1. K. El Emam, A. Fineberg, E. Jonker, L. Mosquera: “Pan-Canadian Descriptive Study of Privacy Risks from Synthetic Data Generation Practices within the Evolving Canadian Legislative Landscape”, Report for the Office of the Privacy Commissioner of Canada’s Contributions Program, March 2022. | [PDF] |
2. K. El Emam: “Accelerating AI with Synthetic Data“, O’Reilly Media Inc., June 2020. | [LINK] |
3. K. El Emam, R. Hoptroff: “Synthetic Data Paradigm for Using and Sharing Data”, Cutter Executive Update, 19(6), Cutter Consortium, 2019. | [LINK] |
4. K. El Emam and B. Malin: “Concepts and methods for de-identifying clinical trials data.” In Committee on Strategies for Responsible Sharing of Clinical Trial Data; Board on Health Sciences Policy; Institute of Medicine: Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk. Washington (DC): National Academies Press (US); 2015 Apr 20. | [PDF] |
5. A. Cavoukian and K. El Emam: “De-identification Protocols: Essential for Protecting Privacy.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, June 2014. | [PDF] |
6. A. Cavoukian and K. El Emam: “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism.” Discussion Paper, Office of the Information and Privacy Commissioner, Ontario, 2013. | [PDF] |
7. A. Cavoukian and K. El Emam, “Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy,” June 2011. | [PDF] |
8. K. El Emam, E. Jonker, M. Sehatkar, J. Wunderlich and L. Gaudette: “Managing the Risk of Re-identification for Public Use Files.” Office of the Privacy Commissioner of Canada, 2011. | [LINK] |
9. Health System Use Technical Advisory Committee Data De-identification Working Group, “Best Practice Guidelines for Managing the Disclosure of De-identified Health Information,” April 2011. | [PDF] |
10. K. El Emam, E. Jonker, and A. Fineberg, “The Case for De-Identifying Personal Health Information,” January 2011. | [PDF] |
11. K. El Emam, “Practices for the Review of Data Requests and the Disclosure of Health Information by Health Ministries and Large Data Custodians (report for Canada Health Infoway),” November 2010. | [PDF] |
12. K. El Emam and M. Sokolova, “Proceedings of the Workshop on Intelligent Methods for Protecting Privacy and Confidentiality in Data,” May 2010. | [PDF] |
13. A. Cavoukian and K. El Emam, “A Positive-Sum Paradigm in Action in the Health Sector,” March 2010. | [PDF] |
14. K. El Emam, P. Kosseim, and B. Malin, “Electronic Health Information and Privacy Conference 2009,” November 2009. | [PDF] |
15. K. El Emam and A. Fineberg, “An Overview of Techniques for de-identifying Personal Health Information,” August 2009. | [PDF] |
16. K. El Emam: “Managing privacy risks through data anonymization.” Business Intelligence Executive Report, Cutter Consortium, 2009. | [LINK] |
17. K. El Emam, P. AbdelMalik, and D. Buckeridge, “Electronic Health Information and Privacy Conference 2008,” November 2008. | [PDF] |
18. K. El Emam, “De-identifying health data for secondary use: A framework,” October 2008. | [PDF] |
19. P. Elm, D. R. Goldenson, K. El Emam, N. Donatelli, A. Neisa, and NDIA SE Effectiveness Committee, “A Survey of Systems Engineering Effectiveness: Initial Results,” December 2007. | [PDF] |
20. K. El Emam (ed.), “Electronic Health Information and Privacy Conference 2007 – Handbook,” December 2007. | [PDF] |
21. K. El Emam, G. Eysenbach, B. Pascal, and M. Martineau (eds.), “Consumer Health Informatics Summit 2007 – Handbook,” November 2007. | [PDF] |
22. K. El Emam, E. Jonker, S. Sams, E. Neri, A. Neisa, T. Gao, and S. Chowdhury, “2007 – Pan-Canadian De-Identification Guidelines,” May 2007. | [PDF] |
23. K. El Emam and S. Sams, “Anonymization Case Study 1: Randomizing Names and Addresses,” April 2007. | [PDF] |
24. K. El Emam: “User participation in agile projects.” Agile Project Management Executive Report, Cutter Consortium, 2007. | |
25. K. El Emam and G. Atherley, “Second Annual Electronic Health Information and Privacy Conference,” November 2006. | [PDF] |
26. K. El Emam, “Overview of Factors Affecting the Risk of Re-Identification in Canada,” May 2006. | [PDF] |
27. K. El Emam, “Data Anonymization Practices in Clinical Research: A Descriptive Study,” May 2006. | [PDF] |
28. K. El Emam: “User participation in software projects.” Agile Project Management Advisory Service Executive Update 6(19), Cutter Consortium, 2005. | |
29. M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop,” December 2005. | [PDF] |
30. K. El Emam: “Software practices and project success.” Agile Project Management Advisory Service Executive Update 6(17), Cutter Consortium, 2005. | |
31. M. Lysyk, K. El Emam, C. Lucock, M. Power, and D. Willison, “Privacy Guidelines Workshop – Executive Summary,” December 2005. | [PDF] |
32. K. El Emam: “Does project size matter?” Agile Project Management Advisory Service Executive Update 6(14), Cutter Consortium, 2005. | |
33. K. El Emam: “Making decisions using software product metrics.” Agile Project Management Executive Report 5(9), Cutter Consortium, 2004. | |
34. K. El Emam: “The case for open source.” Business IT Strategies Executive Report 7(7), Cutter Consortium, 2004. | |
35. K. El Emam: “Finding success in small software projects.” Agile Project Management Executive Report 4(11), Cutter Consortium, 2003. | |
36. K. El Emam: “Software quality certification.” Agile Project Management Advisory Service Executive Update 4(2), Cutter Consortium, March 2003. | |
37. K. El Emam: “Getting started with software productivity benchmarking.” Agile Project Management Advisory Service, Executive Report, 3(9), Cutter Consortium, October 2002. | |
38. K. El Emam: “Software defect management best practices.” Agile Project Management Advisory Service, Executive Report 3(4), Cutter Consortium, April 2002. | |
39. D. Card and K. El Emam: “A quality risk indicator for object-oriented software.” In Proceedings of the Practical Software Measurement Technical Working Group meeting, March 2002. | |
40. K. El Emam: “Software inspection best practices.” Agile Project Management Advisory Service, Executive Report vol. 2, no. 9, Cutter Consortium, September 2001. | |
41. K. El Emam: “Risk assessment with object-oriented metrics.” In The e-Project Management Advisory from the Cutter Consortium, August 2001. | |
42. K. El Emam, “Object-Oriented Metrics: A Review of Theory and Practice,” March 2001. | [PDF] |
43. L. Briand, K. El Emam, B. Freimut, and O. Laitenberger, “A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content,” March 2001. | [PDF] |
44. K. El Emam, “Description of the SWEBOK Knowledge Area Software Engineering Process,” March 2001. | [PDF] |
45. B. Kitchenham, S. L. Pfleeger, L. Pickard, P. Jones, D. Hoaglin, K. El Emam, and J. Rosenberg, “Preliminary Guidelines for Empirical Research in Software Engineering,” January 2001. | [PDF] |
46. S. Boodoo, K. El Emam, N. Madhavji, and O. Laitenberger, “The Optimal Team Size for UML Design Inspections,” September 2000. | [PDF] |