Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods.
Methods and Findings
Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013.
Citation: El Emam K, Jonker E, Arbuckle L, Malin B (2011) A Systematic Review of Re-Identification Attacks on Health Data. PLoS ONE6(12): e28071. https://doi.org/10.1371/journal.pone.0028071
Editor: Roberta W. Scherer, Johns Hopkins Bloomberg School of Public Health, United States of America
Received: July 26, 2011; Accepted: October 31, 2011; Published: December 2, 2011
Copyright: © 2011 El Emam et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: This study was funded by grant nos. U01HG00460301 and R01LM009989 from the National Institutes of Health and a grant from the Canada Research Chairs program. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have read the journal's policy and have the following conflicts: all co-authors perform consulting to federal and provincial governments and commercial entities in the US and Canada on de-identification. KEE and BM sit on federal and provincial government advisory committees related to health information privacy. This does not alter the authors' adherence to all the PLoS ONE policies on sharing data and materials.
The availability of de-identified data has been critical for population health research, health services research, and public health. De-identification is the act of reducing the information content in data to decrease the probability of discovering an individual's identity. Over the past several decades, a number of different metrics and methods have been developed, and applied, to de-identify data . De-identification has become a key component of various privacy statutes and regulations, especially in the context of health data , . These provide strong incentives for its application when person-specific information is disclosed for secondary purposes (i.e., purposes beyond the initial reason for data collection). Additionally, in the context of health research, many institutional review boards will waive the consent requirement if the data is de-identified , .
Yet, there is a growing view that there has been a failure of de-identification , . In particular, it has been claimed that data can be re-identified with relative ease, thus casting doubt on the ability to protect personal information from privacy invasions. This argument has been invoked to substantiate calls for legislative and regulatory changes in court cases  and in the peer-reviewed scientific literature , , , .
The importance of this claim cannot be overstated because there are significant policy implications at stake. Should there be a failure of de-identification, there would be at least three consequences on the practice of disclosing data for secondary purposes, such as health research : (i) it may be necessary to obtain consent or authorization from patients before disclosure, (ii) there would be less incentive to de-identify data, and (iii) the likelihood of data breaches would increase. None of these are ideal outcomes.
Firstly, while individual patient consent should be obtained when possible, it is not always practical to do so, especially retrospectively for data already collected for a different purpose . Without consent and without an acceptable method for de-identification, data custodians are likely to become increasingly reluctant to disclose health data at all. Even when consent can be obtained, the disparity between consenters and non-consenters is significant. These two groups differ in demographic and socio-economic characteristics, resulting in biased data sets , , .
Secondly, if there is reduced incentive to de-identify health data when it is disclosed to serve important societal needs, more identifiable information will be disclosed instead . It would be a greater risk to patient privacy if more identifiable information is disclosed when de-identified information would have satisfied the purpose.
Thirdly, if more identifiable data are disclosed for secondary purposes, there are real dangers from data breaches. The number of records affected by breaches is already quite high: the U.S. Department of Health and Human Services (HHS) has reported 252 breaches at health information custodians (e.g., clinics and hospitals) each involving more than 500 records from the end of September 2009 to the end of 2010 . In all, the records of over 7.8 million patients have been exposed. If there are no requirements to de-identify data, society risks an avalanche of data breaches involving identifiable information requiring notification of the affected patients. A rising number of data breach notifications will erode the public's trust in data custodians , .
The argument that data is readily susceptible to re-identification is not new. In the 1990's, there was a well-publicized re-identification attack on a claims database containing information on 135,000 patients disseminated by the Group Insurance Commission . In that attack, the discharge record for the then Governor of Massachusetts was re-identified using simple demographic information found in the Cambridge voter registration list which was purchased for $20. This was possible because certain fields in the two databases matched, namely: date of birth, 5-digit residential ZIP code, and gender. Since then, other examples of re-identification attacks have been reported on quite heavily by the media, including those of the web search queries of over a half-million America Online (AOL) clients  and the movie reviews of a half-million Netflix subscribers .
At first glance, it seems as if there are examples demonstrating a failure of de-identification. However, there has been no formal investigation to assess this evidence, and in particular, to contrast the re-identification attacks on health data with other types of data. Given the sensitivity of health information and potential implications for health policy (for example see ), it is critical to appraise the evidence in this domain.
We therefore performed a systematic review to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate a failure of current de-identification methods.
We performed a systematic review of the relevant evidence demonstrating successful re-identification attacks on data sets that may have had some transformations applied to hide the individuals' identity. We examined articles from a wide array of communities reporting on such attacks, including statistics, computer science, and health informatics.
Articles in the statistical disclosure control literature, computer science literature, and medical informatics literature were searched by KEE and EJ using the general terms “anonymization”, “de-identification”, and “re-identification” indexed before the end of October 2010. Broad search terms were chosen to ensure that we did not miss any relevant publications. The searches were performed on PubMed, IEEE Xplore (the on-line library of the Institute of Electrical and Electronics Engineers) and the ACM Digital Library (the on-line library of the Association for Computing Machinery), and the records for all relevant English language articles were obtained for further consideration. The IEEE and ACM publish and index a significant amount of the computer science and medical informatics research work. The resulting set of articles was augmented with articles known to the authors, identified through targeted searches on Google Scholar (e.g., for specific authors), and articles identified through the reference lists of the included studies. Technical reports and presentations were also included.
In total 1498 articles were identified from the databases and 24 from other sources. The article titles, keywords and abstracts were screened, where the primary inclusion criterion was that an article described a re-identification attack on an actual data set or a quantitative re-identification risk assessment. While we are mostly interested in the former, we included the latter during screening because it is often difficult to distinguish between the two types of articles from a title, keywords, and abstract.
To evaluate the accuracy of the screening, we performed an inter-rater reliability analysis with two independent raters. After the first rater completed his screening (KEE), a second rater not involved in the study in any way was recruited (KA). We went through the study objectives and screening criteria with the second rater to ensure consistency. For deciding how many articles needed to be rated we performed a power analysis for using the Kappa statistic  given an expected effect size of 0.8 at a power of 80% , . We therefore required 18 articles to be screened by the second rater. We randomly selected 9 articles that were screened in by the first rater and 9 that were screened out by the first rater. The value of Kappa was found to be 0.85 (2-sided p<0.001).
Records that passed screening were obtained and assessed for eligibility through a full-text review. Articles were considered eligible if they went beyond a risk assessment and actually re-identified individuals. Studies which evaluated the risk of re-identification but did not attempt to re-identify any individuals were excluded (even if it was plausible in theory to re-identify individuals, if actual re-identification was not demonstrated then the article was excluded), for example, see , , ,  for articles that were excluded. Furthermore, simulated attack studies, on artificial or real data, were excluded if they did not re-identify individuals.
We did not limit the selected articles to those that examined health data, but we did exclude studies examining the re-identification of genomic information. There is evidence that raw genomic information and summary statistics can distinguish individuals , , , and existing de-identification methods do not provide strong privacy guarantees . Therefore, the assessment of re-identification risk from genomic information remains an active area of research .
The full-text of articles that made it through the two stage screening process were reviewed and abstracted. Two of the authors (KEE and EJ) characterized every article and where there were disagreements they were discussed and a consensus was reached for the final rating.
The following six criteria were used to summarize each eligible study: (a) inclusion of health data in the attack, (b) the profession of the adversary, (c) country of re-identification, (d) the proportion or number of individuals re-identified, (e) whether the de-identification of the original data followed existing standards, and (f) whether the re-identification was verified. The first four criteria are descriptive, and characterize the nature and scope of successful re-identification attacks, whereas the latter two are quality indicators for the attack. These criteria were reviewed by a panel of five privacy experts, and were presented to a dozen privacy practitioners to solicit their feedback. While not comprehensive, these criteria were believed to provide a necessary foundation to understand and judge the nature of the re-identification attacks.
3.1 Inclusion of health data.
There tend to be sector-specific health privacy laws in many jurisdictions, arguably, resulting in health information being better protected than other types of information. Also, not all data sets are structurally the same. Each type of data set requires its own de-identification and re-identification methods. A re-identification attack on health information would therefore carry more weight in demonstrating the real-world risk of re-identification of health data.
3.2 The profession of the adversary.
Who is re-identifying data sets helps characterize the degree to which re-identification attacks are widespread. For example, if many different professions of adversaries are launching successful re-identification attacks and they vary in skill and resources, then this may indicate the ease with which re-identification attacks can occur.
3.3 The country of re-identification.
This refers to both the country of the adversary and the country where the individuals covered by the data come from. This characteristic is important because some countries make population databases readily available for free or for a modest fee. A good example of such publicly available population databases are state-level voter registration databases in the US . There is also a thriving industry specializing in the creation and sale of databases containing personal information about the population, making a successful re-identification attack on a de-identified data set more likely .
3.4 The percentage/number of individuals re-identified.
The percentage (or number if no denominator is provided) of individuals re-identified is an indication of the severity of the re-identification attack. If a large percentage of records in a database were re-identified then it is a more severe attack than if a single individual has been re-identified, for example.
3.5 The de-identification of the original data followed existing standards.
If a data set that has not been de-identified in a defensible way is subsequently re-identified, then a successful re-identification attack on that data is not informative about how well the de-identification worked. Therefore, the method of de-identification is important to consider.
The US Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule provides the most precise description of how to de-identify data among privacy laws in the US and Canada. In fact, the provisions of HIPAA have been applied in other jurisdictions. For example, health research organizations in Canada choose to use HIPAA standards to de-identify data sets , Canadian sites conducting research funded by US agencies need to comply with HIPAA , and international guidelines for the public disclosure of clinical trials data have relied on HIPAA definitions .
There are two de-identification standards specified in the HIPAA Privacy Rule: (a) the Safe Harbor standard, and (b) the statistical standard . The former standard is quite precise in that it specifies 18 data elements that must be removed (e.g., patient names, full dates, and full ZIP code). These 18 elements are provided in Table 1. The latter standard requires that: (a) a statistical expert performs the de-identification, (b) the risk of re-identification is “very low”, and (c) the de-identification method is documented. Both standards ensure that the risk of re-identification is low, but not zero.
While these two standards are not perfect, their application would provide some assurance that a generally accepted and broadly reviewed methodology was used to de-identify the data. If a standard was not used then it is not possible to know whether the de-identification applied on a data set provided meaningful protection against re-identification.
Therefore, the criterion we use to decide when a data set is defensibly de-identified is if it meets either of the two standards in the US HIPAA Privacy Rule. We will refer to this as “standards-based de-identification”.
3.6 Re-identification has been verified.
Once the adversary has re-identified a record, the adversary should verify that the re-identification is correct using additional information. Verification may be simple to do in a demonstration attack where the data custodian has the correct identities associated with the records and can verify each re-identified record. On the other hand, verification may require contacting the re-identified individual directly to confirm the facts (e.g., that the individual has the disease or condition that is indicated in the attacked database), or contacting the re-identified individual's work, school, co-workers, family, or neighbors. In some situations verification can be indirect. For example, if a re-identification attack reveals sensitive health information about a famous person and that person does not deny the sensitive information, then that may be taken as indirect verification.
Verification of re-identification attacks is important for three reasons. First, re-identification is probabilistic. Even if the probability of a correct re-identification is high, a re-identification attack is not successful unless some means have been used to verify the correctness of that re-identification. It is likely that an adversary would find multiple records that match the target individual and would choose one of these with equal probability. However, it is not possible to know with certainty if the chosen record is the correct one without verification.
Second, real data sets have quality problems. For example, a date of birth may be entered incorrectly into a database, or the digits in a ZIP code transposed. Such data errors may result in a potential re-identification being incorrect, even if all of the characteristics of the individual and the fields in the record match exactly. Only verification will indicate whether or not the re-identification was correct.
Third, background information that the adversary uses for re-identification may be old or cover a different time period than that contained in the attacked data set. Data aging or period mismatch may mean that seemingly correct matches are incorrect. In such cases, verification of the re-identified individuals is critical to ensure correctness.
Mean Re-identification Rate
The main outcome from a re-identification attack is the re-identification rate: the proportion of records that were correctly re-identified. We used a chi-squared test to determine if the study proportions were homogeneous, where is the number of re-identified records, and the database size, for study . If they were homogeneous, we would treat the individual re-identification attacks as coming from the same general attack, thus estimating the overall proportion of re-identification attacks as simply , known as the equal effects estimator. Otherwise, if they were not homogeneous, we would use the random-effects estimator proposed by Laird and Mosteller .
Re-identification attacks with a low re-identification rate are less likely to be published for two reasons: (a) it is less likely that an adversary will attempt to attack a data set with a low probability of correct re-identification, and (b) attacks that are performed and result in a low success rate are less likely to be published. We examine these two points below.
The overall probability of actual correct re-identification can be expressed as :(1)This means that the overall probability of successful re-identification will depend on whether an adversary will attempt a re-identification to start off with. For the studies included in our review we know that . However, it is generally assumed that if the likelihood of successful re-identification is small then this would act as a deterrent for an adversary to attempt re-identification to start off with (i.e., if is low then is also low) , . By this reasoning, there will be fewer attacks attempted on data sets that have a very low likelihood of being re-identified by an adversary, such as those that have been de-identified using existing standards. The implication then is that we expect fewer studies with a low success rate to be published because they wouldn't be attempted.
If an adversary does attempt an attack, re-identification attacks with lower success rates are less likely to be published because, we would speculate, they are perceived by authors or journal and newspaper editors as less interesting.
On the other hand, an adversary may not wish to reveal a highly successful re-identification attack if the purpose of the attack is questionable. For example, one anecdote claimed that a banker used confidential information provided in loan applications to re-identify patients in a cancer registry with outstanding loans  - the details of such an attack would be unlikely to be published. Even if an attack was for demonstration or evaluation purposes, it may reveal that data were not sufficiently de-identified and the data custodian may not wish to reveal that fact.
If less successful attacks are less likely to be attempted or published, it would raise the overall mean proportion of records re-identified in our review. If more successful attacks are less likely to be published, it would reduce the overall mean proportion of records re-identified.
To examine these effects further, we computed the number of studies that would need to be performed and published to significantly change our mean proportion of records re-identified. This is similar to the computation of a failsafe N value to determine how many unpublished studies with null outcomes would be needed to change the significance of the results in a meta-analysis , . In our analysis, instead of a single null outcome, we examined the sensitivity to a range of values for the proportion of records re-identified. We compared the number of studies required to change the mean proportion of records re-identified to a tolerance value based on the commonly used rule-of-thumb provided in the literature of , where is the number of studies included in the analysis , .
Figure 1 depicts a PRISMA diagram (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) for this review , , and Checklist S1 contains the completed PRISMA checklist. We identified fourteen relevant studies as summarized in Table 2 according to our six criteria described in the “Methods” section.
PRISMA diagram summarizing the steps involved in the systematic review of the re-identification attack literature.
There are several notable observations from our review and the summary table that should be highlighted:
1. Some studies did not report the attack methodology.
Four re-identification attacks only reported the results briefly and had little description of the methodology used: one highly cited result was mentioned in passing as part of another study , an influential result had its methodology sealed as part of a court case , one was mentioned in an affidavit in a court case by a government official with no supporting information , and another example often cited by researchers and policy makers was described in a newspaper article with little description of the precise methodology followed . The remaining 10 studies had more complete descriptions of their attack methodology.
2 Few attacks involve health data.
Six of the fourteen re-identification attacks involved health data. Even though they may influence the general perception of re-identification risk, successful re-identification attacks on other types of data (e.g., Internet search engine queries, movie ratings data, and relationships on social networks) do not necessarily translate into a real risk to health data, as opposed to successful re-identification attacks on health data.
3. Most adversaries were researchers.
Eleven of the fourteen successful re-identification attacks were performed by researchers to demonstrate that a risk exists or to evaluate if one exists, but not to exploit that risk (i.e., demonstration attacks). Only two of the fourteen attacks were conducted to inform a decision. These two re-identification attacks were on health data and both informed court judgments , . The final attack was by journalists who wrote a newspaper article which resulted in the departure of the CTO at the data custodian, the dismissal of the individual responsible for the disclosure, and the data custodian not disclosing other data afterwards , . Four out of the six health data attacks were performed by researchers.
4. Most re-identification attacks were in the US.
Ten of the attacks were performed by US-based investigators on data about or that included US citizens. This likely reflects a larger research community working on identifiability in the US and a greater availability of public and semi-public information for launching re-identification attacks. Four of the six re-identification attacks on health data were on US patient data, and two on Canadian patient data. The success of re-identification attacks will be jurisdiction-dependent because of variation in the availability of public and semi-public registers to use for matching. Successful attacks in the US will not necessarily succeed in other regions.
5. Most re-identification attacks were verified.
Eleven out of the fourteen studies, a significant proportion, did in fact verify their matches. All attacks on health data were verified. This is encouraging because it suggests thoroughness of work in this area.
6. Most re-identified data was not de-identified according to existing standards.
Only two of the studies were attacks on data de-identified in accordance with existing standards , , . The remaining twelve attacks were committed against data that was left in varying degrees of an identifiable state, which only demonstrates that improperly de-identified data can be re-identified. Only one of the six re-identification attacks on health data was on a data set that was de-identified according to one of the existing standards, and it was found that the risk of re-identification was very low , .
The final point is best illustrated through several representative examples. First, recall the case of the re-identification of the Massachusetts governor. The information leveraged for re-identification was the date of birth, gender, and 5-digit residential ZIP code. These three features were not modified in any way prior to dissemination, which means that the claims database would not meet the Safe Harbor standard for de-identification. Second, AOL disclosed Internet search data on more than 675,000 of its users on a public website after replacing the users' names with persistent pseudonyms, but performed no de-identification of the search queries themselves. New York Times reporters were then able to determine the identity of a single individual in the data set from her search queries. However, the queries of the user in question included her town name and even her personal name. It is known that individuals often run search queries on their own names (i.e., vanity queries) and that their locations can be readily determined from the queries themselves , , , , , which makes it somewhat trivial to re-identify individuals from search queries. Third, the court case between the Southern Illinoisan newspaper and the public health department revolved around a cancer registry that included the patients' 5-digit ZIP code, which would not pass the Safe Harbor standard . Finally, Netflix made a database of a sample of its subscribers' movie ratings publicly available for a data mining competition. The authors of the Netflix re-identification attack themselves stated that they believed very little perturbation or other form of de-identification was performed on the movie ratings data before they were disclosed . In addition, there were dates included in the data set, which would make it fail the Safe Harbor standard.
Out of the fourteen attacks, in only two were the data de-identified according to current standards , , . In these attacks, the risk of re-identification was found to be very low. In the first case, the authors matched sample records from the UK Census with records from the general household survey. The re-identification risk from the sample census records had been evaluated in detail by a team of statisticians, was known to be very low, and was documented, and therefore meets the definition of standards-based de-identification , . The survey data could only be obtained under very strict confidentiality conditions. It is important to recognize that neither set of records actually communicated the individuals' identities. Rather the authors of the study verified their matches through the Office of National Statistics which was privy to the corresponding individuals' identities. It was not clear from this study what the exact proportion of records that could be re-identified might be, but the absolute number of matched records was small. The second case was commissioned by HHS to determine the re-identification risk of data de-identified using the HIPAA Safe Harbor standard. This study indicated that 0.013% of the records could be correctly re-identified, which was consistent with previous estimates of the actual risk of re-identification under Safe Harbor , , .
Mean Re-identification Rate
Only 11 out of 14 studies clearly reported a denominator, allowing us to compute the proportion of records re-identified. A chi-squared test of homogeneity across the studies failed at an alpha level of 0.05, indicating heterogeneity. Therefore a simple combination of the proportions is not warranted. We instead used the random-effects estimator proposed by Laird and Mosteller .
We believe that the intent of re-identification varied among studies, in that some only wanted to prove that it could be done and were therefore satisfied with re-identifying a single record , , whereas others were attempting to re-identify as many records as possible in the database , , . Random-effects models take such between-studies variation into account (as opposed to fixed-effects models), but could give more relative weight to attacks on small databases compared to fixed-effects models .
In the case of the random effects estimator we assume an infinite population of 's, with mean and variance . We weight the overall mean using the inverse of the within and between variance. That is, the weight for study is , where is the variance of the true 's , and is the sampling variance for study . The overall mean is therefore estimated by weighted estimates of , such that , with variance estimate .
The confidence intervals for all studies that provided a denominator are shown in the caterpillar plot of Figure 2, and for only the health studies in the caterpillar plot of Figure 3. Caterpillar plots show the differences in the proportion of records re-identified among studies, and how they vary from (and affect) the mean. The overall mean proportion of records re-identified for all studies was 0.262 with 95% CI 0.046–0.478, and for re-identification attacks on health data only was 0.338 with 95% CI 0–0.744. Given such high re-identification rates, it is not surprising that there is a general belief that re-identification is easy. But also, it should be noted that the confidence intervals are quite wide, indicating considerable uncertainty.
Caterpillar plot of the individual mean and confidence intervals for all studies with overall mean proportion.
Caterpillar plot of the individual mean and confidence intervals for health studies with overall mean proportion.
If we remove the studies that had performed standards-based de-identification, then the overall mean proportion across the remainder (the ones not performing standards-based de-identification) was 0.288 (95% CI: 0.056–0.52) and for those on health data only it was 0.42 (95% CI: 0–0.9). The proportion of records that can be correctly re-identified when the data are not de-identified using standards-based methods is quite high.
On the other hand, the single study which was performed on health data that was de-identified using standards-based methods found that only 0.013% of the records could be re-identified. The proportion of records that can be correctly re-identified when the data is de-identified using standards-based methods is very low.
There was only one published re-identification attack on health data that was de-identified using current standards, and it had a low success rate. Possible explanations for the low publication rate of studies that have a low success rate are that: (a) there were fewer attacks attempted on data that has been de-identified using existing standards, and (b) attacks with a low success rate are less likely to be published.
Also twelve of fourteen studies were demonstration attacks performed by highly qualified experts in the field, which would mean that they would likely have higher success rates than those that weren't demonstration attacks. Although, as noted earlier, it is not necessary that all attacks with high success rates will be published, especially if they were not demonstration attacks since there would be less incentive to publicize them.
To examine this more systematically, we computed the number of unpublished studies with re-identification success rates below/above the current mean proportion of records re-identified (i.e., the value) that would be needed to significantly decrease/increase that value. Initially, we assumed that studies with a re-identification success rate of 0.1 were done and not published. We can see in Figure 4 that 23 studies would have to exist such that the upper tail of the new 95% confidence interval would be below the current mean of 0.262. Similarly, 65 studies with a success rate of 0.3 would need to exist such that the lower tail of the new 95% confidence interval would be above the current mean of 0.262. A graph is plotted for different values of assumed success rate for all studies in Figure 4 and for health studies only in Figure 5. These graphs show as a horizontal line the tolerance value, which reflects the plausible number of unpublished studies (the “tolerance”). If the number of studies is below the tolerance value then there is cause for concern about the potential sensitivity of the results to unpublished studies. In general we can see that under most conditions the mean proportion value is sensitive to the existence of unpublished studies that show lower or higher re-identification success rates.
The number of new studies with success rates below/above the current mean that would need to be performed to significantly change the current mean for all studies.
The number of new studies with success rates below/above the current mean that would need to be performed to significantly change the current mean for health studies.
Figure 6 is a funnel plot for published re-identification attacks. This figure is consistent with considerable heterogeneity across studies. As expected, there was significant variation in the proportion of records that were re-identified for studies on small databases (those with higher standard errors). Studies on larger databases tended to have a small success rate (these are clustered around the origin). There were no studies on large databases with a high proportion of records re-identified. The same pattern is amplified for health data in Figure 7. This may be because it is difficult to re-identify many records in a large database (e.g., due to expense and time, and the technical challenges of doing so), or because large databases tend to be better de-identified and therefore have a low re-identification probability.
Funnel plot showing the proportion of records re-identified in all studies against standard error. The points were slightly jittered to reveal overlap.
It is not surprising that policy makers believe that the success rate from re-identification attacks is high. The overall success rate for all re-identification attacks was approximately 26%, and 34% for health data. However, these results mask a more nuanced picture that makes it difficult to draw strong conclusions about the ease of re-identification.
The confidence interval around the above estimates was large, partially because many of the attacks were on small databases. Therefore, there is considerable uncertainty around these numbers.
We found only two studies where the original data was de-identified using current standards and for those the data was successfully re-identified. Only one of these attacks was on health data, and the percentage of records re-identified was 0.013%, which would be considered a very low success rate.
The number of unpublished studies that need to exist for the overall re-identification attack success rates to be shifted up or down was found to be plausible, meaning that the results are sensitive to unpublished attacks. Less successful attacks may not be published if they are perceived as not interesting. More successful attacks may not be published because they could potentially be embarrassing or cause difficulties to the adversaries and/or data custodians if exposed.
Finally, there was considerable heterogeneity among the studies. This makes it difficult to draw strong conclusions from the combined effect estimate of the proportion of records re-identified.
Future research in this area should focus on re-identification attacks on large databases that have been de-identified following existing standards, and success rates should be correlated with how well de-identification was performed. Metrics for measuring the extent of de-identification have been summarized elsewhere . It is only then that we will have an evidence-based understanding of the extent to which de-identification protects against real attacks.
Meanwhile, the evidence suggests that it would be prudent for data custodians to continue to de-identify their data using current best practices. At the same time, due diligence should be applied: data custodians should complement such technical privacy protections with legal safeguards where appropriate, such as data sharing agreements which prohibit re-identification attempts and provide for accountability of one's actions.
The authors wish to thank Nick Barrowman PhD for his statistical advice, and Deven McGraw, J.D., from the Center for Democracy and Technology, Daniel Masys, M.D. and Dan Roden, M.D., from Vanderbilt University, Jane Yakowitz, J.D., from Brooklyn Law School, Daniel Barth-Jones PhD, MPH, from Columbia University, and Margaret Sampson MLIS, PhD, from the Children's Hospital of Eastern Ontario for reviewing and commenting on early drafts of this work. We also thank Kevin Anderson (KA) for performing the inter-rater reliability study.
Conceived and designed the experiments: KEE LA BM. Performed the experiments: KEE EJ LA BM. Analyzed the data: KEE EJ LA BM. Wrote the paper: KEE EJ LA BM.
- 1. Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys 42: BCM FungK. WangR. ChenPS Yu2010Privacy-Preserving Data Publishing: A Survey of Recent Developments.ACM Computing Surveys42
- 2. Perun H, Orr M, Dimitriadis F (2005) H. PerunM. OrrF. Dimitriadis2005Guide to the Ontario Personal Health Information Protection Act: Irwin Law. Guide to the Ontario Personal Health Information Protection Act: Irwin Law.
- 3. U.S. Department of Health and Human Services (2002) Standards for privacy of individually identifiable health information, final rule, 45 CFR, pt 160–164. U.S. Department of Health and Human Services2002Standards for privacy of individually identifiable health information, final rule, 45 CFR, pt 160–164.U.S. Department of Health and Human Services. U.S. Department of Health and Human Services.
- 4. Panel on Research Ethics (2010) Panel on Research Ethics2010Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans (2nd ed). Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans (2nd ed).
- 5. Willison DJ, Emerson C, Szala-Meneok KV, Gibson E, Schwartz L, et al. (2008) Access to medical records for research purposes: varying perceptions across research ethics boards. J Med Ethics 34: 308–314.DJ WillisonC. EmersonKV Szala-MeneokE. GibsonL. Schwartz2008Access to medical records for research purposes: varying perceptions across research ethics boards.J Med Ethics34308314
- 6. McGuire AL, Gibbs RA (2006) Genetics. No longer de-identified. Science 312: 370–371.AL McGuireRA Gibbs2006Genetics. No longer de-identified.Science312370371
- 7. Ohm P (2010) Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57: 1701–1777.P. Ohm2010Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization.UCLA Law Review5717011777
- 8. Brief of Amici Curiae: Electronic Privacy Information Center (EPIC) and Legal Scholars and Technical Experts in Support of the Petitioners (2011) Brief of Amici Curiae: Electronic Privacy Information Center (EPIC) and Legal Scholars and Technical Experts in Support of the Petitioners2011William H. Sorrell, Attorney General of Vermont, et al. v. IMS Health Inc., et al. William H. Sorrell, Attorney General of Vermont, et al. v. IMS Health Inc., et al.
- 9. Curfman GD, Morrissey S, Drazen JM (2011) Prescriptions, privacy, and the First Amendment. N Engl J Med 364: 2053–2055.GD CurfmanS. MorrisseyJM Drazen2011Prescriptions, privacy, and the First Amendment.N Engl J Med36420532055
- 10. Gellman R (2011) The deidentification dilemma: a legislative and contractual proposal. R. Gellman2011The deidentification dilemma: a legislative and contractual proposal.Fordham Intellectual Property, Media & Entertainment Law Journal XXI. Fordham Intellectual Property, Media & Entertainment Law Journal XXI.
- 11. Narayanan A, Shmatikov V (2010) Myths and fallacies of “Personally Identifiable Information”. Commun ACM 53: 24–26.A. NarayananV. Shmatikov2010Myths and fallacies of “Personally Identifiable Information”.Commun ACM532426
- 12. Rothstein MA (2010) Is deidentification sufficient to protect health privacy in research? Am J Bioeth 10: 3–11.MA Rothstein2010Is deidentification sufficient to protect health privacy in research?Am J Bioeth10311
- 13. Cavoukian A, El Emam K (2011) Dispelling the myths about de-identfication: anonymization remains a strong tool. A. CavoukianK. El Emam2011Dispelling the myths about de-identfication: anonymization remains a strong tool.Office of the Information and Privacy Commissioner of Ontario. Office of the Information and Privacy Commissioner of Ontario.
- 14. Canadian Institutes of Health Research (2005) CIHR best practices for protecting privacy in health research. Ottawa: Canadian Institutes of Health Research. Canadian Institutes of Health Research2005CIHR best practices for protecting privacy in health researchOttawaCanadian Institutes of Health Research
- 15. Harris A, Levy AR, Teschke KE (2008) Personal Privacy and Public Health: Potential impacts of privacy legislation on health research in Canada. Canadian Journal of Public Health July–August 2008: 293–296.A. HarrisAR LevyKE Teschke2008Personal Privacy and Public Health: Potential impacts of privacy legislation on health research in Canada.Canadian Journal of Public HealthJuly–August 2008293296
- 16. El Emam K, Dankar FK, Issa R, Jonker E, Amyot D, et al. (2009) A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc 16: 670–682.K. El EmamFK DankarR. IssaE. JonkerD. Amyot2009A globally optimal k-anonymity method for the de-identification of health data.J Am Med Inform Assoc16670682
- 17. Kho ME, Duffett M, Willison DJ, Cook DJ, Brouwers MC (2009) Written informed consent and selection bias in observational studies using medical records: systematic review. BMJ 338: ME KhoM. DuffettDJ WillisonDJ CookMC Brouwers2009Written informed consent and selection bias in observational studies using medical records: systematic review.BMJ338
- 18. Office for Civil Rights (2011) Annual report to congress on breaches of unsecured protected health information for calendar years 2009 and 2010. Office for Civil Rights2011Annual report to congress on breaches of unsecured protected health information for calendar years 2009 and 2010.US Department of Health and Human Services. US Department of Health and Human Services.
- 19. Becker C, Taylor M (2006) Technical difficulties: Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data. Modern Healthcare 38: 6–7.C. BeckerM. Taylor2006Technical difficulties: Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.Modern Healthcare3867
- 20. Robeznieks A (2005) Privacy fear factor arises. Modern Healthcare 35: 6.A. Robeznieks2005Privacy fear factor arises.Modern Healthcare356
- 21. Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25: 98–9110.L. Sweeney1997Weaving technology and policy together to maintain confidentiality.J Law Med Ethics25989110
- 22. Barbaro M, Zeller T Jr (2006) A Face Is Exposed for AOL Searcher No. 4417749. M. BarbaroT. Zeller Jr2006A Face Is Exposed for AOL Searcher No. 4417749.New York Times. New York Times.
- 23. Narayanan A, Shmatikov V (2008) Robust de-anonymization of large datasets. Proc IEEE Security & Privacy Conference 111–125.A. NarayananV. Shmatikov2008Robust de-anonymization of large datasets.Proc IEEE Security & Privacy Conference111125
- 24. U.S. Department of Health and Human Services (2011) Advanced Notice of Proposed Rulemaking for Revision to the Common Rule. U.S. Department of Health and Human Services2011Advanced Notice of Proposed Rulemaking for Revision to the Common Rule.U.S. Department of Health and Human Services. U.S. Department of Health and Human Services.
- 25. Cohen J (1960) A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement XX: 37–46.J. Cohen1960A Coefficient of Agreement for Nominal Scales.Educational and Psychological MeasurementXX3746
- 26. Flack V, Afifi A, Lachenbruch P (1988) Sample size determinations for the two rater kappa statistic. Psychometrika 53: 321–325.V. FlackA. AfifiP. Lachenbruch1988Sample size determinations for the two rater kappa statistic.Psychometrika53321325
- 27. Sim J, Wright CC (2005) The kappa statistic in reliability studies: use, interpretation, and sample size requirements. Phys Ther 85: 257–268.J. SimCC Wright2005The kappa statistic in reliability studies: use, interpretation, and sample size requirements.Phys Ther85257268
- 28. Golle P (2006) pp. 77–80.P. Golle20067780Revisiting the uniqueness of simple demographics in the US population; 2006. Revisiting the uniqueness of simple demographics in the US population; 2006.
- 29. Koot M, Noordende G, de Laat C (2010) M. KootG. NoordendeC. de Laat2010A study on the re-identifiability of Dutch citizens; Workshop on Privacy Enhancing Technologies (PET 2010). A study on the re-identifiability of Dutch citizens; Workshop on Privacy Enhancing Technologies (PET 2010).
- 30. Malin B (2005) Betrayed by my shadow: Learning data identity via trail matching. Journal of Privacy Technology June: 20050609001.B. Malin2005Betrayed by my shadow: Learning data identity via trail matching.Journal of Privacy TechnologyJune20050609001
- 31. Malin BA, Sweeney L (2005) A secure protocol to distribute unlinkable health data. AMIA Annu Symp Proc 485–489.BA MalinL. Sweeney2005A secure protocol to distribute unlinkable health data.AMIA Annu Symp Proc485489
- 32. Homer N, Szelinger S, Redman M, Duggan D, Tembe W, et al. (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4: N. HomerS. SzelingerM. RedmanD. DugganW. Tembe2008Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays.PLoS Genet4
- 33. Jacobs KB, Yeager M, Wacholder S, Craig D, Kraft P, et al. (2009) A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies. Nat Genet 41: 1253–1257.KB JacobsM. YeagerS. WacholderD. CraigP. Kraft2009A new statistic and its power to infer membership in a genome-wide association study using genotype frequencies.Nat Genet4112531257
- 34. Lin Z, Owen AB, Altman RB (2004) Genetics. Genomic research and human subject privacy. Science 305: 183–183.Z. LinAB OwenRB Altman2004Genetics. Genomic research and human subject privacy.Science305183183
- 35. Malin BA (2005) An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc 12: 28–34.BA Malin2005An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future.J Am Med Inform Assoc122834
- 36. Malin B, Loukides G, Benitez K, Clayton E (2011) Identifiability in biobanks: models, measures, and mitigation strategies. Human Genetics 130: 383–392.B. MalinG. LoukidesK. BenitezE. Clayton2011Identifiability in biobanks: models, measures, and mitigation strategies.Human Genetics130383392
- 37. Benitez K, Malin B (2010) Evaluating re-identification risks with respect to the HIPAA privacy rule. J Am Med Inform Assoc 17: 169–177.K. BenitezB. Malin2010Evaluating re-identification risks with respect to the HIPAA privacy rule.J Am Med Inform Assoc17169177
- 38. The Canadian Internet Policy and Public Interest Clinic (2006) The Canadian Internet Policy and Public Interest Clinic2006On the Data Trail: How detailed information about you gets into the hands of organizations with whom you have no relationship. On the Data Trail: How detailed information about you gets into the hands of organizations with whom you have no relationship.
- 39. El Emam K (2006) Data Anonymization Practices in Clinical Research: A Descriptive Study. Ottawa: Health Canada, Access to Information and Privacy Division. K. El Emam2006Data Anonymization Practices in Clinical Research: A Descriptive StudyOttawaHealth Canada, Access to Information and Privacy Division
- 40. UBC Clinical Research Ethics Board, Providence Health Care Research Ethics Board (2003) Interim guidance to clinical researchers regarding compliance with the US Health Insurance Portability and Accountability Act (HIPAA). UBC Clinical Research Ethics Board, Providence Health Care Research Ethics Board2003Interim guidance to clinical researchers regarding compliance with the US Health Insurance Portability and Accountability Act (HIPAA).University of British Columbia. University of British Columbia.
- 41. Hryanszkiewicz I, Norton M, Vickers A, Altman D (2010) Preparing raw clinical data for publications: Guidance for journal editors, authors, and peer reviewers. BMJ 340: c181.I. HryanszkiewiczM. NortonA. VickersD. Altman2010Preparing raw clinical data for publications: Guidance for journal editors, authors, and peer reviewers.BMJ340c181
- 42. Laird N, Mosteller F (1990) Some statistical Methods for Combining Experimental Results. International Journal of Technology Assessment In Health Care 6: 5–30.N. LairdF. Mosteller1990Some statistical Methods for Combining Experimental Results.International Journal of Technology Assessment In Health Care6530
- 43. Marsh C, Skinner C, Arber S, Penhale B, Openshaw S, et al. (1991) The case for samples of anonymized records from the 1991 census. Journal of the Royal Statistical Society, Series A (Statistics in Society) 154: 305–340.C. MarshC. SkinnerS. ArberB. PenhaleS. Openshaw1991The case for samples of anonymized records from the 1991 census.Journal of the Royal Statistical Society, Series A (Statistics in Society)154305340
- 44. Elliot M, Dale A (1999) Scenarios of attack: the data intruders perspective on statistical disclosure risk. Netherlands Official Statistics 14: 6–10.M. ElliotA. Dale1999Scenarios of attack: the data intruders perspective on statistical disclosure risk.Netherlands Official Statistics14610
- 45. Bartlett E (1993) RMS need to safeguard computerized patient records to protect hospitals. Hospital Risk Management 15: E. Bartlett1993RMS need to safeguard computerized patient records to protect hospitals.Hospital Risk Management15
- 46. Rosenthal R (1979) The ‘file drawer’ problem and tolerance for null results. Phsycological Bulletin 86: 638–641.R. Rosenthal1979The ‘file drawer’ problem and tolerance for null results.Phsycological Bulletin86638641
- 47. Mullen B, Muellerleile P, Bryant B (2001) Cumulative meta-analysis: A consideration of indicators of sufficiency and stability. Personality and Social Psychology Bulletin 27: 1450–1462.B. MullenP. MuellerleileB. Bryant2001Cumulative meta-analysis: A consideration of indicators of sufficiency and stability.Personality and Social Psychology Bulletin2714501462
- 48. Sterne J, Becker B, Egger M (2005) The funnel plot. In: Rothstein H, Sutton A, Borenstein M, editors. Publication bias in meta-analysis. Wiley. J. SterneB. BeckerM. Egger2005The funnel plot.H. RothsteinA. SuttonM. BorensteinPublication bias in meta-analysisWiley
- 49. Sterne J, Egger M (2001) Funnel plots for detecting bias in meta-analysis: Guidelines on choice of axis. Journal of Clinical Epidemiology 54: 1046–1055.J. SterneM. Egger2001Funnel plots for detecting bias in meta-analysis: Guidelines on choice of axis.Journal of Clinical Epidemiology5410461055
- 50. Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gotzsche PC, et al. (2009) The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 62: 1–34.A. LiberatiDG AltmanJ. TetzlaffC. MulrowPC Gotzsche2009The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration.J Clin Epidemiol62134
- 51. Moher D, Liberati A, Tetzlaff J, Altman DG (2009) Preferred reporting items for systematic reviews and meta-analyses: the statement. PLoS Med 6: e1000097.D. MoherA. LiberatiJ. TetzlaffDG Altman2009Preferred reporting items for systematic reviews and meta-analyses: the statement.PLoS Med6e1000097
- 52. The Supreme Court of the State of Illinois (2006) The Supreme Court of the State of Illinois2006Southern Illinoisan vs. The Illinois Department of Public Health. Southern Illinoisan vs. The Illinois Department of Public Health.
- 53. Federal Court: Canada (2007) Mike Gordon v. the Minister of Health and the Privacy Commissioner of Canada: Memorandum of Fact and Law of the Privacy Commissioner of Canada. Federal Court. Federal Court: Canada2007Mike Gordon v. the Minister of Health and the Privacy Commissioner of Canada: Memorandum of Fact and Law of the Privacy Commissioner of Canada.Federal Court
- 54. Hansell S (2006) S. Hansell2006AOL Removes Search Data on Group of Web Users New York Times. AOL Removes Search Data on Group of Web Users New York Times.
- 55. Zeller T Jr (2006) AOL Moves to Increase Privacy on Search Queries. T. Zeller Jr2006AOL Moves to Increase Privacy on Search Queries.New York Times. New York Times.
- 56. Elliot M (2003) The Evaluation of Risk from Identification Attempts. Manchester: University of Manchester. pp. 1–29.M. Elliot2003The Evaluation of Risk from Identification AttemptsManchesterUniversity of Manchester129
- 57. Kwok P, Davern M, Hair E, Lafky D (2011) Harder than you think: a case study of re-identification risk of HIPAA-compliant records. Chicago: NORC at The University of Chicago. Abstract #302255. P. KwokM. DavernE. HairD. Lafky2011Harder than you think: a case study of re-identification risk of HIPAA-compliant recordsChicagoNORC at The University of Chicago. Abstract #302255
- 58. Lafky D (2010) The Safe Harbor method of de-identification: An empirical test. D. Lafky2010The Safe Harbor method of de-identification: An empirical test.Fourth National HIPAA Summit West. Fourth National HIPAA Summit West.
- 59. Gan Q, Attenberg J, Markowetz A, Suel T (2008) Analysis of geographic queries in a search engine log. Proceedings of the first international workshop on Location and the web. Beijing, China: ACM. Q. GanJ. AttenbergA. MarkowetzT. Suel2008Analysis of geographic queries in a search engine log. Proceedings of the first international workshop on Location and the webBeijing, ChinaACM
- 60. Hassan A, Jones R, Diaz F (2009) Geographic features in web search retrieval; 2009. ACM. A. HassanR. JonesF. Diaz2009Geographic features in web search retrieval; 2009ACM
- 61. Jones R, Hassan A, Diaz F (2008) Geographic features in web search retrieval. International Journal of Geographical Information Science 22: 229–246.R. JonesA. HassanF. Diaz2008Geographic features in web search retrieval.International Journal of Geographical Information Science22229246
- 62. Jones R, Kumar R, Pang B, Tomkins A (2007) “I know what you did last summer”: query logs and user privacy. Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. Lisbon, Portugal: ACM. R. JonesR. KumarB. PangA. Tomkins2007“I know what you did last summer”: query logs and user privacy. Proceedings of the sixteenth ACM conference on Conference on information and knowledge managementLisbon, PortugalACM
- 63. Sanderson M, Kohler J (2004) Analyzing geographic queries. Workshop on Geographic Information Retrieval SIGIR. M. SandersonJ. Kohler2004Analyzing geographic queries.Workshop on Geographic Information Retrieval SIGIR
- 64. Marsh C, Dale A, Skinner C (1994) Safe data versus safe settings: Access to microdata from the British census. International Statistical Review 62: 35–53.C. MarshA. DaleC. Skinner1994Safe data versus safe settings: Access to microdata from the British census.International Statistical Review623553
- 65. Sweeney LData sharing under HIPAA: 12 years later. Workshop on the HIPAA Privacy Rule's De-Identification Standard, March 8–9, 2010. Washington, D.C.: U.S. Department of Health and Human Services. L. SweeneyData sharing under HIPAA: 12 years later. Workshop on the HIPAA Privacy Rule's De-Identification Standard, March 8–9, 2010Washington, D.C.U.S. Department of Health and Human Services
- 66. National Committee on Vital and Health Statistics (2007) National Committee on Vital and Health Statistics2007Report to the Secretary of the U.S. Department of Health and Human Services on Enhanced Protections for Uses of Health Data: A Stewardship Framework for “Secondary Uses” of Electronically Collected and Transmitted Health Data. Report to the Secretary of the U.S. Department of Health and Human Services on Enhanced Protections for Uses of Health Data: A Stewardship Framework for “Secondary Uses” of Electronically Collected and Transmitted Health Data.
- 67. Sweeney L (2002) k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10: 557–570.L. Sweeney2002k-anonymity: a model for protecting privacy.International Journal on Uncertainty, Fuzziness and Knowledge-based Systems10557570
- 68. Poole C, Greenland S (1999) Random-effects meta-analyses are not always conservative. American Journal of Epidemiology 469–475.C. PooleS. Greenland1999Random-effects meta-analyses are not always conservative.American Journal of Epidemiology469475
- 69. El Emam K (2010) Methods for the de-identification of electronic health records. Genome Medicine 3: 25.K. El Emam2010Methods for the de-identification of electronic health records.Genome Medicine325
- 70. Bender S, Brand R, Bacher J (2001) Re-identifying register data by survey data: An empirical study. Statistical Journal of the United Nations ECE 18: 373–381.S. BenderR. BrandJ. Bacher2001Re-identifying register data by survey data: An empirical study.Statistical Journal of the United Nations ECE18373381
- 71. Ochoa S, Rasmussen J, Robson C, Salib M (2001) Reidentification of individuals in Chicago's homicide database: A technical and legal study. Massachusetts Institute of Technology. S. OchoaJ. RasmussenC. RobsonM. Salib2001Reidentification of individuals in Chicago's homicide database: A technical and legal study.Massachusetts Institute of Technology
- 72. Brownstein JS, Cassa CA, Mandl KD (2006) No place to hide–reverse identification of patients from published maps. N Engl J Med 355: 1741–1742.JS BrownsteinCA CassaKD Mandl2006No place to hide–reverse identification of patients from published maps.N Engl J Med35517411742
- 73. Frankowski D, Cosley D, Sen S, Terveen L, Riedl J (2006) You are what you say: Privacy risks of public mentions. SIGIR '06. Seattle: ACM. D. FrankowskiD. CosleyS. SenL. TerveenJ. Riedl2006You are what you say: Privacy risks of public mentions. SIGIR '06SeattleACM
- 74. Backstrom , Dwork , Kleinberg (2007) Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. WWW 2007. Banff: ACM. BackstromDworkKleinberg2007Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. WWW 2007BanffACM
- 75. El Emam K, Kosseim P (2009) Privacy Interests in Prescription Data, Part 2: Patient Privacy. Security & Privacy, IEEE 7: 75–78.K. El EmamP. Kosseim2009Privacy Interests in Prescription Data, Part 2: Patient Privacy.Security & Privacy, IEEE77578
- 76. Narayanan A, Shmatikov V (2009) De-anonymizing Social Networks. Proc 30th IEEE Symposium on Security and Privacy 173–187.A. NarayananV. Shmatikov2009De-anonymizing Social Networks.Proc 30th IEEE Symposium on Security and Privacy173187