{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:48:31Z","timestamp":1768294111466,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"S12","license":[{"start":{"date-parts":[[2011,11,24]],"date-time":"2011-11-24T00:00:00Z","timestamp":1322092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BMC Bioinformatics"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1471-2105-12-s12-s7","type":"journal-article","created":{"date-parts":[[2011,11,24]],"date-time":"2011-11-24T14:25:16Z","timestamp":1322144716000},"source":"Crossref","is-referenced-by-count":27,"title":["New threats to health data privacy"],"prefix":"10.1186","volume":"12","author":[{"given":"Fengjun","family":"Li","sequence":"first","affiliation":[]},{"given":"Xukai","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jake Y","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,24]]},"reference":[{"key":"4908_CR1","volume-title":"National Center for Health Statistics Health E-stat","author":"CJ Hsiao","year":"2010","unstructured":"Hsiao CJ, Hing E, Socey TC, Cai B: Electronic medical record\/electronic health record systems of office-based physicians: United States, 2009, and preliminary 2010 state estimates. National Center for Health Statistics Health E-stat 2010."},{"key":"4908_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1197\/jamia.M2273","volume":"14","author":"C Safran","year":"2007","unstructured":"Safran C, Bloomrosen M, Hammand WE, Labkoff S, Markel-Fox S, Tang PC, Detmer DE: Toward a national framework for the secondary use of health data: an American Medical Informatics Association white paper. J Am Med Inform Assoc 2007, 14: 1\u20139.","journal-title":"J Am Med Inform Assoc"},{"issue":"5","key":"4908_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 2002, 10(5):557\u2013570. 10.1142\/S0218488502001648","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"5","key":"4908_CR4","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1197\/jamia.M2435","volume":"14","author":"B Wellner","year":"2007","unstructured":"Wellner B, Huyck M, Mardis S, Aberdeen J, Morgan A, Peshkin L, Yeh A, Hitzeman J, Hirschman L: Rapidly retargetable approaches to de-identification in medical records. Journal of the American Medical Informatics Association : JAMIA 2007, 14(5):564\u2013573. 10.1197\/jamia.M2435","journal-title":"Journal of the American Medical Informatics Association : JAMIA"},{"issue":"4","key":"4908_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MSP.2008.84","volume":"6","author":"KE Emam","year":"2008","unstructured":"Emam KE: Heuristics for de-identifying health data. IEEE Security & Privacy 2008, 6(4):58\u201361.","journal-title":"IEEE Security & Privacy"},{"issue":"5","key":"4908_CR6","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1197\/jamia.M3144","volume":"16","author":"K Emam","year":"2009","unstructured":"Emam K, Dankar F, Issa R, Jonker E, Amyot D, Cogo E, Corriveau J, Walker M, Chowdhury S, Vaillancourt R, Roffey T, Bottomley J: A globally optimal k-anonymity method for the de-identification of health data. Journal of the American Medical Informatics Association : JAMIA 2009, 16(5):670\u2013682. 10.1197\/jamia.M3144","journal-title":"Journal of the American Medical Informatics Association : JAMIA"},{"key":"4908_CR7","volume-title":"In ICDT","author":"A Deutsch","year":"2005","unstructured":"Deutsch A, Papakonstantinou Y: Privacy in database publishing. In ICDT 2005."},{"key":"4908_CR8","first-page":"139","volume-title":"Proceedings of the 32nd international conference on Very large data bases","author":"X Xiao","year":"2006","unstructured":"Xiao X, Tao Y: Anatomy: simple and effective privacy preservation. Proceedings of the 32nd international conference on Very large data bases 2006, 139\u2013150."},{"key":"4908_CR9","volume-title":"A CM Transactions on Knowledge Discovery from Data","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M: L-diversity: Privacy beyond k-anonymity. A CM Transactions on Knowledge Discovery from Data 2007., 1:"},{"key":"4908_CR10","first-page":"106","volume-title":"Proceedings of the 23rd International Conference on Data Engineering","author":"N Li","year":"2007","unstructured":"Li N, Li T, Venkatasubramanian S: t-Closeness: privacy beyond k-anonymity and l-diversity. Proceedings of the 23rd International Conference on Data Engineering 2007, 106\u2013115."},{"issue":"15","key":"4908_CR11","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1056\/NEJMlim035027","volume":"348","author":"GJ Annas","year":"2003","unstructured":"Annas GJ: HIPPA regulations: a new era of medical-record privacy. The New England Journal of Medicine 2003, 348(15):1486\u20131490. 10.1056\/NEJMlim035027","journal-title":"The New England Journal of Medicine"},{"issue":"3","key":"4908_CR12","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.socnet.2005.01.007","volume":"27","author":"LA Adamic","year":"2005","unstructured":"Adamic LA, Adar E: How to search a social network. Social Networks 2005, 27(3):187\u2013203. 10.1016\/j.socnet.2005.01.007","journal-title":"Social Networks"},{"key":"4908_CR13","first-page":"167","volume-title":"Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work","author":"C Lampe","year":"2006","unstructured":"Lampe C, Ellison N, Steinfield C: A face(book) in the crowd: social searching vs. social browsing. Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work 2006, 167\u2013170."},{"key":"4908_CR14","volume-title":"Proceedings of Workshop on Data Mining for User Modelling","author":"S Preibusch","year":"2007","unstructured":"Preibusch S, Hoser B, G\u00fcrses S, Berendt B: Ubiquitous social networks - opportunities and challenges for privacy-aware user modeling. Proceedings of Workshop on Data Mining for User Modelling 2007."},{"key":"4908_CR15","series-title":"First Monday","volume-title":"A privacy paradox: social networking in the United States","author":"S Barnes","year":"2007","unstructured":"Barnes S: A privacy paradox: social networking in the United States. First Monday 2007., 11(9):","edition":"11"},{"key":"4908_CR16","volume-title":"Proceedings of the 2nd International Conference on Weblogs and Social Media","author":"J Caverlee","year":"2008","unstructured":"Caverlee J, Webb S: A large-scale study of MySpace: observations and implications for online social networks. In Proceedings of the 2nd International Conference on Weblogs and Social Media. Seattle, WA; 2008."},{"key":"4908_CR17","first-page":"126","volume-title":"Proceedings of the 23rd International Conference on Data Engineering","author":"DJ Martin","year":"2007","unstructured":"Martin DJ, Kifer D, Machanavajjhala A, Gehrke J, Halpern JY: Worst-case background knowledge for privacy-preserving data publishing. Proceedings of the 23rd International Conference on Data Engineering 2007, 126\u2013135."},{"key":"4908_CR18","first-page":"770","volume-title":"Proceedings of the 33rd international conference on Very large data bases","author":"BC Chen","year":"2007","unstructured":"Chen BC, Ramakrishnan R, LeFevre K: Privacy skyline: privacy with multidimensional adversarial knowledge. Proceedings of the 33rd international conference on Very large data bases 2007, 770\u2013781."},{"key":"4908_CR19","first-page":"410","volume-title":"In Proceedings of Security and Management","author":"C Valli","year":"2006","unstructured":"Valli C: The insider threat to medical records: has the network age changed anything? In Proceedings of Security and Management 2006, 410\u2013414."},{"key":"4908_CR20","first-page":"117","volume-title":"3rd Australian Information Security Management Conference","author":"PAH Williams","year":"2005","unstructured":"Williams PAH: The underestimation of threats to patient data in clinical practice. In 3rd Australian Information Security Management Conference. Perth, WA; 2005:117\u2013122."},{"key":"4908_CR21","first-page":"1603","volume-title":"ICDE Workshop on Modeling, Managing, and Mining of Evolving Social Networks","author":"B Luo","year":"2009","unstructured":"Luo B, Lee D: On protecting private information in social networks: a proposal. ICDE Workshop on Modeling, Managing, and Mining of Evolving Social Networks 2009, 1603\u20131606."},{"key":"4908_CR22","volume-title":"Uniqueness of Simple Demographics in the U.S. Population","author":"L Sweeney","year":"2000","unstructured":"Sweeney L: Uniqueness of Simple Demographics in the U.S. Population. 2000."},{"key":"4908_CR23","doi-asserted-by":"publisher","first-page":"168-","DOI":"10.1145\/321796.321811","volume":"21","author":"RA Wagner","year":"1974","unstructured":"Wagner RA, Fischer MJ: The String-to-String Correction Problem. Journal of the ACM 1974, 21: 168--173. 10.1145\/321796.321811","journal-title":"Journal of the ACM"}],"container-title":["BMC Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1471-2105-12-S12-S7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1471-2105-12-S12-S7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1471-2105-12-S12-S7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T05:42:46Z","timestamp":1548222166000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcbioinformatics.biomedcentral.com\/articles\/10.1186\/1471-2105-12-S12-S7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,24]]},"references-count":23,"journal-issue":{"issue":"S12","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["4908"],"URL":"https:\/\/doi.org\/10.1186\/1471-2105-12-s12-s7","relation":{},"ISSN":["1471-2105"],"issn-type":[{"value":"1471-2105","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,24]]},"article-number":"S7"}}