Khaled El Emam
#163,442
Most Influential Person Now
Researcher
Khaled El Emam's AcademicInfluence.com Rankings
Khaled El Emamcomputer-science Degrees
Computer Science
#9597
World Rank
#10073
Historical Rank
Software Engineering
#258
World Rank
#263
Historical Rank
Database
#6567
World Rank
#6802
Historical Rank

Download Badge
Computer Science
Why Is Khaled El Emam Influential?
(Suggest an Edit or Addition)Khaled El Emam's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Preliminary Guidelines for Empirical Research in Software Engineering (2002) (1577)
- The Confounding Effect of Class Size on the Validity of Object-Oriented Metrics (2001) (445)
- The prediction of faulty classes using object-oriented design metrics (2001) (420)
- Spice: The Theory and Practice of Software Process Improvement and Capability Determination (1997) (377)
- A Replicated Survey of IT Software Project Failures (2008) (364)
- An assessment and comparison of common software cost estimation modeling techniques (1999) (309)
- A Systematic Review of Re-Identification Attacks on Health Data (2011) (303)
- Software Cost Estimation with Incomplete Data (2001) (243)
- Who’s Using PDAs? Estimates of PDA Use by Health Care Providers: A Systematic Review of Surveys (2006) (218)
- Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data (2009) (212)
- A field study of requirements engineering practices in information systems development (1995) (196)
- Prepublication data sharing (2009) (190)
- Comparing case-based reasoning classifiers for predicting high risk software components (2001) (190)
- A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content (2000) (188)
- COBRA: a hybrid method for software cost estimation, benchmarking, and risk assessment (1998) (179)
- On the application of measurement theory in software engineering (2004) (167)
- "Not all my friends need to know": a qualitative study of teenage patients, privacy, and social media (2013) (161)
- An experimental comparison of reading techniques for defect detection in UML design documents (2000) (150)
- Research Paper: Protecting Privacy Using k-Anonymity (2008) (149)
- An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules (2009) (148)
- Validating the ISO/IEC 15504 Measure of Software Requirements Analysis Process Capability (2000) (143)
- Anonymising and sharing individual patient data (2015) (138)
- Theoretical and Empirical Validation of Software Product Measures (1995) (133)
- An Internally Replicated Quasi-Experimental Comparison of Checklist and Perspective-Based Reading of Code Documents (2001) (126)
- Practicing Differential Privacy in Health Care: A Review (2013) (123)
- Biomedical data privacy: problems, perspectives, and recent advances (2013) (119)
- The application of differential privacy to health data (2012) (119)
- Guide to the De-Identification of Personal Health Information (2013) (103)
- The Optimal Class Size for Object-Oriented Software (2002) (102)
- Thresholds for object-oriented measures (2000) (95)
- Benchmarking Kappa: Interrater Agreement in Software Process Assessments (1999) (93)
- The Use of Electronic Data Capture Tools in Clinical Trials: Web-Survey of 259 Canadian Trials (2009) (93)
- Elements of Software Process Assessment & Improvement (1999) (89)
- The repeatability of code defect classifications (1998) (85)
- Methodology for Validating Software Product Metrics (2002) (84)
- Anonymizing Health Data: Case Studies and Methods to Get You Started (2013) (82)
- Estimating the re-identification risk of clinical data sets (2012) (82)
- Modelling the Likelihood of Software Process Improvement: An Exploratory Study (2001) (78)
- Theory of relative defect proneness (2008) (77)
- Measuring the success of requirements engineering processes (1995) (73)
- Evaluating Common De-Identification Heuristics for Personal Health Information (2006) (73)
- Evaluating the Risk of Re-identification of Patients from Hospital Prescription Records. (2009) (70)
- Evaluating Capture-Recapture Models with Two Inspectors (2001) (68)
- A Validation of Object-oriented Metrics (1999) (67)
- De-identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset (2012) (65)
- A secure distributed logistic regression protocol for the detection of rare adverse drug events (2012) (64)
- Validating the ISO/IEC 15504 measures of software development process capability (2000) (64)
- Quantitative evaluation of capture-recapture models to control software inspections (1997) (63)
- Heuristics for De-identifying Health Data (2008) (62)
- Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components (1997) (62)
- SPICE in retrospect: Developing a standard for process assessment (2007) (61)
- User participation in the requirements engineering process: An empirical study (1996) (57)
- Using simulation to build inspection efficiency benchmarks for development projects (1998) (56)
- Model Formulation: Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk (2009) (55)
- An empirical review of software process assessments (2000) (55)
- Validating Object-Oriented Design Metrics on a Commercial Java Application (2000) (54)
- A comparison and integration of capture-recapture models and the detection profile method (1998) (53)
- The ROI from Software Quality (2005) (50)
- The re-identification risk of Canadians from longitudinal demographics (2011) (49)
- Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak (2011) (48)
- SPICE: an empiricist's perspective (1995) (48)
- The application of subjective estimates of effectiveness to controlling software inspections (2000) (48)
- Findings from Phase 2 of the SPICE trials (2001) (46)
- Methods for the de-identification of electronic health records for genomic research (2011) (46)
- A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques (2015) (46)
- Explaining the cost of European space and military projects (1999) (43)
- A secure protocol for protecting the identity of providers when disclosing data for disease surveillance (2011) (43)
- A Survey of Systems Engineering Effectiveness (2007) (42)
- Risk-Based De-Identification of Health Data (2010) (41)
- Success or Failure ? Modeling the Likelihood of Software Process Improvement (1998) (41)
- Issues in Validating Object-Oriented Metrics for Early Risk Prediction (1999) (40)
- Fraunhofer Institute for Experimental Software Engineering (1997) (40)
- Costs and Benefits of Software Process Improvement (1997) (39)
- Methods for the de-identification of electronic health records for genomic research (2011) (38)
- An empirical evaluation of the ISO/IEC 15504 assessment model (2001) (35)
- Evaluating Identity Disclosure Risk in Fully Synthetic Health Data: Model Development and Validation (2020) (34)
- AINSI: an inductive method for software process improvement: concrete steps and guidelines (1995) (34)
- A Survey of Systems Engineering Effectiveness - Initial Results (with detailed survey response data) (2008) (34)
- Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data (2018) (34)
- Empirical Studies of Software Process Assessment Methods * † (1999) (33)
- The Internal Consistency of the ISO/IEC 15504 Software Process Capability Scale (1998) (33)
- A method for evaluating marketer re-identification risk (2010) (32)
- Evaluating the interrater agreement of process capability ratings (1997) (32)
- A method for managing re-identification risk from small geographic areas in Canada (2010) (32)
- Evaluating the risk of patient re-identification from adverse drug event reports (2013) (31)
- Comparing the benefits of pseudonymisation and anonymisation under the GDPR (2018) (30)
- Testing the theory of relative defect proneness for closed-source software (2010) (27)
- Critical Factors Affecting Personal Software Processes (2000) (27)
- A Protocol for the Secure Linking of Registries for HPV Surveillance (2012) (27)
- Assessor agreement in rating SPICE processes (1996) (26)
- How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials? (2011) (26)
- Accessing Health and Health-Related Data in Canada: The Expert Panel on Timely Access to Health and Social Data for Health Research and Health System Innovation (2015) (25)
- Estimating the extent of standards use: the case of ISO/IEC 15504 (2000) (24)
- De-identifying a public use microdata file from the Canadian national discharge abstract database (2011) (24)
- Causal analysis of the requirements change process for a large system (1997) (24)
- Cost implications of interrater agreement for software process assessments (1998) (22)
- A Review of Evidence on Consent Bias in Research (2013) (22)
- Customising Software Process Models (1995) (21)
- Identification and inclusion of gender factors in retrospective cohort studies: the GOING-FWD framework (2021) (21)
- Privacy Interests in Prescription Data, Part 2: Patient Privacy (2009) (21)
- An empirical evaluation of the G/Q/M method (1993) (21)
- An instrument for measuring the success of the requirements engineering process in information systems development (2004) (21)
- A Primer on Object-Oriented Measurement (2001) (20)
- An Overview of Techniques for De-Identifying Personal Health Information (2009) (20)
- The State of the Practice (2005) (20)
- A unified framework for evaluating the risk of re-identification of text de-identification tools (2016) (20)
- Personal Health Information Leak Prevention in Heterogeneous Texts (2009) (20)
- The reliability of ISO/IEC PDTR 15504 assessments (1997) (19)
- Can synthetic data be a proxy for real clinical trial data? A validation study (2021) (19)
- Measurement of Object-Oriented Software Development Projects (2001) (19)
- An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives (2007) (18)
- Optimizing the synthesis of clinical trial data using sequential trees (2020) (18)
- Two h-Index Benchmarks for Evaluating the Publication Performance of Medical Informatics Researchers (2012) (18)
- Quantitative modeling of software reviews in an industrial setting (1999) (17)
- The Internal Consistencies of the 1987 SEI Maturity Questionnaire and the SPICE Capability Dimension (1998) (17)
- The inadvertent disclosure of personal health information through peer-to-peer file sharing programs (2010) (17)
- Evaluating the utility of synthetic COVID-19 case data (2021) (17)
- SOFTWARE ENGINEERING PROCESS (2001) (17)
- Does Organizational Maturity Improve Quality? (1996) (16)
- “Not all my friends need to know”: a qualitative study of teenage patients, privacy, and social media (2013) (16)
- The Case for De-Identifying Personal Health Information (2011) (15)
- A Survey of Quality Assurance Practices in Biomedical Open Source Software Projects (2007) (15)
- Seven Ways to Evaluate the Utility of Synthetic Data (2020) (15)
- Benchmarking Kappa for Software Process Assessment Reliability Studies (1998) (14)
- Assessing data intrusion threats. (2015) (13)
- Evaluating the re-identification risk of a clinical study report anonymized under EMA Policy 0070 and Health Canada Regulations (2020) (13)
- Privacy Interests in Prescription Data, Part I: Prescriber Privacy (2009) (13)
- An Empirical Evaluation of the Prospective International SPICE Standard (1996) (13)
- The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules (2010) (12)
- Policy recommendations for addressing privacy challenges associated with cell-based research and interventions (2014) (12)
- Using Capture-Recapture Models for the Reinspection Decision (2003) (12)
- A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes (2014) (12)
- Efficient Active Learning for Electronic Medical Record De-identification. (2019) (11)
- Modelling the reliability of SPICE based assessments (1997) (11)
- Secure Surveillance of Antimicrobial Resistant Organism Colonization or Infection in Ontario Long Term Care Homes (2014) (10)
- Sex, Gender Factors and Cardiovascular Health in Canadian and Austrian Populations. (2021) (10)
- Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention (2017) (9)
- The Predictive Validity Criterion for Evaluating Binary Classifiers (1998) (8)
- Empirically Driven Improvement of Generic Process Models (1993) (8)
- Reply to ''Comments to the Paper: Briand, El Emam, Morasca: On the Application of Measurement Theory in Software Engineering'' (1997) (8)
- Evaluation of Rare Event Detection (2010) (8)
- Can Anonymous Posters on Medical Forums be Reidentified? (2013) (7)
- P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks (2012) (7)
- Correction: A Systematic Review of Re-Identification Attacks on Health Data (2015) (7)
- Utility Metrics for Evaluating Synthetic Health Data Generation Methods: Validation Study (2022) (6)
- The Optimal Team Size for UML Design Inspections (2000) (6)
- A comprehensive process model for studying software process papers (1993) (6)
- Advancing data science in drug development through an innovative computational framework for data sharing and statistical analysis (2021) (6)
- Privacy and Anonymity Challenges When Collecting Data for Public Health Purposes (2013) (6)
- Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: anonymization and ethics considerations for capturing and sharing patient reported outcomes. (2017) (6)
- A Method for Instrumenting Software Evolution Processes and An Example Application (1994) (6)
- Using Inspection Technology in Object-Oriented Development Projects (2000) (5)
- Authorship Attribution in Health Forums (2013) (5)
- Calculating Return-On-Investment (2005) (5)
- focus Factors Affecting Personal Software Processes (2000) (4)
- Efficient Private Information Retrieval for Geographical Aggregation (2014) (4)
- ES1: A Tool for Collecting Object-Oriented Design Metrics (2001) (4)
- Synthetic data as an enabler for machine learning applications in medicine (2022) (3)
- A Review of the Privacy-Enhancing Technologies Software Market (2021) (3)
- An Overview of Process Improvement in Small Settings (2006) (3)
- Evaluation of Learning from Screened Positive Examples (2008) (3)
- A tree-based approach to preserve the privacy of software engineering data and predictive models (2009) (3)
- Vasomotor symptoms in early breast cancer—a “real world” exploration of the patient experience (2022) (3)
- The Gender Outcomes International Group: to Further Well-being Development (Going-fwd) Methodology on Identification and Inclusion of Gender Factors in Retrospective Cohort Studies (2020) (2)
- Reconciling public health common good and individual privacy: new methods and issues in geoprivacy (2022) (2)
- Measuring re-identification risk using a synthetic estimator to enable data sharing (2022) (2)
- The Ethical Merits of Nudges in the Clinical Setting (2015) (2)
- Importance of sex and gender factors for COVID-19 infection and hospitalisation: a sex-stratified analysis using machine learning in UK Biobank data (2022) (2)
- Validating a membership disclosure metric for synthetic health data (2022) (2)
- Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials (2015) (2)
- Using machine learning to predict individual patient toxicities from cancer treatments (2022) (2)
- Real-World Data Set Parameters and Synthesization for Matching Identity in Clinical Protocols (2014) (2)
- A Tool for Simple and Efficient Clinical Protocol Evaluation (2014) (2)
- RETURN ON INVESTMENT MODELS FOR STATIC ANALYSIS TOOLS (2003) (2)
- Seven Ways to Evaluate the Utility of Synthetic Data (2020) (2)
- Quantitative Measurements based on Process and Context Models (1992) (2)
- Applications of statistics in software engineering (2004) (2)
- A theoretical model for obfuscating web navigation trails (2013) (2)
- de l ’ information Software Cost Estimation with Incomplete Data (2000) (2)
- A privacy preserving protocol for tracking participants in phase I clinical trials (2015) (2)
- Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules and its Implications for Software Refactoring and Quality (2019) (1)
- RETURN ON INVESTMENT MODELS (2003) (1)
- Does de-identification require consent under the GDPR and English common law? (2020) (1)
- SEX, GENDER AND CARDIOVASCULAR HEALTH, AN ANALYSIS OF SYNTHETIC DATA FROM A POPULATION BASED STUDY (2021) (1)
- Medical Data Privacy Handbook, A. Gkoulalas-Divanis, G. Loukides. Springer International Publishing, Switzerland (2015) 832 pp., ISBN: 978-3-319-23633-9 (2016) (1)
- Benefiting from Big Data while Protecting Individual Privacy (2012) (1)
- Policy recommendations for addressing privacy challenges associated with cell-based research and interventions (2014) (1)
- Scope, Terminology, and Definitions (2013) (1)
- Choosing Metric Thresholds (2013) (1)
- De-Identification Methods (2013) (1)
- Measuring the Probability of Re-Identification (2013) (1)
- Abstract P259: The Association Between Sex, Gender and Health Status of Stroke Survivors in the Canadian Population (2021) (1)
- Common Length Name Representation: An Efficient Privacy-Preserving Scheme (2015) (1)
- Designing and Implementing a Privacy Preserving Record Linkage Protocol (2018) (1)
- ROLE OF SEX AND GENDER IN ACCESS TO CARE AND CARDIOVASCULAR COMPLICATIONS OF INDIVIDUALS WITH DIABETES MELLITUS (2021) (1)
- Methods of Attack for Maximum Journalist Risk (2013) (0)
- Third International Workshop on Empirical Evaluation of Agile Methods ("The Data Workshop") (2004) (0)
- A Software Quality Benchmark (2005) (0)
- Data Breach Notifications (2013) (0)
- A COMPARISON OF SYNTHETIC DATA GENERATION AND FEDERATED ANALYSIS FOR PERFORMING AN INTERNATIONAL ASSESSMENT OF GENDER EFFECTS ON CARDIOVASCULAR HEALTH (2022) (0)
- Theoretical Re-Identification Attacks (2013) (0)
- des the Extent of Standards Use: The Case of ISO/IEC 15504 (2019) (0)
- Permitted Disclosures, Consent, and De-Identification of PHI (2013) (0)
- Understanding Disclosure Risks (2013) (0)
- Making the Business Case (2005) (0)
- The Quality of Open Source Software (2005) (0)
- Viewpoint: Implementing privacy-enhancing technologies in the time of a pandemic (2020) (0)
- Introducing JMIR AI (2022) (0)
- An Empirical Review of Software Process Assessments 1 (1999) (0)
- ' s response to reviews Title : De-identifying a Public Use Microdata File from the Canadian National Discharge (2011) (0)
- ROLE OF SEX AND GENDER IN DEVELOPMENT OF METABOLIC SYNDROME: A PROSPECTIVE COHORT STUDY (2022) (0)
- The Practices and Challenges of Generating Nonidentifiable Data (2022) (0)
- 1 Introduction 1 . 1 Use of Maturity Assessments and Assessment Scores (2007) (0)
- An Analysis of Historical Breach Notification Trends (2013) (0)
- Association between platelet volume indices and ST segment elevation myocardial infarction (STEMI) (2022) (0)
- Data Masking Methods (2013) (0)
- Quality and Profitability (2005) (0)
- A Methodology for Managing Re- Identification Risk (2013) (0)
- Quality and the Cost of Developers (2005) (0)
- Ethics and Open Source (2001) (0)
- Peeping and Snooping (2013) (0)
- How Many Friends Do We Have (2013) (0)
- Quality and the Cost to Developers (2005) (0)
- Assessing the Invasion of Privacy Construct (2013) (0)
- Quality and the Cost of Ownership (2005) (0)
- The Impact of Consent (2013) (0)
- Abstract 3605: ICGC in the cloud (2016) (0)
- - Theoretical Re-Identification Attacks (2013) (0)
- CHAPTER 9 SOFTWARE ENGINEERING PROCESS (2002) (0)
- ' s response to reviews Title : Managing Re-identification Risk for Small Geographic Areas (2009) (0)
- Expecting and Interpreting Evidence (2005) (0)
- Abstract 16147: Sex, Gender Factors and Cardiovascular Health in Canadian and Austrian Populations (2020) (0)
- Assessing the Motives and Capacity Construct (2013) (0)
- Example ROI Calculations (2005) (0)
- When may existing personal information and biospecimens be used for health research and planning? Themes from a series of deliberative dialogues (2013) (0)
- 1A Definition of Customer Costs (2005) (0)
- Modeling the Threat (2013) (0)
- Alternative Methods for Data Access (2013) (0)
- Cell Size Precedents (2013) (0)
- Privacy Preserving Issues in Data Publishing (2015) (0)
- A method for generating synthetic longitudinal health data (2023) (0)
- Electronic health records and the need for de-identification (2011) (0)
- Sex and gender aspects in diabetes mellitus: Focus on access to health care and cardiovascular outcomes (2023) (0)
- Reporting and Methodological Observations on Prognostic and Diagnostic Machine Learning Studies (2023) (0)
- Abstract 080: SEX AND GENDER ASPECTS IN HYPERTENSION PREVALENCE OF CANADIAN AND EUROPEAN POPULATIONS (2022) (0)
- # ISERN-95-03-1-Theoretical and Empirical Validation of Software Product Measures 1 (1995) (0)
- Definitions of Identifiability (2013) (0)
- Evaluating Identity Disclosure Risk in Fully Synthetic Health Data: Model Development and Validation (Preprint) (2020) (0)
- Protecting personal health information : The roles of context , framing and priming in privacy-related choices (2015) (0)
- Measures of Uniqueness (2013) (0)
- Public Perception and Privacy Protective Behaviors (2013) (0)
- Software Engineering R&D group at CRIM (1996) (0)
- Public perceptions of re-identification attacks Ester (2015) (0)
- A Methodology for Managing Re-Identification Risk (2013) (0)
- Expanding the role of PETs in the data protection and privacy narrative (2019) (0)
- Practical Methods for De-Identification (2013) (0)
- Permitted Uses and Disclosures of Health Information (2013) (0)
- Description of The SWEBOK Knowledge Area Software Engineering Process (Version 0.5) (2001) (0)
- Frequently Asked Questions about De-Identification (2013) (0)
- Heuristics for De-identifying Health Data (2008) (0)
- Algorithms to anonymize structured medical and healthcare data: A systematic review (2022) (0)
- Assessing the Mitigating Controls Construct (2013) (0)
- Measuring Software Quality (2005) (0)
- Deleting Health Research Data Under the GDPR and the Law of Confidence of England and Wales (2020) (0)
- Software Quality Practices (2005) (0)
- Workshop on Intelligent Methods for Protecting Privacy and Confidentiality in Data (2010) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Khaled El Emam?
Khaled El Emam is affiliated with the following schools: