{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:12:13Z","timestamp":1742937133517,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031696503"},{"type":"electronic","value":"9783031696510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69651-0_5","type":"book-chapter","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:30:40Z","timestamp":1726126240000},"page":"67-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robin Hood: A De-identification Method to Preserve Minority Representation for Disparities Research"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9252-2559","authenticated-orcid":false,"given":"James Thomas","family":"Brown","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0308-4110","authenticated-orcid":false,"given":"Ellen W.","family":"Clayton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3217-4147","authenticated-orcid":false,"given":"Michael","family":"Matheny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9795-9063","authenticated-orcid":false,"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2471-5345","authenticated-orcid":false,"given":"Yevgeniy","family":"Vorobeychik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3040-5175","authenticated-orcid":false,"given":"Bradley A.","family":"Malin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"unstructured":"Bowen, C., Snoke, J.: Do No Harm Guide: Applying Equity Awareness in Data Privacy Methods. Urban Institute, Washington, DC (2023)","key":"5_CR1"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"S172","DOI":"10.1097\/MLR.0000000000001034","volume":"57","author":"H Xu","year":"2019","unstructured":"Xu, H., Zhang, N.: Privacy in health disparity research. Med. Care 57, S172 (2019). https:\/\/doi.org\/10.1097\/MLR.0000000000001034","journal-title":"Med. Care"},{"doi-asserted-by":"publisher","unstructured":"Fioretto, F., Tran, C., Van Hentenryck, P., Zhu, K.: Differential privacy and fairness in decisions and learning tasks: a survey. In: Proceedings of the Thirty-First IEEE International Joint Conference on Artificial Intelligence, July 2022, pp. 5470\u20135477 (2022). https:\/\/doi.org\/10.24963\/ijcai.2022\/766","key":"5_CR3","DOI":"10.24963\/ijcai.2022\/766"},{"issue":"9","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3390\/e23091165","volume":"23","author":"K Bhanot","year":"2021","unstructured":"Bhanot, K., Qi, M., Erickson, J.S., Guyon, I., Bennett, K.P.: The problem of fairness in synthetic healthcare data. Entropy 23(9), 1165 (2021). https:\/\/doi.org\/10.3390\/e23091165","journal-title":"Entropy"},{"issue":"4","key":"5_CR5","doi-asserted-by":"publisher","first-page":"2600","DOI":"10.2139\/ssrn.3662612","volume":"68","author":"H Xu","year":"2021","unstructured":"Xu, H., Zhang, N.: Implications of data anonymization on the statistical evidence of disparity. Manag. Sci. 68(4), 2600\u20132618 (2021). https:\/\/doi.org\/10.2139\/ssrn.3662612","journal-title":"Manag. Sci."},{"issue":"6609","key":"5_CR6","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1126\/science.abq4481","volume":"377","author":"R Steed","year":"2022","unstructured":"Steed, R., Liu, T., Wu, Z.S., Acquisti, A.: Policy impacts of statistical uncertainty and privacy. Science 377(6609), 928\u2013931 (2022)","journal-title":"Science"},{"doi-asserted-by":"publisher","unstructured":"Cheng, V., Suriyakumar, V.M., Dullerud, N., Joshi, S., Ghassemi, M.: Can you fake it until you make it? Impacts of differentially private synthetic data on downstream classification fairness. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, March 2021, pp. 149\u2013160. https:\/\/doi.org\/10.1145\/3442188.3445879","key":"5_CR7","DOI":"10.1145\/3442188.3445879"},{"issue":"18","key":"5_CR8","doi-asserted-by":"publisher","first-page":"eadl2524","DOI":"10.1126\/sciadv.adl2524","volume":"10","author":"CT Kenny","year":"2024","unstructured":"Kenny, C.T., McCartan, C., Kuriwaki, S., Simko, T., Imai, K.: Evaluating bias and noise induced by the US Census Bureau\u2019s privacy protection methods. Sci. Adv. 10(18), eadl2524 (2024)","journal-title":"Sci. Adv."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4\u201319 (2014). https:\/\/doi.org\/10.1016\/j.jbi.2014.06.002","journal-title":"J. Biomed. Inform."},{"issue":"5","key":"5_CR10","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K El Emam","year":"2009","unstructured":"El Emam, K., et al.: A globally optimal k-anonymity method for the de-identification of health data. J. Am. Med. Inform. Assoc. 16(5), 670\u2013682 (2009). https:\/\/doi.org\/10.1197\/jamia.M3144","journal-title":"J. Am. Med. Inform. Assoc."},{"doi-asserted-by":"crossref","unstructured":"Xia, W., Kantarcioglu, M., Wan, Z., Heatherly, R., Vorobeychik, Y., Malin, B.: Process-driven data privacy. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, October 2015, pp. 1021\u20131030 (2015)","key":"5_CR11","DOI":"10.1145\/2806416.2806580"},{"doi-asserted-by":"publisher","unstructured":"Becker, B., Kohavi, R.: Adult. UC Irvine (1996)https:\/\/doi.org\/10.24432\/C5XW20","key":"5_CR12","DOI":"10.24432\/C5XW20"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.ajhg.2016.12.002","volume":"100","author":"Z Wan","year":"2017","unstructured":"Wan, Z., Vorobeychik, Y., Xia, W., Clayton, E.W., Kantarcioglu, M., Malin, B.: Expanding access to large-scale genomic data while promoting privacy: a game theoretic approach. Am. J. Hum. Genet. 100(2), 316\u2013322 (2017). https:\/\/doi.org\/10.1016\/j.ajhg.2016.12.002","journal-title":"Am. J. Hum. Genet."},{"issue":"10","key":"5_CR14","doi-asserted-by":"publisher","first-page":"e0000102","DOI":"10.1371\/journal.pdig.0000102","volume":"1","author":"KP Seastedt","year":"2022","unstructured":"Seastedt, K.P., et al.: Global healthcare fairness: we should be sharing more, not less, data. PLOS Digital Health 1(10), e0000102 (2022). https:\/\/doi.org\/10.1371\/journal.pdig.0000102","journal-title":"PLOS Digital Health"},{"issue":"12","key":"5_CR15","doi-asserted-by":"publisher","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"KE Emam","year":"2011","unstructured":"Emam, K.E., Jonker, E., Arbuckle, L., Malin, B.: A Systematic review of re-identification attacks on health data. PLoS ONE 6(12), e28071 (2011). https:\/\/doi.org\/10.1371\/journal.pone.0028071","journal-title":"PLoS ONE"},{"doi-asserted-by":"crossref","unstructured":"Dankar, F.K., El Emam, K.: A method for evaluating marketer re-identification risk. In: Proceedings of the 2010 EDBT\/ICDT Workshops, pp. 1\u201310 (2010)","key":"5_CR16","DOI":"10.1145\/1754239.1754271"},{"doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering, p. 24 (2006). https:\/\/doi.org\/10.1109\/ICDE.2006.1","key":"5_CR17","DOI":"10.1109\/ICDE.2006.1"},{"issue":"6654","key":"5_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1126\/science.adh4260","volume":"381","author":"J Zou","year":"2023","unstructured":"Zou, J., Gichoya, J.W., Ho, D.E., Obermeyer, Z.: Implications of predicting race variables from medical images. Science 381(6654), 149\u2013150 (2023). https:\/\/doi.org\/10.1126\/science.adh4260","journal-title":"Science"},{"issue":"2","key":"5_CR19","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TKDE.2008.129","volume":"21","author":"A Gionis","year":"2009","unstructured":"Gionis, A., Tassa, T.: K-Anonymization with minimal loss of information. IEEE Trans. Knowl. Data Eng. 21(2), 206\u2013219 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69651-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:31:49Z","timestamp":1726126309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69651-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031696503","9783031696510"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69651-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antibes Juan-les-Pins","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}