Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2649387.2662451acmconferencesArticle/Chapter ViewAbstractPublication PagesbcbConference Proceedingsconference-collections
poster

Detecting privacy-sensitive events in medical text

Published: 20 September 2014 Publication History

Abstract

In this paper, we present a novel semi-supervised technique for finding privacy-sensitive events in clinical text. Unlike traditional semi-supervised methods, we do not require large amounts of unannotated data. Instead, our approach relies on information contained in the hierarchical structure of a large medical encyclopedia.

References

[1]
W. Chapman, W. Bridewell, P. Hanbury, G. Cooper, and B. Buchanan. A simple algorithm for identifying negated findings and diseases in discharge summaries. JBI, 34(5), 2001.
[2]
H. Harkema, J. N. Dowling, T. Thornblade, and W. W. Chapman. Context: An algorithm for determining negation, experiencer, and temporal status from clinical reports. JBI, 42(5), 2009.
[3]
P. Jindal and D. Roth. Learning from negative examples in set-expansion. In Proceedings of the 2011 Conference on International Conference on Data Mining (ICDM), pages 1110--1115. IEEE Computer Society, 2011.
[4]
P. Jindal and D. Roth. End-to-end coreference resolution for clinical narratives. In Proceedings of the Twenty-Third international joint conference on Artificial Intelligence (IJCAI), pages 2106--2112. AAAI Press, 2013.
[5]
P. Jindal and D. Roth. Using soft constraints in joint inference for clinical concept recognition. In EMNLP, pages 1808--1814, 2013.
[6]
P. Pantel, E. Crestan, A. Borkovsky, A. Popescu, and V. Vyas. Web-scale distributional similarity and entity set expansion. In EMNLP, 2009.
[7]
K. Roberts and S. Harabagiu. A flexible framework for deriving assertions from electronic medical records. JAMIA, 18(5), 2011.
[8]
O. Uzuner, B. South, S. Shen, and S. DuVall. 2010 i2b2/va challenge on concepts, assertions, and relations in clinical text. JAMIA, 2011.
[9]
R. Wang and W. Cohen. Language-independent set expansion of named entities using the web. In ICDM, pages 342--350. IEEE Computer Society, 2007.
[10]
Y. Xu, K. Hong, J. Tsujii, I. Eric, and C. Chang. Feature engineering combined with machine learning and rule-based methods for structured information extraction from narrative clinical discharge summaries. JAMIA, 19(5):824--832, 2012.

Cited By

View all
  • (2024) Contextual classification of clinical records with bidirectional long short‐term memory ( Bi‐LSTM) and bidirectional encoder representations from transformers ( BERT) model Computational Intelligence10.1111/coin.1269240:4Online publication date: 21-Aug-2024
  • (2023)Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning2023 20th Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST58708.2023.10320187(1-7)Online publication date: 21-Aug-2023
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
BCB '14: Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics
September 2014
851 pages
ISBN:9781450328944
DOI:10.1145/2649387
  • General Chairs:
  • Pierre Baldi,
  • Wei Wang
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2014

Check for updates

Author Tags

  1. active learning
  2. computer security
  3. concept identification
  4. domain knowledge
  5. health informatics
  6. natural language processing
  7. semi-supervision
  8. set expansion
  9. snomed CT

Qualifiers

  • Poster

Funding Sources

Conference

BCB '14
Sponsor:
BCB '14: ACM-BCB '14
September 20 - 23, 2014
California, Newport Beach

Acceptance Rates

Overall Acceptance Rate 254 of 885 submissions, 29%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024) Contextual classification of clinical records with bidirectional long short‐term memory ( Bi‐LSTM) and bidirectional encoder representations from transformers ( BERT) model Computational Intelligence10.1111/coin.1269240:4Online publication date: 21-Aug-2024
  • (2023)Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning2023 20th Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST58708.2023.10320187(1-7)Online publication date: 21-Aug-2023
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • (2021)An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private informationComputer Networks10.1016/j.comnet.2021.108614(108614)Online publication date: Nov-2021
  • (2020)A Study of Self-Privacy Violations in Online Public Discourse2020 IEEE International Conference on Big Data (Big Data)10.1109/BigData50022.2020.9378163(1041-1050)Online publication date: 10-Dec-2020
  • (2019)PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)10.1109/SNAMS.2019.8931855(53-60)Online publication date: Oct-2019
  • (2016)Towards User-Centered Privacy Risk Detection and Quantification Framework2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)10.1109/NTMS.2016.7792487(1-5)Online publication date: Nov-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media