2010
DOI: 10.1073/pnas.0911686107
|View full text |Cite
|
Sign up to set email alerts
|

Anonymization of electronic medical records for validating genome-wide association studies

Abstract: Genome-wide association studies (GWAS) facilitate the discovery of genotype-phenotype relations from population-based sequence databases, which is an integral facet of personalized medicine. The increasing adoption of electronic medical records allows large amounts of patients' standardized clinical features to be combined with the genomic sequences of these patients and shared to support validation of GWAS findings and to enable novel discoveries. However, disseminating these data "as is" may lead to patient … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
149
0
6

Year Published

2011
2011
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 115 publications
(156 citation statements)
references
References 13 publications
1
149
0
6
Order By: Relevance
“…More important, researchers need medical data for carrying out data analysis, statistical analysis and machine learning applications. Common privacy-preserving methods include disclosure control [162,163], output perturbation [164,165] and anonymization [166,167].…”
Section: Privacymentioning
confidence: 99%
“…More important, researchers need medical data for carrying out data analysis, statistical analysis and machine learning applications. Common privacy-preserving methods include disclosure control [162,163], output perturbation [164,165] and anonymization [166,167].…”
Section: Privacymentioning
confidence: 99%
“…There are tools and techniques available to anonymize data like Datafly, k-anonymization and others. (Loukides et al, 2010) (Sweeney, 1998) (Sweeney, 2002) There are also methods through which data anonymization can be decrypted, for example, Sweeney et al, 2013 succeeded in breaking the data anonymization code in the personal genome project and were able to identify the participants in the project. Heffetz and Ligett, 2014 discuss a few cases, including the personal genome project (Sweeney et al, 2013), of unintentional privacy breaches where the research studies were presumed to maintain the privacy of the subjects, but later it was discovered that the participants where identifiable.…”
mentioning
confidence: 99%
“…T e liabilities involved on the part of data donors and users are high, and gigabyte networks are still limited to certain institutions. Although deidentif cation and privacy-protection algorithms can mitigate the conf dentiality problem (13)(14)(15)(16)(17), once data are downloaded there is no way to track their use, and there is still some risk of reidentif cation (18).…”
Section: " "mentioning
confidence: 99%