RoushS.BirkheadG. and KooD., “Mandatory Reporting of Diseases and Conditions by Health Care Professionals and Laboratories”JAMA282, no. 2(1999): 164–170.
2.
EmamK. ElHuJ. and MercerJ., “A Secure Protocol for Protecting the Identity of Providers When Disclosing Data for Disease Surveillance”Journal of the American Medical Informatics Association18 (2011): 212–217.
3.
Id.; and EmamK. ElMercerJ. and MoreauK., “Physician Privacy Concerns When Disclosing Patient Data for Public Health Purposes During a Pandemic Influenza Outbreak”BMC Public Health11, no. 1(2011): 454.
4.
SenguptaS.CalmanN. S. and HripcsakG.“A Model for Expanded Public Health Reporting in the Context of HIPAA”Journal of the American Medical Informatics Association15 (2008):569–574; and HodgeJ. G.Jr.“Health Information Privacy and Public Health”Journal of Law, Medicine and Ethics31, no. 4(2003): 663–671.
5.
See EmamEl, supra note 2.
6.
See Roush, supra note 1.
7.
EmamK. ElDankarF. and IssaR.“A Globally Optimal k-Anonymity Method for the De-identification of Health Data”Journal of the American Medical Informatics Association16, (2009):670–682; and EmamK. El and DankarF. K.“Protecting Privacy Using k-Anonymity”Journal of the American Medical Informatics Association15, (2008): 627–637.
8.
See EmamEl, (2009), id.
9.
Id.
10.
CassaC. A.GrannisS. J. and OverhageJ. M.“A Context-Sensitive Approach to Anonymizing Spatial Surveillance Data: Impact on Outbreak Detection”Journal of the American Medical Informatics Association13 (2006): 160–165.
11.
CassaC. A.WielandS. C. and MandlK. D.“Re-identification of Home Addresses from Spatial Locations Anonymized by Gaussian Skew”International Journal of Health Geographics7, no. 1(2008): 45.
12.
WielandS. C.CassC. A. and MandlK. D.“Revealing the Spatial Distribution of a Disease While Preserving Privacy”Proceedings of the National Academy of Science USA105, no. 46(2008): 17608–17613.
13.
JoshiD.SohL. and SamalA.“Redistricting Using Heuristic-Based Polygonal Clustering”Ninth IEEE International Conference on Data Mining (2009): 830–835”; JoshiD.SohL. and SamalA.“Redistricting Using Constrained Polygonal Clustering”IEEE Transactions on Knowledge and Data Engineering24, no. 11(2012): 2065–2079.
14.
Infection Prevention and Control at Long Term Care Homes, Legislative Assembly of Ontario (2011) (Standing Committee on Public Accounts).
15.
See EmamEl, supra note 2.
16.
LelkesY.KrosnickJ. A. and MarxD. M.“Complete Anonymity Comprises the Accuracy of Self-Reports”Journal of Experimental Social Psychology48, no. 6(2012): 1291–1299.
17.
MazarN.AmirO. and ArielyD.“The Dishonesty of Honest People: A Theory of Self-Concept Maintenance”Journal of Marketing Research45, no. 6(2008): 633–644.
18.
ZhongC.-B.BohnsV. K. and GinoF.“Good Lamps Are the Best Police: Darkness Increase Dishonesty and Self-Interested Behavior”Psychological Science21, no. 3(2010): 311–314.
19.
BoydJ.“In Community We Trust: Online Security Communication at eBay”Journal of Computer-Mediated Communication7, no. 3(2002).
20.
NowakG. J. and PhelpsJ. E.“Understanding Privacy Concerns: An Assessment of Consumers' Information-Related Knowledge and Beliefs”Journal of Direct Marketing6, no. 4(1992): 28–39.
21.
SingerE.Von ThurnD. R. and MillerE. R.“Confidentiality Assurances and Response: A Quantitative Review of the Experimental Literature”Public Opinion Quarterly59, no. 1(1995): 66–77.
22.
JohnL. K.AcquistiA. and LoewensteinG.“Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information”Journal of Consumer Research37, no. 5(2011): 858–873.
23.
FreyJ. H.“An Experience with a Confidentiality Reminder in a Telephone Survey”Public Opinion Quarterly50, no. 2(1986):267–269; SingerE.HipplerH.-J. and SchwarzN.“Confidentiality Assurances in Surveys: Reassurance or Threat?”International Journal of Public Opinion4, no. 3(1992): 256–268.
24.
AcquistiA.JohnL. K. and LoewensteinG.“What Is Privacy Worth?”Twenty First Workshop on Information Systems and Economics (WISE), Phoenix, AZ (2009):14–15; WillisonD. J.SteevesV. and CharleC.“Consent for Use of Personal Information for Health Research: Do People with Potentially Stigmatizing Health Conditions and the General Public Differ in Their Opinions”BMC Medical Ethics10, no. 1(2009): 10.
25.
LewandowskyS.EckerU.K.H. and SeifertC.M.“Misinformation and Its Correction: Continued Influence and Successful Debiasing”Psychological Science in the Public Interest13, no. 3(2012):106–131; and WoodsK. M. and McNamaraR. J., “Confidentiality: Its Effect on Interviewee Behavior”Professional Psychology11, no. 5(1980): 714–721.
26.
JoinsonA.N.ReipsU.-D. and BuchananT.“Privacy Trust and Self-Disclosure Online”Human-Computer Interaction25, no. 1(2012):1–24; and MoormanC.DeshpandeR. and ZaltmanG.“Factors Affecting Trust in Market Research Relationships”Journal of Marketing57 (1993): 81–101.