Protecting Health Information. Ensuring Data Integrity.
Protecting Health Information. Ensuring Data Integrity.

Journals

  1. V. Raparelli, C.M. Norris, U. Bender, M.T. Herrero, A. Kautzky –Willer, K. Kublickiene, K. El Emam, L. Pilote and the GOING‑FWD Collaborators: “Identification and inclusion of gender factors in retrospective cohort studies:the GOING-FWD framework”, BMJ Global Health, 6:e005413, 2021.
  2. Z. Azizi, T. Gisinger, U. Bender, C. Deischinger, V. Raparelli, C.M. Norris, RN, K. Kublickiene, M.T. Herreror, K. El Emam, A. Kautzky-Willer, L. Pilote, and the GOING-FWD Investigators: “Sex, Gender Factors and Cardiovascular Health in Canadian and Austrian populations”, Canadian Journal of Cardiology, March 27, 2021.
  3. Z. Azizi, M. Zheng, L. Mosquera, L. Pilote, K. El Emam: “Can synthetic data be a proxy for real clinical trial data? A validation study”, BMJ Open, 11:e043497, 2021.
  4. K. El Emam, L. Mosquera, E. Jonker, H. Sood: “Evaluating the Utility of Synthetic COVID-19 Case Data”, JAMIA Open, 14(1):ooab012, January 2021.
  5. El Emam, L. Mosquera, C. Zheng: “Optimizing the Synthesis of Clinical Trial Data Using Sequential Trees”, Journal of the American Medical Informatics Association 28(1): 3-13, 2021.
  6. K. El Emam, L. Mosquera, J. Bass: “Evaluating Identity Disclosure Risk in Fully Synthetic Health Data”, Journal of Medical Internet Research, 22(11), 2020.
  7. W. Parker, J.L. Jaremko, M. Cicero, M. Azar, K. El Emam, B.G. Gray, C. Hurrell, F. Lavoie-Cardinal, B. Desjardins, A. Lum, L. Sheremeta, E. Lee, C. Reinhold, A. Tang, R. Bromwich: “Canadian Association of Radiologists White Paper on De-Identification of Medical Imaging: Part 1, General Principles”, Canadian Association of Radiologists Journal,  72(1):13-24, 2021.
  8. W. Parker, J.L. Jaremko, M. Cicero, M. Azar, K. El Emam, B.G. Gray, C. Hurrell, F. Lavoie-Cardinal, B. Desjardins, A. Lum, L. Sheremeta, E. Lee, C. Reinhold, A. Tang, R. Bromwich: “Canadian Association of Radiologists White Paper on De-Identification of Medical Imaging: Part 2, Practical Considerations”, Canadian Association of Radiologists Journal, 72(1):25-34, 2021.
  9. El Emam: “Implementing Privacy Enhancing Technologies in the time of a Pandemic”, Journal of Data Protection and Privacy, 3(3), Summer 2020.
  10. K. El Emam, M. Hintze, R. Boardman: “Does de-identification require consent under the GDPR and English Common Law?” Journal of Data Protection and Privacy, 3(3), Summer 2020.
  11. K. El Emam: “Seven Ways to Evaluate the Utility of Synthetic Data”, In IEEE Security and Privacy, 18(4): 56-59, July-Aug, 2020.
  12. J. Branson, N. Good, J. Chen, W. Monge, C. Probst, K. El Emam. “Evaluating the re-identification risk of a clinical study report anonymized under EMA Policy 0070 and Health Canada Regulations”. In Trials 21:200, 2020.
  13. K. El Emam: “Expanding the role of PETs in the data protection and privacy narrative”, In Journal of Data Protection and Privacy, 2(3):198-200, 2019.
  14. M. Hintze and K. El Emam: “Comparing the benefits of pseudonymisation and anonymisation under the GDPR”, In Journal of Data Protection and Privacy, 2(2):145-158, 2018.
  15. Anthony L. Vaccarino, Moyez Dharsee, Stephen Strother, Don Aldridge, Stephen R. Arnott, Brendan Behan, Costas Dafnas, Fan Dong, Kenneth Edgecombe, Rachad El-Badrawi, Khaled El-Emam, Tom Gee, Susan G. Evans, Mojib Javadi, Francis Jeanson, Shannon Lefaivre, Kristen Lutz, F. Chris MacPhee, Jordan Mikkelsen, Tom Mikkelsen, Nicholas Mirotchnick, Tanya Schmah, Christa M. Studzinski, Donald T. Stuss, Elizabeth Theriault and Kenneth R. Evans:  “Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data”, In Frontiers in Neuroinformatics, May, 2018.
  16. N. Persaud, C. Meaney, K. El Emam, R. Moineddin, K. Thorpe: “Doxylamine-pyridoxine for nausea and vomiting of pregnancy randomized placebo controlled trial: prespecified analyses and reanalysis“. PLOS ONE, 13(1): e0189978, January 2018.
  17. G.M. Jacquez, A. Essex, A. Curtis, B. Kohler, R. Sherman, K. El Emam, C. Shi, A. Kaufmann, L. Beale, T. Cusick, D. Goldberg, P. Goovaerts: “Geospatial cryptography: Enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention“. In Journal of Geographic Systems, 19(3):197-220, July 2017.
  18. L. Arbuckle, E. Moher. S. Ahmed, S. Bartlett, K. El Emam: “Montreal Accord on Patient-Reported Outcomes Use Series – Paper 9: Anonymization and Ethics Considerations for Capturing and Sharing Patient Reported Outcomes”. In Journal of Clinical Epidemiology, 89:168-172, September 2017.
  19. K. El Emam: “An Overview of Anonymization Practices in Initial Data Releases Pursuant to EMA Policy 0070”. In Applied Clinical Trials, April 13, 2017.
  20. M. Scaiano, G. Middleton, L. Arbuckle, V. Kolhatkar, L. Peyton, M. Dowling, D.S. Gipson, K. El Emam: “A unified framework for evaluating the risk of re-identification of text de-identification tools”. In Journal of Biomedical Informatics, 63:174-183, 2016.
  21. K. El Emam: “Medical Data Privacy Handbook, A. Gkoulalas-Divanis, G. Loukides. Springer International Publishing, Switzerland (2015). 832 pp., ISBN: 978-3-319-23633-9″. (Book Review), In Journal of Biomedical Informatics, 62:106, 2016.
  22. E. Moher, K. El Emam: “The Ethical Merits of Nudges in the Clinical Setting“. In American Journal of Bioethics, 15(10):54-5, 2015.
  23. K. El Emam, H. Farah, S. Samet, A. Essex, E. Jonker, M. Kantarcioglu, C. Earle: “A Privacy Preserving Protocol for Tracking Participants in Phase I Clinical Trials”. In Journal of Biomedical Informatics, October 2015, 57:145-162.
  24. K. El Emam, S. Rodgers, B. Malin: “Anonymizing and Sharing Individual Patient Level Data.” In BMJ 350:h1139, 2015.
  25. K. El Emam, K. Abdallah: “De-identifying Clinical Trials Data”. In Applied Clinical Trials, 24(8), 2015.
  1. K. El Emam, C. Álvarez: “A Critical Appraisal of the Article 29 Working Party Opinion 05/2014 on Data Anonymization Techniques”. In International Data Privacy Law 5 (1): 73-87, 2015.
  2. H-W. Jung, K. El Emam: “A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes.” In the International Journal of Health Geographics 13(16), 2014.
  3. K. El Emam, L. Arbuckle, A. Essex, S. Samet, B. Eze, G. Middleton, D. Buckeridge, E. Jonker, E. Moher, C. Earle: “Secure Surveillance of Antimicrobial Resistant Organism Colonization in Ontario Long Term Care Homes.” In PLoS ONE 9(4), 2014.
  4. U. Ogbogu, S. Burningham, A. Ollenberger, K. Calder, L. Du, K. El Emam, R. Hyde-Lay, R. Isasi, Y. Joly, I. Kerr, B. Malin, M. McDonald, S. Penney, G. Piat, D.C. Roy, J. Sugarman, S. Vercauteren, G. Verhenneman, L. West, T. Caulfield: “Policy recommendations for addressing privacy challenges associated with cell-based research and interventions.” BMC Med Ethics. 15:7, 2014.
  5. K. El Emam, F. Dankar, A. Neisa. E. Jonker: “Evaluating the risk of patient re-identification from adverse drug event reports.” In BMC Medical Informatics and Decision Making 13(114), 2013.
  6. V. Bobicev, M. Sokolova, K. El Emam, Y. Jafer, B. Dewar, E. Jonker, S. Matwin: “Can Anonymous Posters on Medical Forums be Reidentified?” In the Journal of Medical Internet Research 15(10), 2013.
  7. K. El Emam, E. Moher: “Privacy and anonymity challenges when collecting data for public health purposes.” In the Journal of Law, Medicine and Ethics, 41(Suppl 1), 2013.
  8. B.A. Malin, K. El Emam, C.M. O’Keefe: “Biomedical data privacy: Problems, perspectives, and recent advances.” In the Journal of the American Medical Informatics Association 20(1), 2013.
  9. K. El Emam, E. Jonker, E. Moher, L. Arbuckle: “A review of evidence on consent bias in research.” In Am J Bioeth 13(4), 2013.
  10. F.K. Dankar, K. El Emam: “Practicing Differential Privacy in Healthcare: A Review.” In Transactions on Data Privacy 6(1), 2013.
  11. K. El Emam, L. Arbuckle, E. Jonker, K. Anderson: “Two h-Index Benchmarks for Evaluating the Publication Performance of Medical Informatics Researchers.” In Journal of Medical Internet Research 14(5), 2012.
  12. K. El Emam, S. Samet, L. Arbuckle, R. Tamblyn, C. Earle, M. Kantarcioglu: “A secure distributed logistic regression protocol for the detection of rare adverse drug events.” In the Journal of the American Medical Informatics Association 7(7), 2012.
  13. F. Dankar, K. El Emam, A. Neisa, T. Roffey: “Estimating the re-identification risk of clinical data sets.” In BMC Medical Informatics and Decision Making 12 (66), 2012.
  14. K. El Emam, S. Samet, J. Hu, L. Peyton, C. Earle, G. Jayaraman, T. Wong, M. Kantarcioglu, F. Dankar, and A. Essex: “A Protocol for the Secure Linking of Registries for HPV Surveillance.“ In PLoS ONE 7(7), 2012.
  15. M. van der Velden, K. El Emam: “Not all my friends need to know: A qualitative study of teenage patients, privacy and social media.” In the Journal of the American Medical Informatics Association, Jul 6, 2012.
  16. M. Sokolova, K. El Emam, L. Arbukle, E. Neri, S. Rose, E. Jonker: “P2P Watch: Personal Health Information detection in peer-to-peer file sharing networks.” In the Journal of Medical Internet Research 14(1), 2012.
  17. M. Sokolova and G. Lapalme: “How much do we say? Using informativeness of negotiation records for early prediction of negotiation outcomes.” In Group Decision and Negotiation 21(3), 2012.
  18. K. El Emam, L. Arbuckle, G. Koru, L. Gaudette, E. Neri, S. Rose, J. Howard, J. Gluck: “De-Identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Data Set.” In the Journal of Medical Internet Research 14(1), 2012.
  19. K. El Emam, E. Jonker, L. Arbuckle, B. Malin: “A Systematic Review of Re-identification Attacks on Health Data.” In PLoS ONE 6(12), 2011.
  20. K. El Emam, D. Paton, F. Dankar, G. Koru: “De-identifying a Public Use Microdata File from the Canadian National Discharge Abstract Database.” In BMC Medical Informatics and Decision Making 11(53), 2011.
  21. K. El Emam, D. Buckeridge, R. Tamblyn, A. Neisa, E. Jonker, A. Verma: “The Re-identification Risk of Canadians from Longitudinal Demographics.” In BMC Medical Informatics and Decision Making 11(46), 2011.
  22. K. El Emam, J. Mercer, K. Moreau, I. Grava-Gubins, D. Buckeridge, E. Jonker: “Physician Privacy Concerns when Disclosing Patient Data for Public Health Purposes During a Pandemic Influenza Outbreak.” In BMC Public Health 11(454), 2011.
  23. K. El Emam: “Methods for the de-identification of electronic health records for genomic research.” In Genome Medicine 3(25), 2011.
  24. K. El Emam, J. Hu, J. Mercer, L. Peyton, M. Kantarcioglu, B. Malin, D. Buckeridge, S. Samet, C. Earle: “A Secure Protocol for Protecting the Identity of Providers When Disclosing Data for Disease Surveillance.” In the Journal of the American Medical Informatics Association 18, 2011.
  25. M. Sokolova and G. Lapalme: “Learning opinions in user-generated Web content.” In the Journal of Natural Language Engineering, 2011.
  1. K. El Emam, K. Moreau, E. Jonker: “How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?“ In the Journal of Medical Internet Research 13(1), 2011.
  2. K. El Emam: “Risk-based health data de-identification.” In IEEE Security and Privacy 8(3), 2010.
  3. K. El Emam, A. Brown, P. AbdelMalik, A. Neisa, M. Walker, J. Bottomley, and T. Roffey: “A method for managing re-identification risk from small geographic areas in Canada.” In BMC Medical Informatics and Decision Making 10(18), 2010.
  4. G. Koru, H. Liu, D. Zhang, and K. El Emam: “Testing the Theory of Relative Defect Proneness for Closed-Source Software.” In the Empirical Software Engineering 15(6), 2010.
  5. K. El Emam, E. Neri, E. Jonker, M. Sokolova, L. Peyton, A. Neisa, T. Scasa: “The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.” In the Journal of the American Medical Informatics Association 17(2), 2010.
  6. Birney et al.: “Prepublication data sharing.” In Nature 461(10), 2009.
  7. G. Koru and K. El Emam: “Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules and its Implications for Software Refactoring and Quality.” In IEEE Software 27(2), 2010.
  8. K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, J. Bottomley: “A Globally Optimal k-Anonymity Method for the De-identification of Health Data.” In Journal of the American Medical Informatics Association 16(5), 2009.
  9. M. Sokolova and G. Lapalme: “A Systematic Analysis of Performance Measures for Classification Tasks.” In Information Processing & Management 45, 2009.
  10. K. El Emam and P. Kosseim: “Privacy interests in prescription data. Part 2: Patient privacy.” In IEEE Security and Privacy 7(2), 2009.
  11. K. El Emam, E. Jonker, M. Sampson, K. Krleza-Jeric, A. Neisa: “The Use of Electronic Data Capture Tools in Clinical Trials: Web-Survey of 259 Canadian Trials.” In Journal of Medical Internet Research 11(1), 2009.
  12. P. Kosseim and K. El Emam: “Privacy interests in prescription data. Part 1: Prescriber privacy.” In IEEE Security and Privacy 7(1), 2009.
  13. K. El Emam, F. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk: “Evaluating Patient Re-identification Risk from Hospital Prescription Records.“In the Canadian Journal of Hospital Pharmacy 62(4), 2009.
  14. K. El Emam, A. Brown, and P. AbdelMalik: “Evaluating predictors of geographic area population size cutoffs to manage re-identification risk.” In Journal of the American Medical Informatics Association 16(2), 2009.
  15. A.G. Koru, K. El Emam, D. Zhang, and H. Liu: “An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules.” In IEEE Transactions on Software Engineering 35(2), 2009.
  16. K. El Emam: “Heuristics for de-identifying health data.” In IEEE Security and Privacy 6(4), 2008.
  17. A.G. Koru, K. El Emam, D. Zhang, H. Liu, and D. Mathew: “Theory of relative defect proneness: Replicated studies on the functional form of the size-defect relationship for software modules.” In Empirical Software Engineering Journal 13(5), 2008.
  18. K. El Emam, and F. Dankar: “Protecting privacy using k-anonymity.” In the Journal of the American Medical Informatics Association, September/October 15, 2008.
  19. K. Murto, G. Bryson, I. Abushahwan, J. King, D. Moher, K. El Emam, and W. Splinter: “Parents are reluctant to use technological means of communication in pediatric day care.” In Canadian Journal of Anesthesia 55(4), 2008.
  20. K. El Emam and G. Koru: “A Replicated Survey of IT Software Project Failures.” In IEEE Software 25(5), 2008.
  21. M. Sokolova, and S. Szpakowicz: “Strategies and Language Trends in Learning Success and Failure of Negotiation.” In Group Decision and Negotiation 16, 2007.
  22. K. El Emam, E. Neri, and E. Jonker: “An Evaluation of Personal Health Information Remnants in Second Hand Personal Computer Disk Drives.” In Journal of Medical Internet Research 9(3), September 2007.
  23. G. Koru, K. El Emam, A. Neisa, and M. Umarji: “A web survey of quality assurance practices in biomedical open-source software projects.” In Journal of Medical Internet Research 9(2), May 2007.
  24. T. Rout, K. El Emam, M. Fusani, D. Goldenson, and H-W Jung: “SPICE in retrospect: Developing a standard for process assessment.” In the Journal of Systems and Software 80(9), September 2007.
  25. K. El Emam, S. Jabbouri, S. Sams, Y. Drouet, M. Power: “Evaluating common de-identification heuristics for personal health information.” In Journal of Medical Internet Research 8(4), November 2006.
  1. K. El Emam: “Deploying mobile devices in CTs: Part two.” In Applied Clinical Trials, November 2006.
  2. K. El Emam: “Deploying mobile devices in CTs: Part one.” In Applied Clinical Trials, October 2006.
  3. K. El Emam: “Preserving privacy of participants’ personal data.” In Good Clinical Practice Journal, September 2006.
  4. M. Shah, M. Sokolova, and S. Szpakowicz: “Process-Specific Information for Learning Electronic Negotiation Outcomes.” In Fundamenta Informaticae 74, p. 351-373, 2006.
  5. M. Sokolova, M. Shah, and S. Szpakowicz: “Comparative Analysis of Text Data in Successful Face-to-Face and Electronic Negotiations.” In Group Decision and Negotiation, 15 (2), p 127-140, 2006.
  6. C. Garritty and K. El Emam: “Who’s using PDAs? Estimates of PDA use by health care providers: A systematic review of surveys.” In the Journal of Medical Internet Research 8(2), May 2006.
  7. K. Murto, U. Schwarz, G. Bryson, D. Moher, K. El Emam: “A survey: technology in a pediatric day care setting.” In Canadian Journal of Anesthesia, 53(1), 2006.
  8. M. Marchand and M. Sokolova: “Learning with Decision Lists of Data-Dependent Features.” In Journal of Machine Learning Research 6, April 2005.
  9. K. El Emam and A. Carleton: “The application of statistics in software engineering.” In Journal of Systems and Software 73(2), October 2004.
  10. J. Barnard, K. El Emam, and D. Zubrow: “Using capture-recapture models for the reinspection decision.” In Software Quality Professional 5(2), March 2003.
  11. B. Kitchenham, S-L Pfleeger, L. Pickard, P. Jones, D. Hoaglin, K. El Emam, and J. Rosenberg: “Preliminary guidelines for empirical research in software engineering.” In IEEE Transactions on Software Engineering 28(8), August 2002.
  12. K. El Emam, S. Benlarbi, N. Goel, W. Melo, H. Lounis, and S. Rai: “The optimal class size for object-oriented software.” In IEEE Transactions on Software Engineering 28(5), 2002.
  13. H-W. Jung, R. Hunter, D. Goldenson, and K. El Emam: “Findings from Phase Two of the SPICE Trials.” In Software Process: Improvement and Practice, 6, 2001.
  14. K. El Emam: “Ethics and Open Source.” In Empirical Software Engineering: An International Journal, Kluwer Academic Publishers 6(4), 2001.
  15. K. El Emam and H-W Jung: “An empirical evaluation of the ISO/IEC 15504 assessment model.” In the Journal of Systems and Software 59(1), 2001.
  16. K. El Emam, D. Goldenson, J. McCurley, and J. Herbsleb: “Modelling the likelihood of software process improvement: An exploratory study.” In Empirical Software Engineering: An International Journal 6, 2001.
  17. K. El Emam and O. Laitenberger: “Evaluating capture-recapture models with two inspectors.” In IEEE Transactions on Software Engineering 27(9), 2001.
  18. K. Strike, K. El Emam, and N. Madhavji: “Software cost estimation with incomplete data.” In IEEE Transactions on Software Engineering 27(20), 2001.
  19. K. El Emam, S. Benlarbi, N. Goel, and S. Rai: “The confounding effect of class size on the validity of object-oriented metrics.” In IEEE Transactions on Software Engineering 27(7), 2001.
  20. K. El Emam, W. Melo, and J. Machado: “The prediction of faulty classes using object-oriented design metrics.” In Journal of Systems and Software 56(1), 2001.
  21. O. Laitenberger, K. El Emam, and T. Harbich: “An internally replicated quasi-experimental comparison of checklist and perspective-based reading of code documents.” In IEEE Transactions on Software Engineering 27(5), 2001.
  22. X. Zhong, N. Madhavji, and K. El Emam: “Critical factors affecting personal software processes.” In IEEE Software, November/December 2000.
  23. O. Laitenberger, C. Atkinson, M. Schlich, and K. El Emam: “An experimental comparison of reading techniques for defect detection in UML design documents.” In Journal of Systems and Software 53(2), 2000.
  24. K. El Emam, S. Benlarbi, N. Goel, and S. Rai: “Comparing case-based reasoning classifiers for predicting high-risk software components.” In Journal of Systems and Software 55(3), 2000.
  25. K. El Emam and D. Goldenson: “An empirical review of software process assessments.” In Advances in Computers, Academic Press 53, 2000.
  1. K. El Emam and A. Birk: “Validating the ISO/IEC 15504 measure of software requirements analysis process capability.” In IEEE Transactions on Software Engineering 26(6), June 2000.
  2. K. El Emam and I. Garro: “Estimating the extent of standards use: The case of ISO/IEC 15504.” In Journal of Systems and Software 53(2), 2000.
  3. L. Briand, K. El Emam, B. Freimut, and O. Laitenberger: “A comprehensive evaluation of capture-recapture models for estimating software defect content.” In IEEE Transactions on Software Engineering 26(6), June 2000.
  4. K. El Emam and A. Birk: “Validating the ISO/IEC 15504 measures of software development process capability.” In Journal of Systems and Software 51(2), 2000.
  5. K. El Emam, O. Laitenberger, and T. Harbich: “The application of subjective estimates of effectiveness to controlling software inspections.” In Journal of Systems and Software, 54, 2000.
  6. K. El Emam: “Benchmarking Kappa: Interrater agreement in software process assessments.” In Empirical Software Engineering: An International Journal 4, Kluwer Academic Publishers, 1999.
  7. K. El Emam and N. H. Madhavji: “Editorial: Introduction to special issue on organizational change in software process improvement.” In Software Process Improvement and Practice, 4(4), John Wiley, 1998.
  8. J-M Simon, K. El Emam, S. Rousseau, E. Jacquet, and F. Babey: “The reliability of ISO/IEC PDTR 15504 assessments.” In Software Process Improvement and Practice Journal 3, John Wiley, 1997.
  9. P. Fusaro, K. El Emam, and B. Smith: “The internal consistencies of the 1987 SEI Maturity Questionnaire and the SPICE Capability Dimension.” In Empirical Software Engineering: An International Journal 3, Kluwer Academic Publishers, 1997.
  10. K. El Emam and D. Hoeltje: “Qualitative analysis of a requirements change process.” In Empirical Software Engineering: An International Journal 2(2), Kluwer Academic Publishers, 1997.
  11. K. El Emam, L. Briand, and R. Smith: “Assessor agreement in rating SPICE processes.” In Software Process Improvement and Practice Journal, 2(4), John Wiley, 1997.
  12. L. Briand, K. El Emam, and S. Morasca: “Reply to ‘Comments to the Paper: Briand, El Emam, Morasca: On the Application of Measurement Theory in Software Engineering’.” In Empirical Software Engineering: An International Journal 2(3), Kluwer Academic Publishers, 1997.
  13. K. El Emam and N. H. Madhavji: “An instrument to measure the success of the requirements engineering process in Information Systems development.” In Empirical Software Engineering: An International Journal 1(3), Kluwer Academic Publishers, 1996.
  14. K. El Emam and D. R. Goldenson: “An empirical evaluation of the prospective international SPICE standard.” In Software Process Improvement and Practice Journal, 2(2), John Wiley, 1996.
  15. K. El Emam, S. Quintin, and N. H. Madhavji: “User participation in the requirements engineering process: An empirical study.” In Requirements Engineering Journal 1, Springer-Verlag, 1996.
  16. L. Briand, K. El Emam, and S. Morasca: “On the application of measurement theory in software engineering.” In Empirical Software Engineering: An International Journal, 1(1), Kluwer Academic Publishers, 1996.
  17. K. El Emam and D. R. Goldenson: “SPICE trials produce positive results.” In IEEE Software, November 1996.
  18. K. El Emam and N. H. Madhavji: “Does organizational maturity improve quality?” In IEEE Software, September 1996.
  19. K. El Emam and N. H. Madhavji: “The reliability of measuring organizational maturity.” In Software Process Improvement and Practice Journal 1(1), John Wiley, September 1995.