Assessing data intrusion threats. Barth-Jones D, El Emam K, Bambauer J, Cavoukian A, Malin B (2015) Science 348: 194-5 Return of genomic results to research participants: the floor, the ceiling, and the choices in between. Jarvik GP, Amendola LM, Berg JS, Brothers K, Clayton EW, Chung W, Evans BJ, Evans JP, Fullerton SM, Gallego CJ, Garrison NA, Gray SW, Holm IA, Kullo IJ, Lehmann LS, McCarty C, Prows CA, Rehm HL, Sharp RR, Salama J, Sanderson S, Van Driest SL, Williams MS, Wolf SM, Wolf WA, eMERGE Act-ROR Committee and CERC Committee, CSER Act-ROR Working Group, Burke W (2014) Am J Hum Genet 94: 818-26 Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Malin B (2017) Am J Hum Genet 100: 316-322 On sharing quantitative trait GWAS results in an era of multiple-omics data and the limits of genomic privacy. Im HK, Gamazon ER, Nicolae DL, Cox NJ (2012) Am J Hum Genet 90: 591-8 Anonymization of electronic medical records for validating genome-wide association studies. Loukides G, Gkoulalas-Divanis A, Malin B (2010) Proc Natl Acad Sci U S A 107: 7898-903 Ethical, legal, and social implications of incorporating genomic information into electronic health records. Hazin R, Brothers KB, Malin BA, Koenig BA, Sanderson SC, Rothstein MA, Williams MS, Clayton EW, Kullo IJ (2013) Genet Med 15: 810-6 SecureMA: protecting participant privacy in genetic association meta-analysis. Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, Malin BA (2014) Bioinformatics 30: 3334-41 Identifiability in biobanks: models, measures, and mitigation strategies. Malin B, Loukides G, Benitez K, Clayton EW (2011) Hum Genet 130: 383-92 A systematic review of re-identification attacks on health data. El Emam K, Jonker E, Arbuckle L, Malin B (2011) PLoS One 6: e28071 Enabling genomic-phenomic association discovery without sacrificing anonymity. Heatherly RD, Loukides G, Denny JC, Haines JL, Roden DM, Malin BA (2013) PLoS One 8: e53875 A game theoretic framework for analyzing re-identification risk. Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Ganta R, Heatherly R, Malin BA (2015) PLoS One 10: e0120592 Direct-to-consumer genomics companies should provide guidance to their customers on (not) sharing personal genomic information. Garrison NA, Non AL (2014) Am J Bioeth 14: 55-7 An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Malin BA (2005) J Am Med Inform Assoc 12: 28-34 How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Malin B, Sweeney L (2004) J Biomed Inform 37: 179-92 Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. Malin B, Karp D, Scheuermann RH (2010) J Investig Med 58: 11-8 A community assessment of privacy preserving techniques for human genomes. Jiang X, Zhao Y, Wang X, Malin B, Wang S, Ohno-Machado L, Tang H (2014) BMC Med Inform Decis Mak 14 Suppl 1: S1 Protecting genomic sequence anonymity with generalization lattices. Malin BA (2005) Methods Inf Med 44: 687-92
Hints: (1) double-click or double-tap to navigate to a node. (2) Grab a node and move it to arrange the graph.