{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T06:28:10Z","timestamp":1772778490720,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T00:00:00Z","timestamp":1530144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T00:00:00Z","timestamp":1530144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003625","name":"Ministry of Health and Welfare","doi-asserted-by":"publisher","award":["1631180"],"award-info":[{"award-number":["1631180"]}],"id":[{"id":"10.13039\/501100003625","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2018,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>For better life, medical and IT technology are converging and data plays a key role in this convergence. Data in the medical field is information about humans, and these data are sensitive. Because this type of data is frequently accessed by multiple users, a high degree of caution is required during handling. In addition, systematic security precautions must be followed to prevent data from being used outside of the intended purpose, even in clinical research. In this paper, we propose a human-centric framework for clinical environments based on the standards, procedures, and methods outlined in guidelines published in the United States and Korea. This study provides a more balanced approach to the utilization and security of personal information as compared to that in the two previously published guidelines. For the secure clinical studies, this framework makes it possible to provide utility and security in a balanced manner, depending on the forms of provision. As a result, the proposed framework extends the usability of the clinical study, and support secure usage of clinical research data.<\/jats:p>","DOI":"10.1186\/s13673-018-0142-9","type":"journal-article","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T11:28:22Z","timestamp":1529321302000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Design of a human-centric de-identification framework for utilizing various clinical research data"],"prefix":"10.1186","volume":"8","author":[{"given":"Jaedong","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jipmin","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Park","sequence":"additional","affiliation":[]},{"given":"Seunghyun","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Hyosoung","family":"Cha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,28]]},"reference":[{"issue":"1","key":"142_CR1","first-page":"1","volume":"16","author":"G Karystianis","year":"2016","unstructured":"Karystianis G, Sheppard T, Dixon WG, Nenadic G (2016) Modelling and extraction of variability in free-text medication prescriptions from an anonymised primary care electronic medical record research database. BMC Med Inform Decis Making 16(1):1\u201318","journal-title":"BMC Med Inform Decis Making"},{"issue":"1","key":"142_CR2","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.radonc.2012.09.019","volume":"108","author":"E Roelofs","year":"2013","unstructured":"Roelofs E, Persoon L, Nijsten S, Wiessler W, Dekker A, Lambin P (2013) Benefits of a clinical data warehouse with data mining tools to collect data for a radiotherapy trial. Radiother Oncol 108(1):174\u2013179","journal-title":"Radiother Oncol"},{"issue":"1","key":"142_CR3","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.13063\/2327-9214.1058","volume":"2","author":"KE Johnson","year":"2014","unstructured":"Johnson KE, Kamineni A, Fuller S, Olmstead D, Wernli KJ (2014) How the provenance of electronic health record\ndata matters for research: a case example using system mapping. EGEMS (Wash DC) 2(1):1058. https:\/\/doi.org\/10.13063\/2327-9214.1058","journal-title":"EGEMS (Wash DC)"},{"issue":"3","key":"142_CR4","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n JL, Se\u00f1or IC, Lozoya P\u00c1O, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46(3):541\u2013562","journal-title":"J Biomed Inform"},{"key":"142_CR5","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: 2008 IEEE symposium on security and privacy (sp 2008), Oakland, CA, pp 111\u2013125","DOI":"10.1109\/SP.2008.33"},{"issue":"6","key":"142_CR6","first-page":"1496","volume":"13","author":"Mansoul Abdelhak","year":"2017","unstructured":"Abdelhak Mansoul, Baghdad Atmani (2017) Combining multi-criteria analysis with CBR for medical decision support. J Inf Process Syst 13(6):1496\u20131515","journal-title":"J Inf Process Syst"},{"issue":"2","key":"142_CR7","first-page":"226","volume":"12","author":"Jayaprakash Kar","year":"2016","unstructured":"Kar Jayaprakash, Mishra Manoj Ranjan (2016) Mitigating threats and security metrics in Cloud Computing. J Inf Process Syst 12(2):226\u2013233","journal-title":"J Inf Process Syst"},{"key":"142_CR8","doi-asserted-by":"crossref","unstructured":"Garfinkel SL (2015) De-identification of personal information (NISTIR 8053), NIST, http:\/\/dx.doi.org\/10.6028\/NIST.IR.8053. Accessed 10 Apr 2018","DOI":"10.6028\/NIST.IR.8053"},{"key":"142_CR9","unstructured":"George J, Kumar V, Kumar S (2015) Data warehouse design considerations for a healthcare business intelligence system. In: Proceedings of the World Congress on Engineering, vol 1, July 2015"},{"issue":"2","key":"142_CR10","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1136\/amiajnl-2014-002955","volume":"22","author":"VL West","year":"2014","unstructured":"West VL, Borland D, Hammond WE (2014) Innovative information visualization of electronic health record data: a systematic review. J Am Med Inform Assoc 22(2):330\u2013339","journal-title":"J Am Med Inform Assoc"},{"issue":"1","key":"142_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1136\/amiajnl-2011-000681","volume":"20","author":"NG Weiskopf","year":"2013","unstructured":"Weiskopf NG, Weng C (2013) Methods and dimensions of electronic health record data quality assessment: enabling reuse for clinical research. J Am Med Inform Assoc 20(1):144\u2013151","journal-title":"J Am Med Inform Assoc"},{"issue":"3","key":"142_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.artmed.2014.03.006","volume":"61","author":"Z Guido","year":"2014","unstructured":"Guido Z, Daniel K, Anthony N, Anton B (2014) De-identification of health records using Anonym: effectiveness and robustness across datasets. Artif Intell Med 61(3):145\u2013151","journal-title":"Artif Intell Med"},{"issue":"2","key":"142_CR13","doi-asserted-by":"publisher","first-page":"102","DOI":"10.4258\/hir.2013.19.2.102","volume":"19","author":"SY Shin","year":"2013","unstructured":"Shin SY, Lyu Y, Shin Y, Choi HJ, Park J, Kim WS, Lee JH (2013) Lessons learned from development of de-identification system for biomedical research in a Korean Tertiary Hospital. Healthc Inform Res 19(2):102\u2013109","journal-title":"Healthc Inform Res"},{"issue":"1","key":"142_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3346\/jkms.2015.30.1.7","volume":"30","author":"SY Shin","year":"2015","unstructured":"Shin SY, Park YR, Shin Y, Choi HJ, Park J, Lyu Y, Lee MS, Choi CM, Kim WS, Lee JH (2015) A de-identification method for bilingual clinical texts of various note types. J Korean Med Sci 30(1):7\u201315","journal-title":"J Korean Med Sci"},{"issue":"10","key":"142_CR15","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.ijmedinf.2014.07.002","volume":"83","author":"L Muqun","year":"2014","unstructured":"Muqun L, David C, John A, Lynette H, Bradley AM (2014) De-identification of clinical narratives through writing complexity measures. Int J Med Inform 83(10):750\u2013767","journal-title":"Int J Med Inform"},{"key":"142_CR16","volume-title":"NIST SP 800-188 De-Identifying Government Datasets (2nd Draft)","author":"SL Garfinkel","year":"2016","unstructured":"Garfinkel SL (2016) NIST SP 800-188 De-Identifying Government Datasets (2nd Draft). NIST, Gaithersburg"},{"key":"142_CR17","unstructured":"ISO 25237:2017 Health informatics Pseudonymization (2017), ISO\/TC 215 Health informatics"},{"key":"142_CR18","volume-title":"Anonymization: managing data protection risk code of practice","author":"C Graham","year":"2012","unstructured":"Graham C (2012) Anonymization: managing data protection risk code of practice. Information Commissioner\u2019s office, Wilmslow"},{"key":"142_CR19","unstructured":"Opinion 05\/2014 on Anonymization Techniques (2014), Article 29 Working Party, European Union (EU)"},{"key":"142_CR20","volume-title":"Pan-Canadian de-identification guidelines for personal health information","author":"K El Emam","year":"2007","unstructured":"El Emam K, Jonker E, Sams S, Neri E, Neisa A, Gao T, Chowdhury S (2007) Pan-Canadian de-identification guidelines for personal health information. Children\u2019s Hospital of Eastern Ontario Research Institute, Ottawa"},{"key":"142_CR21","unstructured":"Office of the Australian Information Commissioner (2014) Privacy business resource 4: de-identification of data and information. Australian Government, Australia. https:\/\/www.oaic.gov.au\/resources\/privacy-law\/privacy-archive\/privacy-resources-archive\/privacy-business-resource-4-de-identification-of-data-and-information.pdf"},{"key":"142_CR22","unstructured":"Korean government interdepartmental Joint (2016) Guidelines for De-identification of Personal Data. Korean Government, Korea. https:\/\/www.privacy.go.kr\/cmm\/fms\/FileDown.do?atchFileId=FILE_000000000830764&fileSn=0"},{"key":"142_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0287-2","author":"F Prasser","year":"2016","unstructured":"Prasser F, Kohlmayer F, Kuhn KA (2016) Efficient and effective pruning strategies for health data de-identification. BMC Med Inform Decis Making. https:\/\/doi.org\/10.1186\/s12911-016-0287-2","journal-title":"BMC Med Inform Decis Making"},{"key":"142_CR24","volume-title":"The anonymisation decision-making framework","author":"E Mark","year":"2016","unstructured":"Mark E, Elaine M, Kieron O, Caroline T (2016) The anonymisation decision-making framework. UKAN (UK Anonymisation Network), Manchester"},{"issue":"8","key":"142_CR25","first-page":"127","volume":"10","author":"YR Lee","year":"2016","unstructured":"Lee YR, Chung YC, Kim JS, Park HK (2016) Personal health information de-identified performing methods in Big Data Environments. Int J Softw Eng Appl 10(8):127\u2013138","journal-title":"Int J Softw Eng Appl"},{"key":"142_CR26","doi-asserted-by":"crossref","unstructured":"Lee YJ, Lee KH (2017) Re-identification of medical records by optimum quasi-identifiers. In: 2017 19th international conference on advanced communication technology (ICACT), 19\u201322 Feb 2017","DOI":"10.23919\/ICACT.2017.7890125"},{"issue":"2","key":"142_CR27","first-page":"377","volume":"5","author":"MM Merener","year":"2012","unstructured":"Merener MM (2012) Theoretical results on de-anonymization via linkage attacks. Trans Data Priv 5(2):377\u2013402","journal-title":"Trans Data Priv"},{"key":"142_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.06.029","author":"A Dehghan","year":"2015","unstructured":"Dehghan A, Kovacevic A, Karystianis G, Keane JA, Nenadic G (2015) Combining knowledge and data-driven methods for de-identification of clinical narratives. J Biomed Inform. https:\/\/doi.org\/10.1016\/j.jbi.2015.06.029","journal-title":"J Biomed Inform"},{"key":"142_CR29","doi-asserted-by":"publisher","first-page":"s43","DOI":"10.1016\/j.jbi.2017.10.003","volume":"75","author":"Zhipeng Jiang","year":"2017","unstructured":"Jiang Zhipeng, Zhao Chao, He Bin, Guan Yi, Jiang Jingchi (2017) De-identification of medical records using conditional random fields and long short-term memory networks. J Biomed Inform 75:s43\u2013s53","journal-title":"J Biomed Inform"},{"issue":"4","key":"142_CR30","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.tele.2017.08.002","volume":"35","author":"V Menger","year":"2018","unstructured":"Menger V, Scheepers F, van Wijk LM, Spruit M (2018) DEDUCE: a pattern matching method for automatic de-identification of Dutch medical text. Telemat Inform 35(4):727\u2013736","journal-title":"Telemat Inform"},{"key":"142_CR31","doi-asserted-by":"crossref","unstructured":"Phuong ND, Chau VTN (2016) Automatic de-identification of medical records with a multilevel hybrid semi-supervised learning approach. In: 2016 IEEE RIVF international conference on computing & communication technologies, research, innovation, and vision for the future (RIVF), Hanoi, pp 43\u201348","DOI":"10.1109\/RIVF.2016.7800267"},{"key":"142_CR32","doi-asserted-by":"crossref","unstructured":"Acharya S, Patel A (2017) Towards the design of a comprehensive data de-identification solution. In: 2017 IEEE international conference on bioinformatics and biomedicine (BIBM), Kansas City, MO, pp 1\u20138","DOI":"10.1109\/BIBM.2017.8217891"},{"key":"142_CR33","doi-asserted-by":"crossref","unstructured":"Prasser F, Eicher J, Bild R, Spengler H, Kuhn KA (2017) A tool for optimizing de-identified health data for use in statistical classification. In: 2017 IEEE 30th international symposium on computer-based medical systems (CBMS), Thessaloniki, pp 169\u2013174","DOI":"10.1109\/CBMS.2017.105"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-018-0142-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-018-0142-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-018-0142-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T08:30:46Z","timestamp":1627633846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-018-0142-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,28]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["142"],"URL":"https:\/\/doi.org\/10.1186\/s13673-018-0142-9","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,28]]},"assertion":[{"value":"16 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"19"}}