{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T04:28:20Z","timestamp":1726288100826},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979151"},{"type":"electronic","value":"9783319979168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97916-8_12","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:13:24Z","timestamp":1532520804000},"page":"174-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Anatomy of the HIPAA Privacy Rule: A Risk-Based Approach as a Remedy for Privacy-Preserving Data Sharing"],"prefix":"10.1007","author":[{"given":"Makoto","family":"Iguchi","sequence":"first","affiliation":[]},{"given":"Taro","family":"Uematsu","sequence":"additional","affiliation":[]},{"given":"Tatsuro","family":"Fujii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"key":"12_CR1","unstructured":"ISO\/IEC 27005:2011: Information technology - Security techniques - Information security risk management. Standard, International Organization for Standardization (ISO) (2011)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ross, R.S.: Nist sp 800\u201330 rev. 1: Guide for conducting risk assessments. Technical report (2012). \nhttps:\/\/dx.doi.org\/10.6028\/NIST.SP.800-30r1","DOI":"10.6028\/NIST.SP.800-30r1"},{"key":"12_CR3","unstructured":"Open Web Application Security Project (OWASP): Owasp risk rating methodology (2016). \nhttps:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L.: Nistir 8053: De-identification of personal information. Technical report, October 2015. \nhttps:\/\/doi.org\/10.6028\/nist.ir.8053","DOI":"10.6028\/NIST.IR.8053"},{"key":"12_CR5","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s (CNIL): Methodology for Privacy Risk Management, Translation of June 2012 edition (2012)"},{"key":"12_CR6","unstructured":"Information Commissioner\u2019s Office (ICO): Conducting Privacy Impact Assessments Code of Practice (2014)"},{"key":"12_CR7","unstructured":"ISO\/IEC 29134:2017: Information technology - Security techniques - Guidelines for privacy impact assessment. Standard, International Organization for Standardization (ISO) (2017)"},{"key":"12_CR8","unstructured":"Information and Privacy Commissioner of Ontario: De-identification Guidelines for Structured Data (2016)"},{"key":"12_CR9","unstructured":"El Emam, K., Arbuckle, L.: Anonymizing Health Data: Case Studies and Methods to Get You Started, 1st edn. O\u2019Reilly Media, Inc. (2013)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 111\u2013125, May 2008","DOI":"10.1109\/SP.2008.33"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187, May 2009","DOI":"10.1109\/SP.2009.22"},{"issue":"6221","key":"12_CR12","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"YA Montjoye de","year":"2015","unstructured":"de Montjoye, Y.A., Radaelli, L., Singh, V., Pentland, A.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536\u2013539 (2015)","journal-title":"Science"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing nyc taxi data: Does it matter? In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 140\u2013148, October 2016","DOI":"10.1109\/DSAA.2016.21"},{"key":"12_CR14","unstructured":"European Commission Article 29 Data Protection Working Party: Opinion 05\/2014 on Anonymisation Techniques (2014)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"10562","DOI":"10.1109\/ACCESS.2017.2706947","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562\u201310582 (2017)","journal-title":"IEEE Access"},{"key":"12_CR16","volume-title":"The Anonymisation Decision Making Framework","author":"M Elliot","year":"2016","unstructured":"Elliot, M., Mackey, E., O\u2019Hara, K., Tudor, C.: The Anonymisation Decision Making Framework. UKAN, United Kingdom (2016)"},{"key":"12_CR17","unstructured":"U.S. Department of Health & Human Services, Office for Civil Rights: Health information privacy (2015). \nhttps:\/\/www.hhs.gov\/hipaa\/index.html"},{"key":"12_CR18","unstructured":"Chesanow, N.: Is hipaa creating more problems than it\u2019s preventing? (2013). \nhttps:\/\/www.medscape.com\/viewarticle\/810648"},{"key":"12_CR19","unstructured":"U.S. Department of Health & Human Services, Office for Civil Rights: Guidance on hipaa & cloud computing (2017). \nhttps:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/cloud-computing\/index.html"},{"key":"12_CR20","unstructured":"U.S. Department of Health & Human Services, Office for Civil Rights: Guidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (hipaa) privacy rule (2015). \nhttps:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html"},{"issue":"2","key":"12_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1136\/jamia.2009.000026","volume":"17","author":"K Benitez","year":"2010","unstructured":"Benitez, K., Malin, B.: Evaluating re-identification risks with respect to the hipaa privacy rule. J. Am. Med. Inf. Assoc. 17(2), 169\u2013177 (2010)","journal-title":"J. Am. Med. Inf. Assoc."}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97916-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:18:50Z","timestamp":1532521130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97916-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979151","9783319979168"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97916-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}