{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:40:43Z","timestamp":1773567643511,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100006093","name":"Patient-Centered Outcomes Research Institute","doi-asserted-by":"publisher","award":["CDRN-1306-04608"],"award-info":[{"award-number":["CDRN-1306-04608"]}],"id":[{"id":"10.13039\/100006093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000051","name":"National Human Genome Research Institute","doi-asserted-by":"publisher","award":["R01-HG009174"],"award-info":[{"award-number":["R01-HG009174"]}],"id":[{"id":"10.13039\/100000051","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000092","name":"U.S. National Library of Medicine","doi-asserted-by":"publisher","award":["T15LM007092"],"award-info":[{"award-number":["T15LM007092"]}],"id":[{"id":"10.13039\/100000092","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s12911-019-0852-6","type":"journal-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T10:15:33Z","timestamp":1563876933000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["A clustering approach for detecting implausible observation values in electronic health records data"],"prefix":"10.1186","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0204-8978","authenticated-orcid":false,"given":"Hossein","family":"Estiri","sequence":"first","affiliation":[]},{"given":"Jeffrey G.","family":"Klann","sequence":"additional","affiliation":[]},{"given":"Shawn N.","family":"Murphy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,23]]},"reference":[{"key":"852_CR1","doi-asserted-by":"publisher","first-page":"S22","DOI":"10.1097\/MLR.0b013e31829b1e2c","volume":"51","author":"JS Brown","year":"2013","unstructured":"Brown JS, Kahn M, Toh S. Data quality assessment for comparative effectiveness research in distributed data networks. Med Care. 2013;51:S22\u20139. Available from: \n                    http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/23793049\n                    \n                  .","journal-title":"Med Care"},{"key":"852_CR2","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1136\/amiajnl-2011-000681","volume":"20","author":"NG Weiskopf","year":"2013","unstructured":"Weiskopf NG, Weng C. Methods and dimensions of electronic health record data quality assessment: enabling reuse for clinical research. J Am Med Inform Assoc [Internet]. 2013;20:144\u201351 Available from: \n                    https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC3555312\/\n                    \n                  .","journal-title":"J Am Med Inform Assoc [Internet]"},{"issue":"1","key":"852_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.13063\/2327-9214.1244","volume":"4","author":"Michael G. Kahn","year":"2016","unstructured":"Kahn MG, Callahan TJ, Barnard J, Bauck AE, Brown J, Davidson BN, et al. A harmonized data quality assessment terminology and framework for the secondary use of electronic health record data. EGEMS (Wash DC). 2016;4(1):1244. Available from: \n                    https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5051581\/\n                    \n                  . [cited 2016 Sep 16].","journal-title":"eGEMs (Generating Evidence & Methods to improve patient outcomes)"},{"key":"852_CR4","unstructured":"Ghahramani Z. Unsupervised Learning. In: Bousquet O, von Luxburg U, R\u00e4tsch G, editors. Advanced Lectures on Machine Learning. ML 2003. Lecture Notes in Computer Science, vol 3176. Berlin, Heidelberg: Springer; 2004."},{"key":"852_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.jbi.2016.10.002","volume":"64","author":"M Hauskrecht","year":"2016","unstructured":"Hauskrecht M, Batal I, Hong C, Nguyen Q, Cooper GF, Visweswaran S, et al. Outlier-based detection of unusual patient-management actions: an ICU study. J Biomed Inform. 2016;64:211\u201321.","journal-title":"J Biomed Inform"},{"issue":"6","key":"852_CR6","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.jbi.2012.08.003","volume":"45","author":"L Bouarfa","year":"2012","unstructured":"Bouarfa L, Dankelman J. Workflow mining and outlier detection from clinical activity logs. J Biomed Inform. 2012;45(6):1185\u201390.","journal-title":"J Biomed Inform"},{"key":"852_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.procs.2017.05.002","volume":"108","author":"Alva Presbitero","year":"2017","unstructured":"Presbitero A, Quax R, Krzhizhanovskaya V, Sloot P. Anomaly detection in clinical data of patients undergoing heart surgery. Procedia Comput Sci. 2017;108:99\u2013108.","journal-title":"Procedia Computer Science"},{"issue":"2","key":"852_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1080\/19488300.2013.787564","volume":"3","author":"Dario Antonelli","year":"2013","unstructured":"Antonelli D, Bruno G, Chiusano S. Anomaly detection in medical treatment to discover unusual patient management. IIE Trans Healthc Syst Eng. 2013;3(2):69\u201377.","journal-title":"IIE Transactions on Healthcare Systems Engineering"},{"key":"852_CR9","doi-asserted-by":"crossref","unstructured":"Ray S, Wright A. Detecting anomalies in alert firing within clinical decision support systems using anomaly\/outlier detection techniques. Proc. 7th ACM Int. Conf. Bioinformatics, Comput. Biol. Heal. Informatics. New York: ACM; 2016. p. 185\u201390. Available from: \n                    http:\/\/doi.acm.org\/10.1145\/2975167.2975186","DOI":"10.1145\/2975167.2975186"},{"issue":"7","key":"852_CR10","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1093\/jamia\/ocy041","volume":"25","author":"S Ray","year":"2018","unstructured":"Ray S, McEvoy DS, Aaron S, Hickman TT, Wright A. Using statistical anomaly detection models to find clinical decision support malfunctions. J Am Med Informatics Assoc. 2018;25(7):862\u201371.","journal-title":"J Am Med Informatics Assoc"},{"issue":"1","key":"852_CR11","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1186\/s12913-017-2692-3","volume":"17","author":"B Wilson","year":"2017","unstructured":"Wilson B, Tseng CL, Soroka O, Pogach LM, Aron DC. Identification of outliers and positive deviants for healthcare improvement: looking for high performers in hypoglycemia safety in patients with diabetes. BMC Health Serv Res. 2017;17(1):738.","journal-title":"BMC Health Serv Res"},{"key":"852_CR12","unstructured":"Deneshkumar V, Senthamaraikannan K, Manikandan M. Identification of outliers in medical diagnostic system using data mining techniques. Int J Stat Appl. 2014;4(6):241\u20138."},{"issue":"3","key":"852_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"Varun Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey. ACM Comput Surv 2009;41:1\u201358. Available from: \n                    https:\/\/dl.acm.org\/citation.cfm?id=1541882\n                    \n                  .","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"852_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"Victoria J. Hodge","year":"2004","unstructured":"Hodge VJ, Austin J. A survey of outlier detection methodologies. Artif Intell Rev. 2004;22(2):85\u2013126.","journal-title":"Artificial Intelligence Review"},{"issue":"2","key":"852_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/376284.375668","volume":"30","author":"Charu C. Aggarwal","year":"2001","unstructured":"Aggarwal CC, Yu PS. Outlier detection for high dimensional data. ACM SIGMOD Rec. 2001;30(2):37\u201346.","journal-title":"ACM SIGMOD Record"},{"issue":"3-4","key":"852_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"Edwin M. Knorr","year":"2000","unstructured":"Knorr EM, Ng RT, Tucakov V. Distance-based outliers: algorithms and applications. VLDB J. 2000;8(3-4):237\u201353.","journal-title":"The VLDB Journal The International Journal on Very Large Data Bases"},{"key":"852_CR17","unstructured":"Ben-Gal I. Outlier Detection. In: Maimon O, Rokach L, editors. Data Mining and Knowledge Discovery Handbook. Boston: Springer; 2005."},{"key":"852_CR18","unstructured":"Gaspar J, Catumbela E, Marques B, Freitas A. A systematic review of outliers detection techniques in medical data - preliminary study. Heal. 2011. Proc Int Conf Heal Informatics. 2011."},{"key":"852_CR19","doi-asserted-by":"crossref","unstructured":"Hastie T, Tibshirani R, Friedman J. The elements of statistical learning: data mining, inference, and prediction: Springer Ser. Stat; 2009.","DOI":"10.1007\/978-0-387-84858-7"},{"key":"852_CR20","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain AK. Data clustering: 50 years beyond K-means. Pattern Recogn Lett. 2010;31:651\u201366.","journal-title":"Pattern Recogn Lett"},{"key":"852_CR21","unstructured":"MacQueen J. Some methods for classification and analysis of multivariate observations. Proc. Fifth Berkeley Symp. Math. Stat. Probab. Vol. 1 Stat. Berkeley, Calif.: University of California Press; 1967. p. 281\u201397. Available from: \n                    http:\/\/projecteuclid.org\/euclid.bsmsp\/1200512992\n                    \n                  ."},{"key":"852_CR22","first-page":"189","volume-title":"k -means\u2013: a unified approach to clustering and outlier detection. Proc. 2013 SIAM Int. Conf. Data min","author":"S Chawla","year":"2013","unstructured":"Chawla S, Gionis A. k -means\u2013: a unified approach to clustering and outlier detection. Proc. 2013 SIAM Int. Conf. Data min; 2013. p. 189\u201397. Available from: \n                    http:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9781611972832.21\n                    \n                  ."},{"key":"852_CR23","first-page":"105","volume":"2005","author":"B Chen","year":"2005","unstructured":"Chen B, Tai PC, Harrison R, Pan Y. Novel hybrid hierarchical-K-means clustering method (H-K-means) for microarray analysis. IEEE Comput Syst Bioinforma Conf Work Poster Abstr. 2005;2005:105\u20138.","journal-title":"IEEE Comput Syst Bioinforma Conf Work Poster Abstr"},{"key":"852_CR24","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1198\/016214503000000666","volume":"98","author":"CA Sugar","year":"2003","unstructured":"Sugar CA, James GM. Finding the number of clusters in a dataset. J. Am. Stat. Assoc. 2003;98:750\u201363. Available from: \n                    http:\/\/www.tandfonline.com\/doi\/abs\/10.1198\/016214503000000666\n                    \n                  .","journal-title":"J. Am. Stat. Assoc"},{"key":"852_CR25","unstructured":"Hamerly G, Elkan C. Learning the k in k means. Adv neural Inf Process. 2004;17:1\u20138. Available from: books.nips.cc\/papers\/files\/nips16\/NIPS2003_AA36.pdf%5Cn\n                    http:\/\/books.google.com\/books?hl=en&lr=&id=0F-9C7K8fQ8C&oi=fnd&pg=PA281&dq=Learning+the+k+in+k-means&ots=TGLvqYQa40&sig=SDu4cZ9TCeU8a5MoG1uMcRLQGFE\n                    \n                  ."},{"key":"852_CR26","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1198\/016214502760047131","volume":"97","author":"C Fraley","year":"2002","unstructured":"Fraley C, Raftery AE. Model-based clustering, discriminant analysis, and density estimation. J Am Stat Assoc. 2002;97:611\u201331. Available from: \n                    http:\/\/www.tandfonline.com\/doi\/abs\/10.1198\/016214502760047131\n                    \n                  .","journal-title":"J Am Stat Assoc"},{"key":"852_CR27","unstructured":"Nalichowski R, Keogh D, Chueh HC, Murphy SN. Calculating the benefits of a research patient data repository. AMIA Annu Symp Proc United States. 2006. p. 1044."},{"key":"852_CR28","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.bdr.2018.05.003","volume":"13","author":"H Estiri","year":"2018","unstructured":"Estiri H, Omran BA, Murphy SN. Kluster : an efficient scalable procedure for approximating the number of clusters in unsupervised learning. Big Data Res. 2018;13:38\u201351 Available from: \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214579617303611\n                    \n                  . [cited 2018 Jun 3].","journal-title":"Big Data Res"},{"key":"852_CR29","doi-asserted-by":"crossref","unstructured":"De Maesschalck R, Jouan-Rimbaud D, Massart DLL. The Mahalanobis distance. Chemom Intell Lab Syst. 2000;50:1\u201318.","DOI":"10.1016\/S0169-7439(99)00047-7"},{"key":"852_CR30","unstructured":"Filzmoser P. A multivariate outlier detection method. Seventh Int Conf Comput Data Anal Model. 2004."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-019-0852-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12911-019-0852-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-019-0852-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T19:18:10Z","timestamp":1595359090000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-019-0852-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,23]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["852"],"URL":"https:\/\/doi.org\/10.1186\/s12911-019-0852-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/570564","asserted-by":"object"}]},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,23]]},"assertion":[{"value":"2 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This project was approved by the Partners Healthcare IRB with a waiver of consent according to protocol 2014P002367.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"142"}}