{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:19:56Z","timestamp":1729635596516,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/bhi.2016.7455951","type":"proceedings-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T16:42:44Z","timestamp":1462380164000},"page":"529-532","source":"Crossref","is-referenced-by-count":2,"title":["A de-identification tool for users in medical operations and public health"],"prefix":"10.1109","author":[{"given":"Mark K","family":"Salloway","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yilin","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Shih Ling","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Chen","sequence":"additional","affiliation":[]},{"given":"G. Owen","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"Jacqueline Joon-Lin","family":"Chin","sequence":"additional","affiliation":[]},{"given":"E-Shyong","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Chuen Seng","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Google Search Deidentification Tool 2015","year":"2015","key":"ref10"},{"journal-title":"45 CFR 164 514 - Other requirements relating to uses and disclosures of protected health information Legal Information Institute","year":"2013","key":"ref11"},{"journal-title":"An Easy to Use Plug and Mask Tool for the Protection of Identifiers Proceedings of Global Healthcare Confrence 2015","year":"2015","author":"salloway","key":"ref12"},{"journal-title":"Ezy De-Identifier Tool Homepage","year":"2016","key":"ref13"},{"journal-title":"Shiny A web application framework for R","year":"2015","author":"chang","key":"ref14"},{"journal-title":"R Portable Software","year":"2015","author":"redd","key":"ref15"},{"journal-title":"Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule","year":"2012","key":"ref16"},{"journal-title":"HMAC Keyed-Hashing for Message Authentication","year":"1997","author":"krawczyk","key":"ref17"},{"journal-title":"45 CFR Parts 160 and 164 - Standards for Privacy of Individually Identifiable Health Information 2002 Federal Register","first-page":"53233","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/b14764"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-015-0202-2"},{"key":"ref3","article-title":"Making Big Data Usefulfor Health Care: A Summary of the Inaugural MIT Critical Data Conference","author":"celi","year":"2014","journal-title":"JMIR MEDICAL INFORMATICS-MIT Critical Data Conference 2014"},{"journal-title":"Anonymisation Managing Data Protection Risk Code of Practice","year":"2012","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8053"},{"key":"ref8","article-title":"RETRACTED: Syncope in Adults With Pulmonary Arterial Hypertension","volume":"59","author":"rachel","year":"2012","journal-title":"Journal of the American College of Cardiology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3414\/ME14-01-0133"},{"journal-title":"How Electronic Health Records Are Driving New Storage Challenges For Hospitals","year":"2010","key":"ref2"},{"journal-title":"What is an electronic health record (EHR)? 2015","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1055\/s-0038-1634166","article-title":"Influence of the method of data collection on the documentation of blood-pressure readings with an Anesthesia Information Management System (AIMS)","volume":"40","author":"benson m","year":"2001","journal-title":"Methods Inf Med"},{"journal-title":"Limited Datasets","year":"2015","key":"ref20"},{"key":"ref22","volume":"35","author":"davis","year":"1989","journal-title":"User Acceptance of Computer Technology A Comparison of Two Theoretical Models Management Science"},{"journal-title":"Data Use Agreement","year":"0","key":"ref21"},{"journal-title":"Data sharing code of practice","year":"2011","key":"ref23"}],"event":{"name":"2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","start":{"date-parts":[[2016,2,24]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,2,27]]}},"container-title":["2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)"],"original-title":[],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T04:59:59Z","timestamp":1567832399000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7455951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bhi.2016.7455951","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}