IHE IT Infrasture Handbook, De-Identification, 2014.
- U.S. Department of Health & Human Services, Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health lnsurance Portability and Accountability Act (HIPAA) Privacy Rule, 2012.
- Shin, S.-Y. Lyu, Y. Shin, Y. Choi, H. J. Park, J. Kim, W.-S. and Lee, J. H. "Lessons Leamed from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital," Healthc. Inform. Res, Vol. 19, No. 2, pp.102-109, 2013. https://doi.org/10.4258/hir.2013.19.2.102
- Shin, S.-Y. Park, Y. R. Shin, Y. Choi, H. J.Park, J. Lyu, Y. Lee, M. S. Choi, C. M. Kim, W. S. and Lee, J. H. "A De-identification Method for Bilingual Clinical Texts of Various Note Types," J. Korean Med. Sci, Vol 30, No. 1, pp.7-15, 2015. https://doi.org/10.3346/jkms.2015.30.1.7
- Choi, H. J. Lee, M. J. Choi, C.-M. Lee, J. Shin, S.-Y. Lyu, Y. Park, Y. and Yoo, S. "Establishing the role of honest broker: bridging the gap between protecting personal health data and clinical research efficiency," PeerJ, Vol. 3, No. e1506, 2015. https://doi.org/10.7717/peerj.1506
- Barth-Jones, D. C. "The 'Re-Identification' of Governor William Weld's Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now," SSRN: https://ssrn.com/abstract=2076397, July 2012
- Gymrek, M. McGuire, AL. Golan, D. Halperin, E. Erlich, Y. "IdentifYing personal genomes by surname inference," Science, Vol. 339, No. 6117, pp.321-324, 2013. https://doi.org/10.1126/science.1229566
- Barth-Jones, D. C. "NCVHS Hearing: De-identification and HIPAA,'' http://www.ncvhs.hhs.gov/wp-content/uploads/2016/04/BARTH-JONES.pdf, May 24, 2016.
- El Emam, K. Jonker, E. Arbuckle, L. Malin, B. "A systematic review of re-identification attacks on health data," PLoS One, Vol. 6, No. e28071, 2011. https://doi.org/10.1371/journal.pone.0028071
- El Emam, K. Arbuckle, L. Koru, G. Eze, B. Gaudette, L. Neri, E. Rose, S. Howard, J. Gluck, J. "De-identification methods for open health data: the case of the Heritage Health Prize claims dataset," J. Med. Intemet Res. Vol. 14, No. e33, 2012.
- Erlich, Y. Narayanan, A. "Routes for breaching and protecting genetic privacy," Nat. Rev. Genet. Vol. 15, No 6, pp.409-421, 2014. https://doi.org/10.1038/nrg3723