A De-Identification Tool for Users in Medical Operations and Public Health

被引:0
作者
Salloway, Mark K. [1 ]
Deng, Xiaodong [1 ]
Ning, Yilin [3 ]
Kao, Shih Ling [3 ]
Chen, Ying [2 ]
Schaefer, G. Owen [4 ]
Chin, Jacqueline Joon-Lin [4 ]
Tai, E-Shyong [3 ]
Tan, Chuen Seng [2 ]
机构
[1] Natl Univ Singapore, Natl Univ Hlth Syst, Ctr Hlth Serv & Policy Res, Singapore, Singapore
[2] Natl Univ Singapore, Natl Univ Hlth Syst, Saw Swee Hock Sch Publ Hlth, Singapore, Singapore
[3] Natl Univ Singapore, Natl Univ Hlth Syst, Yong Loo Lin Sch Med, Div Endocrinol,Dept Med, Singapore, Singapore
[4] Natl Univ Singapore, Natl Univ Hlth Syst, Yong Loo Lin Sch Med, Ctr Biomed Eth, Singapore, Singapore
来源
2016 3RD IEEE EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL AND HEALTH INFORMATICS | 2016年
关键词
privacy; de-identification; data sharing; public health; tokenization; mapping tables; masking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multiple clinical, business and operational use cases from Electronic Health Records (EHR) systems has resulted in the availability of large quantities of longitudinal data. The secondary use of these data for research provides opportunities to generate insights that can help shape the design and delivery of health care services. Methods that allow the deidentification of these datasets facilitate their use for research while minimizing the loss of privacy. In addition, to optimize the use of the data, particularly for longitudinal datasets, the ability to generate the same unique identifier for each individual allows re-linking as more data on the same individual becomes available over time. This paper details an open source software tool named Ezy De-Identifier, developed to make the assignment of pseudo-identifiers simple to users in a medical operations and public health setting, and reports the user's perspectives of the tool through a survey. In addition, we view the tool from the perspective of research reproducibility and security, and explore its application to generate a dataset satisfying established dataset protection requirements.
引用
收藏
页码:529 / 532
页数:4
相关论文
共 20 条
  • [1] [Anonymous], 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
  • [2] Benson J.A., 2001, METHOD INFORM MED, V40, P190
  • [3] Bialke M., 2015, METHODS INF MED
  • [4] Celi L.A., 2014, JMIR MED INFORM MIT
  • [5] DaSA, 2016, EZ DEID TOOL HOM
  • [6] DAVIS F.B., 1989, MANAGE SCI, P35
  • [7] Emam K., 2013, GUIDE DEIDENTIFICATI
  • [8] Forrester, 2010, EL HLTH REC AR DRIV
  • [9] Garfinkel S. L., 2015, DEIDENTIFICATION PER
  • [10] HealthIT. gov, 2015, WHAT IS EL HLTH REC