{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:29:30Z","timestamp":1766888970099,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1754239.1754271","type":"proceedings-article","created":{"date-parts":[[2010,4,2]],"date-time":"2010-04-02T14:50:55Z","timestamp":1270219855000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A method for evaluating marketer re-identification risk"],"prefix":"10.1145","author":[{"given":"Fida Kamal","family":"Dankar","sequence":"first","affiliation":[{"name":"CHEO Research Institute, Ottawa, ON, Canada"}]},{"given":"Khaled","family":"El Emam","sequence":"additional","affiliation":[{"name":"CHEO Research Institute &amp; University of Ottawa, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2273"},{"key":"e_1_3_2_1_2_1","unstructured":"\"Transforming healthcare through secondary use of health data \" PriceWaterhouseCoopers 2009. \"Transforming healthcare through secondary use of health data \" PriceWaterhouseCoopers 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_1_4_1","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"Dalenius T.","year":"1986","unstructured":"T. Dalenius , \" Finding a needle in a haystack or identifying anonymous census records ,\" Journal of Official Statistics , vol. 2 , pp. 329 -- 336 , 1986 . T. Dalenius, \"Finding a needle in a haystack or identifying anonymous census records,\" Journal of Official Statistics, vol. 2, pp. 329--336, 1986.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_5_1","article-title":"Evaluating Predictors of Geographic Area Population Size Cutoffs to Manage Re-identification Risk","volume":"2008","author":"Emam K. El","unstructured":"K. El Emam , A. Brown , and P. Abdelmalik , \" Evaluating Predictors of Geographic Area Population Size Cutoffs to Manage Re-identification Risk ,\" Journal of the American Medical Informatics Association , vol. (accepted), 2008 . K. El Emam, A. Brown, and P. Abdelmalik, \"Evaluating Predictors of Geographic Area Population Size Cutoffs to Manage Re-identification Risk,\" Journal of the American Medical Informatics Association, vol. (accepted), 2008.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.8.4.e28"},{"key":"e_1_3_2_1_7_1","volume-title":"Pan-Canadian De-Identification Guidelines for Personal Health Information (report prepared for the Office of the Privacy Commissioner of Canada)","author":"Emam K. El","year":"2007","unstructured":"K. El Emam , E. Jonker , S. Sams , E. Neri , A. Neisa , T. Gao , and S. Chowdhury , \" Pan-Canadian De-Identification Guidelines for Personal Health Information (report prepared for the Office of the Privacy Commissioner of Canada) ,\" 2007 . K. El Emam, E. Jonker, S. Sams, E. Neri, A. Neisa, T. Gao, and S. Chowdhury, \"Pan-Canadian De-Identification Guidelines for Personal Health Information (report prepared for the Office of the Privacy Commissioner of Canada),\" 2007."},{"key":"e_1_3_2_1_8_1","unstructured":"Canadian Institutes of Health Research \"CIHR best practices for protecting privacy in health research \" Canadian Institutes of Health Research 2005. Canadian Institutes of Health Research \"CIHR best practices for protecting privacy in health research \" Canadian Institutes of Health Research 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Pseudonymization","author":"TS","year":"2008","unstructured":"ISO\/ TS 25237, \" Health Informatics : Pseudonymization ,\" 2008 . ISO\/TS 25237, \"Health Informatics: Pseudonymization,\" 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.2009.000026"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2005.25"},{"key":"e_1_3_2_1_13_1","first-page":"307","article-title":"Evaluating patient re-identification risk from hospital prescription records","volume":"62","author":"Emam K. El","year":"2009","unstructured":"K. El Emam , F. K. Dankar , R. Vaillancourt , T. Roffey , and M. Lysyk , \" Evaluating patient re-identification risk from hospital prescription records ,\" Canadian Journal of Hospital Pharmacy , vol. 62 , pp. 307 -- 319 , 2009 . K. El Emam, F. K. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk, \"Evaluating patient re-identification risk from hospital prescription records,\" Canadian Journal of Hospital Pharmacy, vol. 62, pp. 307--319, 2009.","journal-title":"Canadian Journal of Hospital Pharmacy"},{"key":"e_1_3_2_1_14_1","unstructured":"National Institutes of Health \"Policy for Sharing of Data Obtained in NIH Supported or Conducted Genome-Wide Association Studies (GWAS) \". vol. NOT-OD-07-088 2007. National Institutes of Health \"Policy for Sharing of Data Obtained in NIH Supported or Conducted Genome-Wide Association Studies (GWAS) \". vol. NOT-OD-07-088 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"Do clinical profiles constitute privacy risks for research participants?,\" in Proceedings of the AMIA Symposium","author":"Loukides G.","year":"2009","unstructured":"G. Loukides , J. Denny , and B. Malin , \" Do clinical profiles constitute privacy risks for research participants?,\" in Proceedings of the AMIA Symposium , 2009 . G. Loukides, J. Denny, and B. Malin, \"Do clinical profiles constitute privacy risks for research participants?,\" in Proceedings of the AMIA Symposium, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77322-3","volume-title":"Insider attack and cyber security: Springer_verlag","author":"Stolfo S.","year":"2008","unstructured":"S. Stolfo , S. Bellovin , S. Herkshop , A. Keromytis , S. Sinclair , and S. Smith , Insider attack and cyber security: Springer_verlag , 2008 . S. Stolfo, S. Bellovin, S. Herkshop, A. Keromytis, S. Sinclair, and S. Smith, Insider attack and cyber security: Springer_verlag, 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,\" in Carnegie Mellon University and the United States Secret Service","author":"Kowalski E.","year":"2008","unstructured":"E. Kowalski , D. Cappelli , and A. Moore , \" Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,\" in Carnegie Mellon University and the United States Secret Service , 2008 . E. Kowalski, D. Cappelli, and A. Moore, \"Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,\" in Carnegie Mellon University and the United States Secret Service, 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,\" in Carnegie Mellon University and the United States Secret Service","author":"Randazzo M.","year":"2004","unstructured":"M. Randazzo , M. Keeney , E. Kowalski , D. Cappelli , and A. Moore , \" Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,\" in Carnegie Mellon University and the United States Secret Service , 2004 . M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, \"Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,\" in Carnegie Mellon University and the United States Secret Service, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,\" in Carnegie Mellon University and the United States Secret Service","author":"Keeney M.","year":"2005","unstructured":"M. Keeney , E. Kowalski , D. Cappelli , A. Moore , T. Shimeall , and S. Rogers , \" Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,\" in Carnegie Mellon University and the United States Secret Service , 2005 . M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers, \"Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,\" in Carnegie Mellon University and the United States Secret Service, 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Insider Threat Study: Illicit Cyber Activity in the Government Sector,\" in Carnegie Mellon University and the United States Secret Service","author":"Kowalski E.","year":"2008","unstructured":"E. Kowalski , T. Conway , S. Keverline , M. Williams , D. Cappelli , B. Willke , and A. Moore , \" Insider Threat Study: Illicit Cyber Activity in the Government Sector,\" in Carnegie Mellon University and the United States Secret Service , 2008 . E. Kowalski, T. Conway, S. Keverline, M. Williams, D. Cappelli, B. Willke, and A. Moore, \"Insider Threat Study: Illicit Cyber Activity in the Government Sector,\" in Carnegie Mellon University and the United States Secret Service, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Security of Patient","author":"Solutions Kroll Fraud","year":"2008","unstructured":"Kroll Fraud Solutions , \" HIMSS Analytics Report : Security of Patient \", 2008 . Kroll Fraud Solutions, \"HIMSS Analytics Report: Security of Patient\", 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"Carnegie Mellon University, and Microsoft Corporation","author":"Magazine CSO","year":"2006","unstructured":"CSO Magazine , \"2006 e-crime watch survey,\" US Secret Service , Carnegie Mellon University, and Microsoft Corporation 2006 . CSO Magazine, \"2006 e-crime watch survey,\" US Secret Service, Carnegie Mellon University, and Microsoft Corporation 2006."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.87"},{"key":"e_1_3_2_1_24_1","unstructured":"CSI \"14th Annual CSI Computer Crime and Security Survey \" 2009. CSI \"14th Annual CSI Computer Crime and Security Survey \" 2009."},{"key":"e_1_3_2_1_25_1","unstructured":"Ponemon Institute \"Data loss risks during downsizing \" 2009. Ponemon Institute \"Data loss risks during downsizing \" 2009."},{"key":"e_1_3_2_1_26_1","unstructured":"Verizon Business Risk Team \"2009 data breach investigations report \" 2009. Verizon Business Risk Team \"2009 data breach investigations report \" 2009."},{"key":"e_1_3_2_1_27_1","volume-title":"Findings from the 2008 global state of information security study","author":"Safeguarding","year":"2008","unstructured":"PriceWaterhouseCoopers, \" Safeguarding the new currency of business : Findings from the 2008 global state of information security study ,\" 2008 . PriceWaterhouseCoopers, \"Safeguarding the new currency of business: Findings from the 2008 global state of information security study,\" 2008."},{"key":"e_1_3_2_1_28_1","volume-title":"The data breach analyzer","author":"El Emam K.","year":"2009","unstructured":"K. El Emam and M. King , \" The data breach analyzer ,\" 2009 , {Available at: http:\/\/www.ehealthinformation.ca\/dataloss}. K. El Emam and M. King, \"The data breach analyzer,\" 2009, {Available at: http:\/\/www.ehealthinformation.ca\/dataloss}."},{"key":"e_1_3_2_1_29_1","volume-title":"The insider Threat to Information Systems,\" Department of Defense Security Institute","author":"Shaw E.","year":"1998","unstructured":"E. Shaw , K. Ruby , and M. Jerrold , \" The insider Threat to Information Systems,\" Department of Defense Security Institute 1998 . E. Shaw, K. Ruby, and M. Jerrold, \"The insider Threat to Information Systems,\" Department of Defense Security Institute 1998."},{"key":"e_1_3_2_1_30_1","unstructured":"S. Bell \"Alleged LTTE front had voter lists \" in National Post 2006. S. Bell \"Alleged LTTE front had voter lists \" in National Post 2006."},{"key":"e_1_3_2_1_31_1","unstructured":"S. Bell \"Privacy chief probes how group got voter lists \" in National Post 2006. S. Bell \"Privacy chief probes how group got voter lists \" in National Post 2006."},{"key":"e_1_3_2_1_32_1","volume-title":"May 7","author":"Freeze C.","year":"2008","unstructured":"C. Freeze and C. Clark , \" Voters lists 'most disturbing' items seized in Tamil raids, documents say,\" in Globe and Mail , May 7 , 2008 . C. Freeze and C. Clark, \"Voters lists 'most disturbing' items seized in Tamil raids, documents say,\" in Globe and Mail, May 7, 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025666923033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029202"},{"key":"e_1_3_2_1_35_1","volume-title":"Individual risk of disclosure using sampling design information,\" Istituto nazionale di statistica (Italy)","author":"Benedetti R.","year":"2003","unstructured":"R. Benedetti , A. Capobianchi , and L. Franconi , \" Individual risk of disclosure using sampling design information,\" Istituto nazionale di statistica (Italy) 2003 . R. Benedetti, A. Capobianchi, and L. Franconi, \"Individual risk of disclosure using sampling design information,\" Istituto nazionale di statistica (Italy) 2003."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214507000001328"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1990.10475304"},{"key":"e_1_3_2_1_38_1","unstructured":"Y. Rinott \"On models for statistical disclosure risk estimation \" Joint ECE\/Eurostat Working Session on Statistical Data Confidentiality 2003. Y. Rinott \"On models for statistical disclosure risk estimation \" Joint ECE\/Eurostat Working Session on Statistical Data Confidentiality 2003."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1080\/00031305.1981.10479334","article-title":"The Moment Generating Function and Negative Integer Moments","volume":"35","author":"Cressie N.","year":"1981","unstructured":"N. Cressie , A. S. Davis , J. Folks , and G. E. Policello , \" The Moment Generating Function and Negative Integer Moments ,\" American Statistician , vol. 35 , pp. 148 -- 150 , 1981 . N. Cressie, A. S. Davis, J. Folks, and G. E. Policello, \"The Moment Generating Function and Negative Integer Moments,\" American Statistician, vol. 35, pp. 148--150, 1981.","journal-title":"American Statistician"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1998.10473807"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwk049"},{"key":"e_1_3_2_1_42_1","volume-title":"Unique record identification on public use files as tested on the 1994--1998 CINA analytic file,\" North American Association of Central Cancer Registries","author":"Howe H.","year":"2002","unstructured":"H. Howe , A. Lake , M. Lehnherr , and D. Roney , \" Unique record identification on public use files as tested on the 1994--1998 CINA analytic file,\" North American Association of Central Cancer Registries 2002 . H. Howe, A. Lake, M. Lehnherr, and D. Roney, \"Unique record identification on public use files as tested on the 1994--1998 CINA analytic file,\" North American Association of Central Cancer Registries 2002."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.84"},{"key":"e_1_3_2_1_44_1","unstructured":"S. Polsky \"Witness statement to the Standing Senate Committee on Legal and Constitutional Affairs \" Parliament of Canada 2007. S. Polsky \"Witness statement to the Standing Senate Committee on Legal and Constitutional Affairs \" Parliament of Canada 2007."},{"key":"e_1_3_2_1_45_1","unstructured":"Symantec \"Symantec Global Internet Threat Report - Trends for July-December 07 \" Symantec Enterprise Security 2008. Symantec \"Symantec Global Internet Threat Report - Trends for July-December 07 \" Symantec Enterprise Security 2008."},{"key":"e_1_3_2_1_46_1","unstructured":"Symantec \"What is the underground economy? \" 2009 {Available at: http:\/\/www.everyclickmatters.com\/victim\/assessment-tool.html}. Symantec \"What is the underground economy? \" 2009 {Available at: http:\/\/www.everyclickmatters.com\/victim\/assessment-tool.html}."},{"key":"e_1_3_2_1_47_1","volume-title":"Your secrets for sale,\" in Daily Express","author":"Luck N.","year":"1994","unstructured":"N. Luck and J. Burns , \" Your secrets for sale,\" in Daily Express , 1994 . N. Luck and J. Burns, \"Your secrets for sale,\" in Daily Express, 1994."},{"key":"e_1_3_2_1_48_1","first-page":"2","article-title":"For sale: Your secret medical record for 150","author":"Rogers L.","year":"1995","unstructured":"L. Rogers and D. Leppard , \" For sale: Your secret medical record for 150 ,\" in Sunday Times , 1995 , p. 2 . L. Rogers and D. Leppard, \"For sale: Your secret medical record for 150,\" in Sunday Times, 1995, p. 2.","journal-title":"Sunday Times"},{"key":"e_1_3_2_1_49_1","unstructured":"D. Kravets \"Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions \" in Wired 2008. D. Kravets \"Extortion Plot Threatens to Divulge Millions of Patients' Prescriptions \" in Wired 2008."},{"key":"e_1_3_2_1_50_1","unstructured":"B. Krebs \"Hackers Break Into Virginia Health Professions Database Demand Ransom \" in Washington Post. vol. May 4 2009. B. Krebs \"Hackers Break Into Virginia Health Professions Database Demand Ransom \" in Washington Post. vol. May 4 2009."}],"event":{"name":"EDBT\/ICDT '10: EDBT\/ICDT '10 joint conference","acronym":"EDBT\/ICDT '10","location":"Lausanne Switzerland"},"container-title":["Proceedings of the 2010 EDBT\/ICDT Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1754239.1754271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1754239.1754271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:49Z","timestamp":1750245769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1754239.1754271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":50,"alternative-id":["10.1145\/1754239.1754271","10.1145\/1754239"],"URL":"https:\/\/doi.org\/10.1145\/1754239.1754271","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}