2022
DOI: 10.1093/bib/bbac440
|View full text |Cite
|
Sign up to set email alerts
|

Open tools for quantitative anonymization of tabular phenotype data: literature review

Abstract: Precision medicine relies on molecular and systems biology methods as well as bidirectional association studies of phenotypes and (high-throughput) genomic data. However, the integrated use of such data often faces obstacles, especially in regards to data protection. An important prerequisite for research data processing is usually informed consent. But collecting consent is not always feasible, in particular when data are to be analyzed retrospectively. For phenotype data, anonymization, i.e. the altering of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 49 publications
0
11
0
Order By: Relevance
“…While an increasing number of examples of real-world applications of anonymization algorithms are published [ 12 , 15 , 16 ], we did not come across any investigations that measured the reproducibility (eg, by 95% CI overlap) of descriptive real-world analyses except for prior work on the GCKD study. However, several studies focusing on preserving the utility of anonymized data for descriptive real-world analyses without explicitly introducing use case–specific measures have been published.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While an increasing number of examples of real-world applications of anonymization algorithms are published [ 12 , 15 , 16 ], we did not come across any investigations that measured the reproducibility (eg, by 95% CI overlap) of descriptive real-world analyses except for prior work on the GCKD study. However, several studies focusing on preserving the utility of anonymized data for descriptive real-world analyses without explicitly introducing use case–specific measures have been published.…”
Section: Discussionmentioning
confidence: 99%
“…Anonymization can be performed using various transformation mechanisms, such as suppression, randomization, or generalization. Software-enabled solutions have been developed with implementations of published algorithms to support this process [ 12 ]. Yet, there is an inherent trade-off between the reduction of privacy risks and the utility of the data that can be shared [ 13 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, one should reduce the amount of detail when it comes to meta data. 205 For example, instead of reporting a table with the exact ages of participants, a range can be reported instead. Finally, many departments and universities employ data stewards or data protection managers that can advise researchers on how to comply with local and national data sharing policies and implement FAIR data sharing principles.…”
Section: Data and Code Availabilitymentioning
confidence: 99%
“…We further recommend avoiding sharing data that is not essential for the research question or follow-up analyses but has a high disclosure risk (e.g., an unusual finding). Furthermore, one should reduce the amount of detail when it comes to meta data 205 . For example, instead of reporting a table with the exact ages of participants, a range can be reported instead.…”
Section: Step-by-step Fnirs Study Designmentioning
confidence: 99%