{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T11:44:07Z","timestamp":1776080647797,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T00:00:00Z","timestamp":1775865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T00:00:00Z","timestamp":1776038400000},"content-version":"vor","delay-in-days":2,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Herzzentrum G\u00f6ttingen"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"DOI":"10.1186\/s12911-026-03475-4","type":"journal-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T17:25:20Z","timestamp":1775928320000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Proposal of a procedure to stratify the reidentification risk of medical data: RIMEDA"],"prefix":"10.1186","volume":"26","author":[{"given":"Sebastian","family":"Behre","sequence":"first","affiliation":[]},{"given":"Dorothea","family":"Keszty\u00fcs","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Schnabel","sequence":"additional","affiliation":[]},{"given":"Tibor","family":"Keszty\u00fcs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,11]]},"reference":[{"key":"3475_CR1","doi-asserted-by":"crossref","unstructured":"Konnoth C. AI and data protection law in health. In: Solaiman B, Cohen IG, editors. Research Handbook on Health, AI and the Law. Edward Elgar Publishing; 2024. pp. 111\u201329.","DOI":"10.4337\/9781802205657.ch07"},{"key":"3475_CR2","doi-asserted-by":"publisher","first-page":"2929","DOI":"10.1038\/s41591-023-02608-w","volume":"29","author":"A Arora","year":"2023","unstructured":"Arora A, Alderman JE, Palmer J, Ganapathi S, Laws E, McCradden MD, et al. The value of standards for health datasets in artificial intelligence-based applications. Nat Med. 2023;29:2929\u201338.","journal-title":"Nat Med"},{"key":"3475_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L, k-ANONYMITY. A MODEL FOR PROTECTING PRIVACY. Int J Uncertain Fuzziness Knowl-Based Syst. 2002;10:557\u201370.","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"3475_CR4","first-page":"1184","volume":"36","author":"J Henriksen-Bulmer","year":"2016","unstructured":"Henriksen-Bulmer J, Jeary S. Re-identification attacks\u2014A systematic literature review. Int J Inf Manag. 2016;36:1184\u201392.","journal-title":"Int J Inf Manag"},{"key":"3475_CR5","unstructured":"The HIPAA Journal. Healthcare Data Breach Statistics. 2025. https:\/\/www.hipaajournal.com\/healthcare-data-breach-statistics\/. Accessed 7 Oct 2025."},{"key":"3475_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s40290-022-00456-6","volume":"37","author":"A Dang","year":"2023","unstructured":"Dang A. Real-World Evidence: A Primer. Pharm Med. 2023;37:25\u201336.","journal-title":"Pharm Med"},{"key":"3475_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1186\/s12910-021-00687-3","volume":"22","author":"B Murdoch","year":"2021","unstructured":"Murdoch B. Privacy and artificial intelligence: challenges for protecting health information in a new era. BMC Med Ethics. 2021;22:122.","journal-title":"BMC Med Ethics"},{"key":"3475_CR8","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1186\/s12911-017-0499-0","volume":"17","author":"H Lee","year":"2017","unstructured":"Lee H, Kim S, Kim JW, Chung YD. Utility-preserving anonymization for health data publishing. BMC Med Inf Decis Mak. 2017;17:104.","journal-title":"BMC Med Inf Decis Mak"},{"key":"3475_CR9","doi-asserted-by":"publisher","first-page":"eadn7053","DOI":"10.1126\/sciadv.adn7053","volume":"10","author":"A Gadotti","year":"2024","unstructured":"Gadotti A, Rocher L, Houssiau F, Cre\u0163u A-M, De Montjoye Y-A. Anonymization: The imperfect science of using data while preserving privacy. Sci Adv. 2024;10:eadn7053.","journal-title":"Sci Adv"},{"key":"3475_CR10","first-page":"744","volume":"28","author":"W Xia","year":"2021","unstructured":"Xia W, Liu Y, Wan Z, Vorobeychik Y, Kantacioglu M, Nyemba S, et al. Enabling realistic health data re-identification risk assessment through adversarial modeling. J Am Med Inf Assoc JAMIA. 2021;28:744\u201352.","journal-title":"J Am Med Inf Assoc JAMIA"},{"key":"3475_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1177\/17407745241259086","volume":"22","author":"A Rodriguez","year":"2025","unstructured":"Rodriguez A, Lewis SC, Eldridge S, Jackson T, Weir CJ. A survey on UK researchers\u2019 views regarding their experiences with the de-identification, anonymisation, release methods and re-identification risk estimation for clinical trial datasets. Clin Trials SAGE Publications. 2025;22:11\u201323.","journal-title":"Clin Trials SAGE Publications"},{"key":"3475_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s00103-023-03820-2","volume":"67","author":"J Drechsler","year":"2024","unstructured":"Drechsler J, Pauly H. The potential for re-identification of structured health data [Das Reidentifikationspotenzial von strukturierten Gesundheitsdaten]. Bundesgesundheitsblatt - Gesundheitsforsch - Gesundheitsschutz. 2024;67:164\u201370.","journal-title":"Bundesgesundheitsblatt - Gesundheitsforsch - Gesundheitsschutz"},{"key":"3475_CR13","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.1.3661.1604","volume-title":"Five Safes: designing data access for research","author":"T Desai","year":"2016","unstructured":"Desai T, Welpton R, Ritchie F. Five Safes: designing data access for research. Bristol: UWE; 2016. https:\/\/doi.org\/10.13140\/RG.2.1.3661.1604. Bristol Research Repository."},{"key":"3475_CR14","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1037\/amp0001346","volume":"80","author":"KN Morehouse","year":"2025","unstructured":"Morehouse KN, Kurdi B, Nosek BA. Responsible data sharing: Identifying and remedying possible re-identification of human participants. Am Psychol. 2025;80:928\u201341.","journal-title":"Am Psychol"},{"key":"3475_CR15","doi-asserted-by":"publisher","first-page":"23223","DOI":"10.1038\/s41598-025-04907-3","volume":"15","author":"LP Sondeck","year":"2025","unstructured":"Sondeck LP, Laurent M. Practical and ready-to-use methodology to assess the re-identification risk in anonymized datasets. Sci Rep. 2025;15:23223.","journal-title":"Sci Rep"},{"key":"3475_CR16","doi-asserted-by":"publisher","first-page":"4441","DOI":"10.1007\/s43681-025-00681-0","volume":"5","author":"E Ford","year":"2025","unstructured":"Ford E, Pillinger S, Stewart R, Jones K, Roberts A, Casey A, et al. What is the patient re-identification risk from using de-identified clinical free text data for health research? AI Ethics. 2025;5:4441\u201354.","journal-title":"AI Ethics"},{"key":"3475_CR17","doi-asserted-by":"publisher","first-page":"2499296","DOI":"10.1080\/20008066.2025.2499296","volume":"16","author":"N Kassam-Adams","year":"2025","unstructured":"Kassam-Adams N, Thompson K, Sijbrandij M, Dyb G. Sharing traumatic stress research data: assessing and reducing the risk of re-identification. Eur J Psychotraumatology. 2025;16:2499296.","journal-title":"Eur J Psychotraumatology"},{"key":"3475_CR18","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1177\/17407745251356423","volume":"22","author":"A Rodriguez","year":"2025","unstructured":"Rodriguez A, Williams LJ, Lewis SC, Sinclair P, Eldridge S, Jackson T, et al. Evaluating re-identification risks scores in publicly available clinical trial datasets: Insights and implications. Clin Trials. 2025;22:649\u201366.","journal-title":"Clin Trials"},{"key":"3475_CR19","doi-asserted-by":"crossref","unstructured":"Jiang Y, Mosquera L, Jiang B, Kong L, El Emam K. Measuring re-identification risk using a synthetic estimator to enable data sharing. Zhou J, editor. PLOS ONE. 2022;17:e0269097.","DOI":"10.1371\/journal.pone.0269097"},{"key":"3475_CR20","doi-asserted-by":"crossref","unstructured":"Podoliaka O, Mushkatblat V, Kaplan A. Privacy attacks based on correlation of dataset identifiers: assessing the risk. 2022 IEEE 12th Annual Computing and Communication Workshop and Conference CCWC. Las Vegas, NV, USA: IEEE; 2022. pp. 0808\u201315.","DOI":"10.1109\/CCWC54503.2022.9720885"},{"key":"3475_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/OJCS.2022.3175999","volume":"3","author":"Y Sei","year":"2022","unstructured":"Sei Y, Okumura H, Ohsuga A. Re-Identification in Differentially Private Incomplete Datasets. IEEE Open J Comput Soc. 2022;3:62\u201372.","journal-title":"IEEE Open J Comput Soc"},{"key":"3475_CR22","doi-asserted-by":"crossref","unstructured":"Adamakis E, Boch M, Bampoulidis A, Margetis G, Gindl S, Stephanidis C. DaRAV: A Tool for Visualizing De-Anonymization Risks. 2023 IEEE 39th International Conference on Data Engineering ICDE. Anaheim, CA, USA: IEEE; 2023. pp. 3655\u20138.","DOI":"10.1109\/ICDE55515.2023.00291"},{"key":"3475_CR23","unstructured":"Simon G, Shortreed S, Coley RY, Iturralde EM, Platt R, Toh S et al. Toolkit for Assessing and Mitigating Risk of Re-identification when Sharing Data Derived from Health Records. USA: FDA Sentinel Initiative Infrastructure; 2020 p. 28. https:\/\/www.sentinelinitiative.org\/sites\/default\/files\/Methods\/Sentinel_Report_Toolkit-Assessing-Mitigating-Risk-Re-Identification-Sharing-Data-Derived-from-Health-Records.pdf. Accessed 28 Jan 2026."},{"key":"3475_CR24","doi-asserted-by":"publisher","unstructured":"Meurers T, Baum L, Haber AC, Halilovic M, Heinz B, Milicevic V, et al. Health Data Re-Identification: Assessing Adversaries and Potential Harms. In: Mantas J, Hasman A, Demiris G, Saranto K, Marschollek M, Arvanitis TN, et al. editors. Stud Health Technol Inform. IOS; 2024. https:\/\/doi.org\/10.3233\/SHTI240626.","DOI":"10.3233\/SHTI240626"},{"key":"3475_CR25","doi-asserted-by":"crossref","unstructured":"Ganiev AA, Kerimov KF, Azizova ZI. Understanding of Data De-identification: Issues of Relevance and Problems. 2021 International Conference on Information Science and Communication Technologies ICISCT., Tashkent. Uzbekistan: IEEE; 2021. pp. 1\u20134.","DOI":"10.1109\/ICISCT52966.2021.9670054"},{"key":"3475_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/320434.320440","volume":"1","author":"PP-S Chen","year":"1976","unstructured":"Chen PP-S. The entity-relationship model\u2014toward a unified view of data. ACM Trans Database Syst. 1976;1:9\u201336.","journal-title":"ACM Trans Database Syst"},{"key":"3475_CR27","unstructured":"Vester F. The art of interconnected thinking: ideas and tools for a new approach to tackling complexity. A report to the Club of Rome [Die Kunst vernetzt zu denken: Ideen und Werkzeuge f\u00fcr einen neuen Umgang mit Komplexit\u00e4t: ein Bericht an den Club of Rome]. Updated and expanded paperback edition, 10th edition. M\u00fcnchen: dtv; 2015."},{"key":"3475_CR28","doi-asserted-by":"publisher","DOI":"10.1524\/9783486718461","volume-title":"Complex Systems - New Approaches and numerous examples [Komplexe Systeme: neue Ans\u00e4tze und zahlreiche Beispiele]","author":"F Brand","year":"2013","unstructured":"Brand F. Complex Systems - New Approaches and numerous examples [Komplexe Systeme: neue Ans\u00e4tze und zahlreiche Beispiele]. M\u00fcnchen: Oldenbourg; 2013."},{"key":"3475_CR29","unstructured":"Alder S. 2024 Healthcare Data Breach Report. HIPAA J. 2024. https:\/\/www.hipaajournal.com\/2024-healthcare-data-breach-report\/. Accessed 16 July 2025."},{"key":"3475_CR30","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3414\/ME16-01-0012","volume":"55","author":"F Prasser","year":"2016","unstructured":"Prasser F, Kohlmayer F, Kuhn K. The Importance of Context: Risk-based De-identification of Biomedical Data. Methods Inf Med. 2016;55:347\u201355.","journal-title":"Methods Inf Med"},{"key":"3475_CR31","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1136\/amiajnl-2012-001026","volume":"20","author":"RV Atreya","year":"2013","unstructured":"Atreya RV, Smith JC, McCoy AB, Malin B, Miller RA. Reducing patient re-identification risk for laboratory results within research datasets. J Am Med Inf Assoc. 2013;20:95\u2013101.","journal-title":"J Am Med Inf Assoc"},{"key":"3475_CR32","doi-asserted-by":"crossref","unstructured":"Lee YJ, Lee KH. What are the optimum quasi-identifiers to re-identify medical records? 2018 20th International Conference on Advvanced Communication Technologies ICACT. Chuncheon-si Gangwon-do, Korea (South): IEEE; 2018. pp. 1025\u201333.","DOI":"10.23919\/ICACT.2018.8323926"},{"key":"3475_CR33","doi-asserted-by":"publisher","unstructured":"El Emam K. Guide to the De-Identification of Personal Health Information. Auerbach; 2013. https:\/\/doi.org\/10.1201\/b14764.","DOI":"10.1201\/b14764"},{"key":"3475_CR34","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11416-022-00447-w","volume":"19","author":"A Sadeghi-Nasab","year":"2022","unstructured":"Sadeghi-Nasab A, Rafe V. A comprehensive review of the security flaws of hashing algorithms. J Comput Virol Hacking Tech. 2022;19:287\u2013302.","journal-title":"J Comput Virol Hacking Tech"},{"key":"3475_CR35","unstructured":"Zhao C, Tan Z, Ma P, Li D, Jiang B, Wang Y et al. Is Chain-of-Thought Reasoning of LLMs a Mirage? A Data Distribution Lens. arXiv; 2525. https:\/\/arxiv.org\/pdf\/2508.01191. Accessed 27 Aug 2025."},{"key":"3475_CR36","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-031-13945-1_25","volume-title":"Privacy in Statistical Databases","author":"X Zhang","year":"2022","unstructured":"Zhang X, Wan Z, Yan C, Brown JT, Xia W, Gkoulalas-Divanis A, et al. How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study. In: Domingo-Ferrer J, Laurent M, editors. Privacy in Statistical Databases. Cham: Springer International Publishing; 2022. pp. 361\u201374."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s12911-026-03475-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-026-03475-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-026-03475-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:45:42Z","timestamp":1776077142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s12911-026-03475-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,11]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["3475"],"URL":"https:\/\/doi.org\/10.1186\/s12911-026-03475-4","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,11]]},"assertion":[{"value":"13 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"120"}}