Protecting Health Information. Ensuring Data Integrity.
Protecting Health Information. Ensuring Data Integrity.

Tech Reports

1. K. El Emam, A. Fineberg, E. Jonker, L. Mosquera: “Pan-Canadian Descriptive Study of Privacy Risks from Synthetic Data Generation Practices within the Evolving Canadian Legislative Landscape”, Report for the Office of the Privacy Commissioner of Canada’s Contributions Program, March 2022.

[PDF]

2. K. El Emam: “Accelerating AI with Synthetic Data“, O’Reilly Media Inc., June 2020.

[LINK]
3. K. El Emam, R. Hoptroff: “Synthetic Data Paradigm for Using and Sharing Data”, Cutter Executive Update, 19(6), Cutter Consortium, 2019. [LINK]
4. K. El Emam and B. Malin: “Concepts and methods for de-identifying clinical trials data.” In Committee on Strategies for Responsible Sharing of Clinical Trial Data; Board on Health Sciences Policy; Institute of Medicine: Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk. Washington (DC): National Academies Press (US); 2015 Apr 20. [PDF]
5. A. Cavoukian and K. El Emam: “De-identification Protocols: Essential for Protecting Privacy.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, June 2014. [PDF]
6. A. Cavoukian and K. El Emam: “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, 2013. [PDF]
7. A. Cavoukian and K. El Emam, “Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy,” June 2011. [PDF]
8. K. El Emam, E. Jonker, M. Sehatkar, J. Wunderlich and L. Gaudette: “Managing the Risk of Re-identification for Public Use Files.” Office of the Privacy Commissioner of Canada, 2011. [LINK]
9. Health System Use Technical Advisory Committee Data De-identification Working Group, “Best Practice Guidelines for Managing the Disclosure of De-identified Health Information,” April 2011. [PDF]
10. K. El Emam, E. Jonker, and A. Fineberg, “The Case for De-Identifying Personal Health Information,” January 2011. [PDF]
11. K. El Emam, “Practices for the Review of Data Requests and the Disclosure of Health Information by Health Ministries and Large Data Custodians (report for Canada Health Infoway),” November 2010. [PDF]
12. K. El Emam and M. Sokolova, “Proceedings of the Workshop on Intelligent Methods for Protecting Privacy and Confidentiality in Data,” May 2010. [PDF]
13. A. Cavoukian and K. El Emam, “A Positive-Sum Paradigm in Action in the Health Sector,” March 2010. [PDF]
14. K. El Emam, P. Kosseim, and B. Malin, “Electronic Health Information and Privacy Conference 2009,” November 2009. [PDF]
15. K. El Emam and A. Fineberg, “An Overview of Techniques for de-identifying Personal Health Information,” August 2009. [PDF]
16. K. El Emam: “Managing privacy risks through data anonymization.” Business Intelligence Executive Report, Cutter Consortium, 2009. [LINK]
17. K. El Emam, P. AbdelMalik, and D. Buckeridge, “Electronic Health Information and Privacy Conference 2008,” November 2008. [PDF]
18. K. El Emam, “De-identifying health data for secondary use: A framework,” October 2008. [PDF]
19. P. Elm, D. R. Goldenson, K. El Emam, N. Donatelli, A. Neisa, and NDIA SE Effectiveness Committee, “A Survey of Systems Engineering Effectiveness: Initial Results,” December 2007. [PDF]
20. K. El Emam (ed.), “Electronic Health Information and Privacy Conference 2007 – Handbook,” December 2007. [PDF]
21. K. El Emam, G. Eysenbach, B. Pascal, and M. Martineau (eds.), “Consumer Health Informatics Summit 2007 – Handbook,” November 2007. [PDF]
22. K. El Emam, E. Jonker, S. Sams, E. Neri, A. Neisa, T. Gao, and S. Chowdhury, “2007 – Pan-Canadian De-Identification Guidelines,” May 2007. [PDF]
23. K. El Emam and S. Sams, “Anonymization Case Study 1: Randomizing Names and Addresses,” April 2007. [PDF]
24. K. El Emam: “User participation in agile projects.” Agile Project Management Executive Report, Cutter Consortium, 2007.
25. K. El Emam and G. Atherley, “Second Annual Electronic Health Information and Privacy Conference,” November 2006. [PDF]
26. K. El Emam, “Overview of Factors Affecting the Risk of Re-Identification in Canada,” May 2006. [PDF]
27. K. El Emam, “Data Anonymization Practices in Clinical Research: A Descriptive Study,” May 2006. [PDF]
28. K. El Emam: “User participation in software projects.” Agile Project Management Advisory Service Executive Update 6(19), Cutter Consortium, 2005.
29. M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop,” December 2005. [PDF]
30. K. El Emam: “Software practices and project success.” Agile Project Management Advisory Service Executive Update 6(17), Cutter Consortium, 2005.
31. M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop – Executive Summary,” December 2005. [PDF]
32. K. El Emam: “Does project size matter?” Agile Project Management Advisory Service Executive Update 6(14), Cutter Consortium, 2005.
33. K. El Emam: “Making decisions using software product metrics.” Agile Project Management Executive Report 5(9), Cutter Consortium, 2004.
34. K. El Emam: “The case for open source.” Business IT Strategies Executive Report 7(7), Cutter Consortium, 2004.
35. K. El Emam: “Finding success in small software projects.” Agile Project Management Executive Report 4(11), Cutter Consortium, 2003.
36. K. El Emam: “Software quality certification.” Agile Project Management Advisory Service Executive Update 4(2), Cutter Consortium, March 2003.
37. K. El Emam: “Getting started with software productivity benchmarking.” Agile Project Management Advisory Service, Executive Report, 3(9), Cutter Consortium, October 2002.
38. K. El Emam: “Software defect management best practices.” Agile Project Management Advisory Service, Executive Report 3(4), Cutter Consortium, April 2002.
39. D. Card and K. El Emam: “A quality risk indicator for object-oriented software.” In Proceedings of the Practical Software Measurement Technical Working Group meeting, March 2002.
40. K. El Emam: “Software inspection best practices.” Agile Project Management Advisory Service, Executive Report vol. 2, no. 9, Cutter Consortium, September 2001.
41. K. El Emam: “Risk assessment with object-oriented metrics.” In The e-Project Management Advisory from the Cutter Consortium, August 2001.
42. K. El Emam, “Object-Oriented Metrics: A Review of Theory and Practice,” March 2001. [PDF]
43. L. Briand, K. El Emam, B. Freimut, and O. Laitenberger, “A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content,” March 2001. [PDF]
44. K. El Emam, “Description of the SWEBOK Knowledge Area Software Engineering Process,” March 2001. [PDF]
45. B. Kitchenham, S. L. Pfleeger, L. Pickard, P. Jones, D. Hoaglin, K. El Emam, and J. Rosenberg, “Preliminary Guidelines for Empirical Research in Software Engineering,” January 2001. [PDF]
46. S. Boodoo, K. El Emam, N. Madhavji, and O. Laitenberger, “The Optimal Team Size for UML Design Inspections,” September 2000. [PDF]
47. D. Glasberg, K. El Emam, W. Melo, and N. Madhavji, “Validating Object-oriented Design Metrics on a Commercial Java Application,” September 2000. [PDF]
48. O. Laitenberger, C. Atkinson, and K. El Emam, “Using Inspection Technology in Object-oriented Development Projects,” June 2000. [PDF]
49. K. El Emam, “A Methodology for Validating Software Product Metrics,” June 2000. [PDF]
50. K. El Emam, S. Benlarbi, N. Goel, W. Melo, H. Lounis, and S. Rai, “The Optimal Class Size for Object-Oriented Software: A Replicated Study,” March 2000. [PDF]
51. S. Benlarbi, K. El Emam, N. Goel and S. Rai, “Thresholds for Object-Oriented Measures,” March 2000. [PDF]
52. K. El Emam and H-W. Jung, “An Empirical Evaluation of the ISO/IEC 15504 Assessment Model,” February 2000. [PDF]
53. K. Strike, K. El Emam, and N. Madhavji, “Software Cost Estimation with Incomplete Data,” January 2000. [PDF]
54. A. Beitz, K. El Emam, and J. Jarvinen, “A Business Focus to Assessments,” December 1999. [PDF]
55. O. Laitenberger, C. Atkinson, M. Schlich, and K. El Emam, “An Experimental Comparison of Reading Techniques for Defect Detection in UML Design Documents,” December 1999. [PDF]
56. K. El Emam and O. Laitenberger, “Evaluating Capture-recapture Models with Two Inspectors,” December 1999. [PDF]
57. O. Laitenberger, M. Laszak, D. Stoll, and K. El Emam, “Evaluating a Causal Model of Review Factors in an Industrial Setting,” December 1999. [PDF]
58. K. El Emam and I. Garro, “Estimating the Extent of Standards Use: The Case of ISO/IEC 15504,” November 1999. [PDF]
59. K. El Emam and D. Goldenson, “An Empirical Review of Software Process Assessment,” November 1999. [PDF]
60. K. El Emam and W. Melo, “The Prediction of Faulty Classes Using Object-oriented Design Metrics,” November 1999. [PDF]
61. K. El Emam, S. Benlarbi, N. Goel, and S. Rai, “A Validation of Object-oriented Metrics,” October 1999. [PDF]
62. K. El Emam, O. Laitenberger, and T. Harbich, “The Application of Subjective Estimates of Effectiveness to Controlling Software Inspections,” October 1999. [PDF]
63. K. El Emam, S. Benlarbi, and N. Goel, “The Confounding Effect of Class Size on the Validity of Object-oriented Metrics,” September 1999. [PDF]
64. K. El Emam, O. Laitenberger, and T. Harbich, “An Internally Replicated Quasi-experimental Comparison of Checklist and Perspective-based Reading of Code Documents,” September 1999. [PDF]
65. K. El Emam, S. Benlarbi, and N. Goel, “Comparing Case-based Reasoning Classifiers for Predicting High Risk Software Components,” September 1999. [PDF]
66. K. El Emam and A. Birk, “Validating the ISO/IEC15504 Measures of Software Development Process Capability,” August 1999. [PDF]
67. K. El Emam and A. Birk, “Validating the ISO/IEC15504 Measures of Software Development Process Capability,” February 1999. [PDF]
68. L. Briand, K. El Emam, D. Surmann, I. Wieczorek, and K. Maxwell, “An Assessment and Comparison of Common Software Cost Estimation Modeling Techniques,” 1998. [PDF]
69. L. Briand, K. El Emam, and I. Wieczorek, “Explaining the Cost of European Space and Military Projects,” 1998. [PDF]
70. K. El Emam, D. Goldenson, J. McCurley, and J. Herbsleb, “Success or Failure? Modeling the Likelihood of Software Process Improvement,” 1998. [PDF]
71. K. El Emam, J-M. Simon, S. Rousseau, and E. Jacquet, “Cost Implications of Interrater Agreement for Software Process Assessments,” 1998. [PDF]
72. L. Briand, K. El Emam, and B. Freimut, “A Comparison and Integration of Capture-Recapture Models and the Detection Profile Method,” 1998. [PDF]
73. K. El Emam and I. Wieczorek, “The Repeatability of Code Defect Classifications,” 1998. [PDF]
74. L. Briand, K. El Emam, and I. Wieczorek, “A Case Study in Productivity Benchmarking: Methods and Lessons Learned,” 1998. [PDF]
75. K. El Emam, “The Internal Consistency of the ISO/IEC 15504 Software Process Capability Scale,” 1998. [PDF]
76. K. El Emam, B. Shostak, and N. Madhavji, “Implementing Concepts from the Personal Software Process in an Industrial Setting,” 1998. [PDF]
77. K. El Emam and D. Goldenson, “SPICE: An Empiricist’s Perspective,” 1998. [PDF]
78. K. El Emam, “Benchmarking Kappa for Software Process Assessment Reliability Studies,” 1998. [PDF]
79. J-M. Simon, K. El Emam, S. Rousseau, E. Jacquet, and F. Babey, “The Reliability of ISO/IEC PDTR 15504 Assessments,” 1997. [PDF]
80. L. Briand, K. El Emam, and F. Bomarius, “COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment,” 1997. [PDF]
81. K. El Emam, D. Hoeltje, and N. Madhavji, “Causal Analysis of the Requirements Change Process for a Large System,” 1997. [PDF]
82. L. Briand, K. El Emam, B. Freimut, and O. Laitenberger, “Quantitative Evaluation of Capture-Recapture Models to Control Software Inspections,” 1997. [PDF]
83. L. Briand, K. El Emam, O. Laitenberger, and T. Fussbroich, “Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects,” 1997. [PDF]
84. P. Fusaro, K. El Emam, and B. Smith, “Evaluating the Interrater Agreement of Process Capability Ratings,” 1997. [PDF]
85. K. El Emam and L. Briand, “Costs and Benefits of Software Process Improvement,” 1997. [PDF]
86. K. El Emam, B. Smith, and P. Fusaro, “Modeling the Reliability of SPICE-based Assessments,” 1997. [PDF]
87. D. Goldenson, K. El Emam, J. Herbsleb, and C. Deephouse, “Empirical Studies of Software Process Assessment Methods,” 1997. [PDF]
88. K. El Emam, D. Goldenson, L. Briand, and P. Marshall, “Interrater Agreement in SPICE-based Assessments: Some Preliminary Results,” 1997. [PDF]
89. V. Basili, S. Condon, K. El Emam, R. Hendrick, and W. Melo, “Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components,” 1997. [PDF]
90. P. Fusaro, K. El Emam, and B. Smith, “The Internal Consistencies of the 1987 SEI Maturity Questionnaire and the SPICE Capability Dimension,” 1997. [PDF]
91. K. El Emam, L. Briand, and B. Smith, “Assessor Agreement in Rating SPICE Processes,” 1996. [PDF]
92. L. Briand, K. EL Emam, and S. Morasca, “On the Application of Measurement Theory in Software Engineering,” 1995. [PDF]
93. L. Briand, K. El Emam, and S. Morasca, “Theoretical and Empirical Validation of Software Product Measures,” 1995. [PDF]