{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:31:49Z","timestamp":1761006709341,"version":"build-2065373602"},"reference-count":28,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T00:00:00Z","timestamp":1161129600000},"content-version":"vor","delay-in-days":655,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2005,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>While libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996 the U.S. healthcare system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA), which is designed to provide those handling personal health information with standardized, definitive instructions as to the protection of data. In this work, the authors briefly discuss the present situation of privacy policies about library use data, outline the HIPAA guidelines to understand parallels between the two, and finally propose methods to create a de\u2010identified library data warehouse based on HIPAA for the protection of user privacy.<\/jats:p>","DOI":"10.1002\/meet.1450420106","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T10:44:40Z","timestamp":1161168280000},"source":"Crossref","is-referenced-by-count":1,"title":["Using lessons from health care to protect the privacy of library users: Guidelines for the de\u2010identification of library data based on HIPAA"],"prefix":"10.1002","volume":"42","author":[{"given":"Scott","family":"Nicholson","sequence":"first","affiliation":[]},{"given":"Catherine Arnott","family":"Smith","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,18]]},"reference":[{"key":"e_1_2_17_2_1","unstructured":"American Library Association. (2004a). Privacy Tool Kit: 1. Introduction. Retrieved September 22 2004 fromhttp:\/\/www.ala.org\/ala\/oif\/iftoolkits\/toolkitsprivacy\/introduction\/introduction.htm"},{"key":"e_1_2_17_3_1","unstructured":"American Library Association. (2004b). State Privacy Laws Regarding Library Records. Retrieved September 23 2004 fromhttp:\/\/www.ala.org\/Template.cfm?Section=stateifcinaction&Template=\/ContentManagement\/ContentDisplay.cfm&ContentID=14773"},{"issue":"6","key":"e_1_2_17_4_1","first-page":"3149","article-title":"The effect on the content of mental health records when psychiatric patients are permitted access pursuant to 'patient access' laws","volume":"53","author":"Burkhardt S.","year":"1992","journal-title":"Dissertation Abstracts International"},{"key":"e_1_2_17_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.51"},{"key":"e_1_2_17_6_1","unstructured":"Center for Disease Control and Prevention. (2003). Appendix A: Research Exempt under 45CFR46.101B. Retrieved December 3 2004 fromhttp:\/\/www.cdc.gov\/epo\/ads\/section\u2010iif.htm"},{"issue":"2","key":"e_1_2_17_7_1","first-page":"1","article-title":"Tools for Privacy Preserving Distributed Data Mining","volume":"4","author":"Clifton C.","year":"2004","journal-title":"ACM SIGKDD Explorations"},{"key":"e_1_2_17_8_1","unstructured":"Definitions 42 U.S.C. \u00a7 1320d(6) (2002)."},{"issue":"7","key":"e_1_2_17_9_1","first-page":"32","article-title":"To err is human\u2013so keep patient records in an online central database","volume":"11","author":"Gillette B.","year":"2001","journal-title":"Managed Healthcare Executive"},{"key":"e_1_2_17_10_1","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ajp.161.2.374"},{"issue":"2","key":"e_1_2_17_11_1","first-page":"78","article-title":"The right to know: Giving the patient his medical record","volume":"57","author":"Golodetz A.","year":"1976","journal-title":"Archives of Physical Medicine and Rehabilitation"},{"issue":"4","key":"e_1_2_17_12_1","first-page":"62","article-title":"Protecting patient privacy in clinical data mining","volume":"16","author":"Goodwin L. K.","year":"2002","journal-title":"Journal of Healthcare Information Management"},{"issue":"2","key":"e_1_2_17_13_1","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1176\/appi.psychotherapy.2001.55.2.157","article-title":"'Don't write me down': Legal, clinical, and risk\u2010management aspects of patients' requests that therapists not keep notes or records","volume":"55","author":"Gutheil T. G.","year":"2001","journal-title":"American Journal of Psychotherapy"},{"key":"e_1_2_17_14_1","unstructured":"Holland J.(2004). House may revive parts of Patriot Act II. Retrieved September 22 2004 fromhttp:\/\/www.guardian.co.uk\/worldlatest\/story\/0 1280 \u20104508884 00.html"},{"key":"e_1_2_17_15_1","unstructured":"Johnson S. B. andFriedman C.(1996).Integrating data from natural language processing into a clinical information system. Proceedings of the AMIA Fall Symposium 537\u2013541."},{"issue":"1","key":"e_1_2_17_16_1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/S0035-8819(25)02408-0","article-title":"Patient\u2010held records: censoring of information by doctors","volume":"21","author":"Jones R. B.","year":"1987","journal-title":"Journal of the Royal College of Physicians of London"},{"issue":"4","key":"e_1_2_17_17_1","first-page":"733","article-title":"Confidentiality of library records: A survey of problems, policies, and laws","volume":"81","author":"Kennedy B. M.","year":"1989","journal-title":"Law Library Journal"},{"key":"e_1_2_17_18_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJHTM.2004.004977"},{"key":"e_1_2_17_19_1","unstructured":"Lichtblau E.(2004 July 9 2004). Effort to Curb Scope of Antiterrorism Law Falls Short. New York Times p.16."},{"key":"e_1_2_17_20_1","first-page":"53","volume-title":"Computers in clinical medical education. In Conference on the Use of Computers in Medical Education","author":"Lindberg D. A.","year":"1968"},{"issue":"6","key":"e_1_2_17_21_1","first-page":"346","article-title":"Library records: A review of confidentiality laws and policies","volume":"11","author":"Million A.","year":"1986","journal-title":"Journal of Academic Librarianship"},{"key":"e_1_2_17_22_1","unstructured":"Murphy D.(2003 April 7 2003).Some Librarians Use Shredder to Show Opposition to New F.B.I. Powers. New York Times p.12."},{"issue":"1","key":"e_1_2_17_23_1","first-page":"26","article-title":"Privacy and confidentiality in digital reference","volume":"43","author":"Neuhaus P.","year":"2003","journal-title":"Reference & User Services Quarterly"},{"issue":"9","key":"e_1_2_17_24_1","first-page":"36","article-title":"Avoiding the Great Data\u2010Wipe of Ought\u2010Three","volume":"34","author":"Nicholson S.","year":"2003","journal-title":"American Libraries"},{"key":"e_1_2_17_25_1","unstructured":"AAMC Testimony on the Final HHS Privacy Regulations: Testimony before the Senate Committee on Health Education Labor and Pensions.(2001 February 8) (testimony of G.R. Smith). Retrieved November 24 2004 fromhttp:\/\/www.aamc.org\/advocacy\/library\/hipaa\/testimony\/2001\/020801.htm(American Association of Medical Colleges 2001)."},{"key":"e_1_2_17_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025151008571"},{"key":"e_1_2_17_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"e_1_2_17_28_1","unstructured":"Sweeney L.(2004 July 13 2004).HIPAA De\u2010idenitifcation Strategies for Hospitals. Paper presented at the Presentation at the Easing the Burden on Research: Practical Strategies for De\u2010Identifying Patient Data for Research and E\u2010Health Teleconference."},{"issue":"157","key":"e_1_2_17_29_1","article-title":"Standards for Privacy of Individually Identifiable Health Information: Other Requirements Relating to Uses and Disclosures of Protected Health Information, 45 CFR Parts 160 and 164","volume":"67","author":"U.S. Health and Human Services","year":"2002","journal-title":"Federal Register"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.1450420106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.1450420106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T09:55:40Z","timestamp":1760954140000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.1450420106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["10.1002\/meet.1450420106"],"URL":"https:\/\/doi.org\/10.1002\/meet.1450420106","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2005,1]]},"article-number":"meet.1450420106"}}