Index

A

acceptable risk, Evaluation Is Key
access, T3: Data Breach
accountability, T3: Data Breach
actual knowledge, Lists
additives, Bringing Paillier to the Parties
adversary power, Longitudinal Events Data: A Disaster RegistryA Sample of Power, Many Quasi-Identifiers
of events, The Power of EventsThe Power of Events
keeping in check, Keeping Power in Check
in practice, Power in Practice
quasi-identifier for, Power in Practice
samples of, A Sample of PowerA Sample of Power
alerts, anonymization and, Use Cases
all-knowing adversaries, Final Thoughts
American Society of Clinical Oncology (ASCO), Masking: Oncology Databases
analytics, ethics and, Stigmatizing Analytics
Anatomic Therapeutic Chemical (ATC) classification, The (Alpha)Digits of Drugs
converting NDCs to, The (Alpha)Digits of Drugs
anonymization, IntroductionAbout This Book
alerts and, Use Cases
applications for, Anonymization in Other DomainsAnonymization in Other Domains
automating, Making It Automated
benefits of, To Anonymize or Not to Anonymize
consent or, Consent, or Anonymization?
costs of, Penny Pinching
data warehouses and, Use Cases
de-identification, The Two Pillars of Anonymization
de-identification standards, De-Identification StandardsRisk-based methodology
direct identifiers, Step 1: Selecting Direct and Indirect Identifiers
ethics and, Stigmatizing Analytics
masking, The Two Pillars of Anonymization
masking standards for, Masking Standards
medical devices and, Use Cases
open data and, Use Cases
organizational readiness for, Organizational ...

Get Anonymizing Health Data now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.