{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:28:53Z","timestamp":1771050533658,"version":"3.50.1"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100000092","name":"National Library of Medicine","doi-asserted-by":"crossref","award":["R01LM011366"],"award-info":[{"award-number":["R01LM011366"]}],"id":[{"id":"10.13039\/100000092","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000092","name":"National Library of Medicine","doi-asserted-by":"crossref","award":["R01LM009989"],"award-info":[{"award-number":["R01LM009989"]}],"id":[{"id":"10.13039\/100000092","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000051","name":"National Human Genome Research Institute","doi-asserted-by":"publisher","award":["U01HG006385"],"award-info":[{"award-number":["U01HG006385"]}],"id":[{"id":"10.13039\/100000051","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000051","name":"National Human Genome Research Institute","doi-asserted-by":"publisher","award":["U01HG006378"],"award-info":[{"award-number":["U01HG006378"]}],"id":[{"id":"10.13039\/100000051","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006108","name":"National Center for Advancing Translational Sciences","doi-asserted-by":"publisher","award":["U54TR000123"],"award-info":[{"award-number":["U54TR000123"]}],"id":[{"id":"10.13039\/100006108","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0424422"],"award-info":[{"award-number":["CCF-0424422"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Biomedical Informatics"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1016\/j.jbi.2016.03.019","type":"journal-article","created":{"date-parts":[[2016,3,26]],"date-time":"2016-03-26T11:51:56Z","timestamp":1458993116000},"page":"97-109","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["Optimizing annotation resources for natural language de-identification via a game theoretic framework"],"prefix":"10.1016","volume":"61","author":[{"given":"Muqun","family":"Li","sequence":"first","affiliation":[]},{"given":"David","family":"Carrell","sequence":"additional","affiliation":[]},{"given":"John","family":"Aberdeen","sequence":"additional","affiliation":[]},{"given":"Lynette","family":"Hirschman","sequence":"additional","affiliation":[]},{"given":"Jacqueline","family":"Kirby","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yevgeniy","family":"Vorobeychik","sequence":"additional","affiliation":[]},{"given":"Bradley A.","family":"Malin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jbi.2016.03.019_b0005","unstructured":"Office of the National Coordinator for Health Information Technology, Adoption of Electronic Health Record Systems Among US Non-Federal Acute Care Hospitals: 2008\u20132012, U.S. Department of Health and Human Services, 2013."},{"issue":"3","key":"10.1016\/j.jbi.2016.03.019_b0010","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1136\/amiajnl-2010-000010","article-title":"Electronic health records in small physician practices: availability, use, and perceived benefits","volume":"18","author":"Rao","year":"2011","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0015","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1197\/jamia.M1097","article-title":"A proposal for electronic medical records in US primary care","volume":"10","author":"Bates","year":"2003","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0020","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/S0002-9343(03)00057-3","article-title":"A cost-benefit analysis of electronic medical records in primary care","volume":"114","author":"Wang","year":"2003","journal-title":"Am. J. Med."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0025","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1377\/hlthaff.24.5.1103","article-title":"Can electronic medical record systems transform health care? Potential health benefits, savings, and costs","volume":"24","author":"Hillestad","year":"2005","journal-title":"Health Affair"},{"key":"10.1016\/j.jbi.2016.03.019_b0030","unstructured":"R.R. German, L.M. Lee, J.M. Horan, R. Milstein, C. Pertowski, M. Waller, Updated Guidelines for Evaluating Public Health Surveillance Systems: Recommendations from the Guidelines Working Group, MMWR. Recommendations and Reports: Morbidity and Mortality Weekly Report. Recommendations and Reports\/Centers for Disease Control., vol. 50(RR-13), 2001, pp. 1\u201335."},{"issue":"2","key":"10.1016\/j.jbi.2016.03.019_b0035","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jbi.2004.03.002","article-title":"Fever detection from free-text clinical records for biosurveillance","volume":"37","author":"Chapman","year":"2004","journal-title":"J. Biomed. Inform."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0040","doi-asserted-by":"crossref","DOI":"10.1136\/amiajnl-2011-000163","article-title":"A study of machine-learning-based approaches to extract clinical entities and their assertions from discharge summaries","volume":"18","author":"Jiang","year":"2011","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"e1","key":"10.1016\/j.jbi.2016.03.019_b0045","doi-asserted-by":"crossref","first-page":"e147","DOI":"10.1136\/amiajnl-2012-000896","article-title":"Validation of electronic medical record-based phenotyping algorithms: results and lessons learned from the eMERGE network","volume":"20","author":"Newton","year":"2013","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0050","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1186\/1755-8794-4-13","article-title":"The eMERGE Network: a consortium of biorepositories linked to electronic medical records data for conducting genomic studies","volume":"4","author":"McCarty","year":"2011","journal-title":"BMC Med. Genomics"},{"key":"10.1016\/j.jbi.2016.03.019_b0055","unstructured":"National Institutes of Health (NIH), \u201cFinal NIH Statement on Sharing Research Data. NOT-OD-03-032,\u201d; February 26, 2003."},{"issue":"12","key":"10.1016\/j.jbi.2016.03.019_b0060","article-title":"A systematic review of re-identification attacks on health data","volume":"6","author":"Emam","year":"2011","journal-title":"PLoS ONE"},{"issue":"2","key":"10.1016\/j.jbi.2016.03.019_b0065","first-page":"1","article-title":"Primary care physicians\u2019 experience with electronic medical records: barriers to implementation in a fee-for-service environment","volume":"2009","author":"Ludwick","year":"2009","journal-title":"Int. J. Telemed. Appl."},{"key":"10.1016\/j.jbi.2016.03.019_b0070","unstructured":"Office for Civil Rights, U.S. Department of Health and Human Services, \u201cStandards for Privacy and Individually Identifiable Health Information. Final rule\u201d, vol. 67(157), 2002, pp. 53181\u201353273."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0075","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1136\/amiajnl-2011-000465","article-title":"Overcoming barriers to NLP for clinical text: the role of shared tasks and the need for additional creative solutions","volume":"18","author":"Chapman","year":"2011","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"3","key":"10.1016\/j.jbi.2016.03.019_b0080","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1055\/s-0038-1634080","article-title":"Assessing the difficulty and time cost of de-identification in clinical narratives","volume":"45","author":"Dorr","year":"2006","journal-title":"Methods Inf. Med."},{"issue":"12","key":"10.1016\/j.jbi.2016.03.019_b0085","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.ijmedinf.2010.09.007","article-title":"The MITRE identification Scrubber Toolkit: design, training, and assessment","volume":"79","author":"Aberdeen","year":"2010","journal-title":"Int. J. Med. Informatics"},{"issue":"12","key":"10.1016\/j.jbi.2016.03.019_b0090","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1016\/j.datak.2009.07.006","article-title":"An integrated framework for de-identifying unstructured medical data","volume":"68","author":"Gardner","year":"2009","journal-title":"Data Knowl. Eng."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0095","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1197\/jamia.M2441","article-title":"State-of-the-art anonymisation of medical records using an iterative machine learning framework","volume":"14","author":"Szarvas","year":"2007","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0100","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1136\/amiajnl-2012-001020","article-title":"BoB, a best-of-breed automated text de-identification system for VHA clinical documents","volume":"20","author":"Ferr\u00e1ndez","year":"2013","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0105","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1186\/1471-2288-10-70","article-title":"Automatic de-identification of textual documents in the electronic health record: a review of recent research","volume":"10","author":"Meystre","year":"2010","journal-title":"BMC Med. Res. Methodol."},{"issue":"2","key":"10.1016\/j.jbi.2016.03.019_b0110","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1136\/amiajnl-2012-001034","article-title":"Hiding in plain sight: use of realistic surrogates to reduce exposure of protected health information in clinical text","volume":"20","author":"Carrell","year":"2013","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/j.jbi.2016.03.019_b0115","first-page":"128","article-title":"Extracting information from textual documents in the electronic health record: a review of recent research","volume":"35","author":"Meystre","year":"2008","journal-title":"Yearbook Med. Inform."},{"key":"10.1016\/j.jbi.2016.03.019_b0120","series-title":"Proceedings of the AMIA Symposium","first-page":"757","article-title":"Identification of patient name references within medical documents using semantic selectional restrictions","author":"Taira","year":"2002"},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0125","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.artmed.2007.10.001","article-title":"A de-identifier for medical discharge summaries","volume":"42","author":"Uzuner","year":"2008","journal-title":"Artif. Intell. Med."},{"issue":"1","key":"10.1016\/j.jbi.2016.03.019_b0130","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1136\/amiajnl-2012-001012","article-title":"Large-scale evaluation of automated clinical note de-identification and its impact on information extraction","volume":"20","author":"Deleger","year":"2013","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0135","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1197\/jamia.M2435","article-title":"Rapidly retargetable approaches to de-identification in medical records","volume":"14","author":"Wellner","year":"2007","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0140","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1197\/jamia.M2444","article-title":"Evaluating the state-of-the-art in automatic de-identification","volume":"14","author":"Uzuner","year":"2007","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"5","key":"10.1016\/j.jbi.2016.03.019_b0145","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1093\/jamia\/ocu004","article-title":"Normalization of relative and incomplete temporal expressions in clinical narratives","volume":"22","author":"Sun","year":"2015","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"Supplement","key":"10.1016\/j.jbi.2016.03.019_b0150","doi-asserted-by":"crossref","first-page":"S11","DOI":"10.1016\/j.jbi.2015.06.007","article-title":"Automated systems for the de-identification of longitudinal clinical narratives: overview of 2014 i2b2\/UTHealth shared task Track 1","volume":"58","author":"Stubbs","year":"2015","journal-title":"J. Biomed. Inform."},{"issue":"Supplement","key":"10.1016\/j.jbi.2016.03.019_b0155","doi-asserted-by":"crossref","first-page":"S20","DOI":"10.1016\/j.jbi.2015.07.020","article-title":"Annotating longitudinal clinical narratives for de-identification: the 2014 i2b2\/UTHealth corpus","volume":"58","author":"Stubbs","year":"2015","journal-title":"J. Biomed. Inform."},{"key":"10.1016\/j.jbi.2016.03.019_b0160","article-title":"Online information privacy: measuring the cost-benefit trade-off","volume":"vol. 1","author":"Hann","year":"2002"},{"issue":"2","key":"10.1016\/j.jbi.2016.03.019_b0165","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1086\/671754","article-title":"What is privacy worth?","volume":"42","author":"Acquisti","year":"2013","journal-title":"J. Legal Stud."},{"key":"10.1016\/j.jbi.2016.03.019_b0170","series-title":"Proceedings of the 27th International Conference on Information Systems","first-page":"94","article-title":"Is there a cost to privacy breaches? An event study","author":"Acquisti","year":"2006"},{"key":"10.1016\/j.jbi.2016.03.019_b0175","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jbi.2014.04.012","article-title":"Quantifying the costs and benefits of privacy-preserving health data publishing","volume":"50","author":"Khokhar","year":"2014","journal-title":"J. Biomed. Inform."},{"issue":"3","key":"10.1016\/j.jbi.2016.03.019_b0180","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2480741.2480742","article-title":"Game theory meets network security and privacy","volume":"45","author":"Manshaei","year":"2013","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jbi.2016.03.019_b0185","first-page":"895","article-title":"Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games","volume":"vol. 2","author":"Paruchuri","year":"2008"},{"key":"10.1016\/j.jbi.2016.03.019_b0190","series-title":"Proceedings of the Workshops of the IEEE International Conference on Data Mining","first-page":"25","article-title":"A game theoretical model for adversarial learning","author":"Liu","year":"2009"},{"key":"10.1016\/j.jbi.2016.03.019_b0195","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-642-17197-0_5","article-title":"When do firms invest in privacy-preserving technologies?","author":"Kantarcioglu","year":"2010","journal-title":"Decis. Game Theory Security"},{"key":"10.1016\/j.jbi.2016.03.019_b0200","series-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM","first-page":"547","article-title":"Stackelberg games for adversarial prediction problems","author":"Br\u00fcckner","year":"2011"},{"key":"10.1016\/j.jbi.2016.03.019_b0205","series-title":"Privacy Identity Manage. Life","first-page":"41","article-title":"Using game theory to analyze risk to privacy: an initial insight","author":"Rajbhandari","year":"2011"},{"key":"10.1016\/j.jbi.2016.03.019_b0210","series-title":"Proceedings of the Twenty-Third international Joint Conference on Artificial Intelligence","first-page":"41","article-title":"Audit games","author":"Blocki","year":"2013"},{"issue":"3","key":"10.1016\/j.jbi.2016.03.019_b0215","doi-asserted-by":"crossref","first-page":"e0120592","DOI":"10.1371\/journal.pone.0120592","article-title":"A game theoretic framework for analyzing re-identification risk","volume":"10","author":"Wan","year":"2015","journal-title":"PLoS ONE"},{"key":"10.1016\/j.jbi.2016.03.019_b0220","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.jbi.2014.01.014","article-title":"Preparing an annotated gold standard corpus to share with extramural investigators for de-identification research","volume":"50","author":"Deleger","year":"2014","journal-title":"J. Biomed. Inform."},{"issue":"2","key":"10.1016\/j.jbi.2016.03.019_b0225","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1136\/jamia.2009.002212","article-title":"Effects of personal identifier resynthesis on clinical text de-identification","volume":"17","author":"Yeniterzi","year":"2010","journal-title":"J. Am. Med. Inform. Assoc."}],"container-title":["Journal of Biomedical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046416300107?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046416300107?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T17:54:49Z","timestamp":1690048489000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046416300107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":45,"alternative-id":["S1532046416300107"],"URL":"https:\/\/doi.org\/10.1016\/j.jbi.2016.03.019","relation":{},"ISSN":["1532-0464"],"issn-type":[{"value":"1532-0464","type":"print"}],"subject":[],"published":{"date-parts":[[2016,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimizing annotation resources for natural language de-identification via a game theoretic framework","name":"articletitle","label":"Article Title"},{"value":"Journal of Biomedical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jbi.2016.03.019","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc.","name":"copyright","label":"Copyright"}]}}