Skip to content

Commit fc80f27

Browse files
authored
Merge pull request #6354 from openjournals/joss.07157
Merging automatically
2 parents f73c079 + 9063052 commit fc80f27

File tree

3 files changed

+802
-0
lines changed

3 files changed

+802
-0
lines changed
Lines changed: 239 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,239 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<doi_batch xmlns="http://www.crossref.org/schema/5.3.1"
3+
xmlns:ai="http://www.crossref.org/AccessIndicators.xsd"
4+
xmlns:rel="http://www.crossref.org/relations.xsd"
5+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
6+
version="5.3.1"
7+
xsi:schemaLocation="http://www.crossref.org/schema/5.3.1 http://www.crossref.org/schemas/crossref5.3.1.xsd">
8+
<head>
9+
<doi_batch_id>20250121162048-b90699a28c88db52c3d6e23cd6591b9c3484956d</doi_batch_id>
10+
<timestamp>20250121162048</timestamp>
11+
<depositor>
12+
<depositor_name>JOSS Admin</depositor_name>
13+
<email_address>[email protected]</email_address>
14+
</depositor>
15+
<registrant>The Open Journal</registrant>
16+
</head>
17+
<body>
18+
<journal>
19+
<journal_metadata>
20+
<full_title>Journal of Open Source Software</full_title>
21+
<abbrev_title>JOSS</abbrev_title>
22+
<issn media_type="electronic">2475-9066</issn>
23+
<doi_data>
24+
<doi>10.21105/joss</doi>
25+
<resource>https://joss.theoj.org</resource>
26+
</doi_data>
27+
</journal_metadata>
28+
<journal_issue>
29+
<publication_date media_type="online">
30+
<month>01</month>
31+
<year>2025</year>
32+
</publication_date>
33+
<journal_volume>
34+
<volume>10</volume>
35+
</journal_volume>
36+
<issue>105</issue>
37+
</journal_issue>
38+
<journal_article publication_type="full_text">
39+
<titles>
40+
<title>Deident: An R package for data anonymization</title>
41+
</titles>
42+
<contributors>
43+
<person_name sequence="first" contributor_role="author">
44+
<given_name>Robert M.</given_name>
45+
<surname>Cook</surname>
46+
<affiliations>
47+
<institution><institution_name>University of Staffordshire, Centre for Health Innovation, Blackheath Lane, Stafford, England</institution_name></institution>
48+
</affiliations>
49+
<ORCID>https://orcid.org/0000-0003-3343-8271</ORCID>
50+
</person_name>
51+
<person_name sequence="additional"
52+
contributor_role="author">
53+
<given_name>Md</given_name>
54+
<surname>Asaduzzaman</surname>
55+
<affiliations>
56+
<institution><institution_name>University of Staffordshire, Stoke-on-Trent, England</institution_name></institution>
57+
</affiliations>
58+
<ORCID>https://orcid.org/0000-0002-8885-6721</ORCID>
59+
</person_name>
60+
<person_name sequence="additional"
61+
contributor_role="author">
62+
<given_name>Sarahjane</given_name>
63+
<surname>Jones</surname>
64+
<affiliations>
65+
<institution><institution_name>University of Staffordshire, Centre for Health Innovation, Blackheath Lane, Stafford, England</institution_name></institution>
66+
</affiliations>
67+
<ORCID>https://orcid.org/0000-0003-4729-4029</ORCID>
68+
</person_name>
69+
</contributors>
70+
<publication_date>
71+
<month>01</month>
72+
<day>21</day>
73+
<year>2025</year>
74+
</publication_date>
75+
<pages>
76+
<first_page>7157</first_page>
77+
</pages>
78+
<publisher_item>
79+
<identifier id_type="doi">10.21105/joss.07157</identifier>
80+
</publisher_item>
81+
<ai:program name="AccessIndicators">
82+
<ai:license_ref applies_to="vor">http://creativecommons.org/licenses/by/4.0/</ai:license_ref>
83+
<ai:license_ref applies_to="am">http://creativecommons.org/licenses/by/4.0/</ai:license_ref>
84+
<ai:license_ref applies_to="tdm">http://creativecommons.org/licenses/by/4.0/</ai:license_ref>
85+
</ai:program>
86+
<rel:program>
87+
<rel:related_item>
88+
<rel:description>Software archive</rel:description>
89+
<rel:inter_work_relation relationship-type="references" identifier-type="doi">10.6084/m9.figshare.28033418</rel:inter_work_relation>
90+
</rel:related_item>
91+
<rel:related_item>
92+
<rel:description>GitHub review issue</rel:description>
93+
<rel:inter_work_relation relationship-type="hasReview" identifier-type="uri">https://github.com/openjournals/joss-reviews/issues/7157</rel:inter_work_relation>
94+
</rel:related_item>
95+
</rel:program>
96+
<doi_data>
97+
<doi>10.21105/joss.07157</doi>
98+
<resource>https://joss.theoj.org/papers/10.21105/joss.07157</resource>
99+
<collection property="text-mining">
100+
<item>
101+
<resource mime_type="application/pdf">https://joss.theoj.org/papers/10.21105/joss.07157.pdf</resource>
102+
</item>
103+
</collection>
104+
</doi_data>
105+
<citation_list>
106+
<citation key="harwich2018thinking">
107+
<article_title>Thinking on its own: AI in the NHS</article_title>
108+
<author>Harwich</author>
109+
<journal_title>Reform Research Trust</journal_title>
110+
<cYear>2018</cYear>
111+
<unstructured_citation>Harwich, E., &amp; Laycock, K. (2018). Thinking on its own: AI in the NHS. Reform Research Trust.</unstructured_citation>
112+
</citation>
113+
<citation key="wilson2019high">
114+
<article_title>High-tech plans for the NHS</article_title>
115+
<author>Wilson</author>
116+
<doi>10.1016/S0262-4079(19)31555-6</doi>
117+
<cYear>2019</cYear>
118+
<unstructured_citation>Wilson, C. (2019). High-tech plans for the NHS. Elsevier. https://doi.org/10.1016/S0262-4079(19)31555-6</unstructured_citation>
119+
</citation>
120+
<citation key="nelson2019predicting">
121+
<article_title>Predicting scheduled hospital attendance with artificial intelligence</article_title>
122+
<author>Nelson</author>
123+
<journal_title>NPJ digital medicine</journal_title>
124+
<issue>1</issue>
125+
<volume>2</volume>
126+
<doi>10.1038/s41746-019-0103-3</doi>
127+
<cYear>2019</cYear>
128+
<unstructured_citation>Nelson, A., Herron, D., Rees, G., &amp; Nachev, P. (2019). Predicting scheduled hospital attendance with artificial intelligence. NPJ Digital Medicine, 2(1), 26. https://doi.org/10.1038/s41746-019-0103-3</unstructured_citation>
129+
</citation>
130+
<citation key="yu2018artificial">
131+
<article_title>Artificial intelligence in healthcare</article_title>
132+
<author>Yu</author>
133+
<journal_title>Nature biomedical engineering</journal_title>
134+
<issue>10</issue>
135+
<volume>2</volume>
136+
<doi>10.1038/s41551-018-0305-z</doi>
137+
<cYear>2018</cYear>
138+
<unstructured_citation>Yu, K.-H., Beam, A. L., &amp; Kohane, I. S. (2018). Artificial intelligence in healthcare. Nature Biomedical Engineering, 2(10), 719–731. https://doi.org/10.1038/s41551-018-0305-z</unstructured_citation>
139+
</citation>
140+
<citation key="sales2000ethics">
141+
<volume_title>Ethics in research with human participants.</volume_title>
142+
<author>Sales</author>
143+
<cYear>2000</cYear>
144+
<unstructured_citation>Sales, B. D., &amp; Folkman, S. E. (2000). Ethics in research with human participants. American Psychological Association.</unstructured_citation>
145+
</citation>
146+
<citation key="UKRI">
147+
<article_title>Framework for research ethics</article_title>
148+
<author>UKRI</author>
149+
<cYear>2022</cYear>
150+
<unstructured_citation>UKRI. (2022). Framework for research ethics. https://www.ukri.org/councils/esrc/guidance-for-applicants/research-ethics-guidance/framework-for-research-ethics</unstructured_citation>
151+
</citation>
152+
<citation key="ICO">
153+
<article_title>What is personal information: A guide</article_title>
154+
<author>ICO</author>
155+
<cYear>2023</cYear>
156+
<unstructured_citation>ICO. (2023). What is personal information: A guide. https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/personal-information-what-is-it/what-is-personal-information-a-guide/</unstructured_citation>
157+
</citation>
158+
<citation key="tachepun2020data">
159+
<article_title>A data masking guideline for optimizing insights and privacy under GDPR compliance</article_title>
160+
<author>Tachepun</author>
161+
<journal_title>Proceedings of the 11th international conference on advances in information technology</journal_title>
162+
<doi>10.1145/3406601.3406627</doi>
163+
<cYear>2020</cYear>
164+
<unstructured_citation>Tachepun, C., &amp; Thammaboosadee, S. (2020). A data masking guideline for optimizing insights and privacy under GDPR compliance. Proceedings of the 11th International Conference on Advances in Information Technology, 1–9. https://doi.org/10.1145/3406601.3406627</unstructured_citation>
165+
</citation>
166+
<citation key="digest2021">
167+
<volume_title>Digest: Create compact hash digests of R objects</volume_title>
168+
<author>Antoine Lucas</author>
169+
<doi>10.32614/cran.package.digest</doi>
170+
<cYear>2021</cYear>
171+
<unstructured_citation>Antoine Lucas, D. E. with contributions by, Tuszynski, J., Bengtsson, H., Urbanek, S., Frasca, M., Lewis, B., Stokely, M., Muehleisen, H., Murdoch, D., Hester, J., Wu, W., Kou, Q., Onkelinx, T., Lang, M., Simko, V., Hornik, K., Neal, R., Bell, K., de Queljoe, M., … Winston Chang., and. (2021). Digest: Create compact hash digests of R objects. https://doi.org/10.32614/cran.package.digest</unstructured_citation>
172+
</citation>
173+
<citation key="Anonymizer2024">
174+
<article_title>Anonymizer: Anonymize data containing personally identifiable information (PII) in R</article_title>
175+
<author>Hendricks</author>
176+
<cYear>2017</cYear>
177+
<unstructured_citation>Hendricks, P. (2017). Anonymizer: Anonymize data containing personally identifiable information (PII) in R. https://github.com/paulhendricks/anonymizer</unstructured_citation>
178+
</citation>
179+
<citation key="deidentifyr2024">
180+
<article_title>Deidentifyr</article_title>
181+
<author>Wilkins</author>
182+
<cYear>2019</cYear>
183+
<unstructured_citation>Wilkins, D. (2019). Deidentifyr. https://github.com/wilkox/deidentifyr</unstructured_citation>
184+
</citation>
185+
<citation key="wang2005break">
186+
<article_title>How to break MD5 and other hash functions</article_title>
187+
<author>Wang</author>
188+
<journal_title>Annual international conference on the theory and applications of cryptographic techniques</journal_title>
189+
<doi>10.1007/11426639_2</doi>
190+
<cYear>2005</cYear>
191+
<unstructured_citation>Wang, X., &amp; Yu, H. (2005). How to break MD5 and other hash functions. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 19–35. https://doi.org/10.1007/11426639_2</unstructured_citation>
192+
</citation>
193+
<citation key="szikora2022end">
194+
<volume_title>The end of encryption?–the era of quantum computers</volume_title>
195+
<author>Szikora</author>
196+
<doi>10.1007/978-94-024-2174-3_5</doi>
197+
<cYear>2022</cYear>
198+
<unstructured_citation>Szikora, P., &amp; Lazányi, K. (2022). The end of encryption?–the era of quantum computers (pp. 61–72). Springer. https://doi.org/10.1007/978-94-024-2174-3_5</unstructured_citation>
199+
</citation>
200+
<citation key="ICOAnonymisation">
201+
<article_title>Anonymisation: Managing data protection risk code of practice</article_title>
202+
<author>ICO</author>
203+
<cYear>2012</cYear>
204+
<unstructured_citation>ICO. (2012). Anonymisation: Managing data protection risk code of practice.</unstructured_citation>
205+
</citation>
206+
<citation key="NIST2015">
207+
<volume_title>De-identification of personal information</volume_title>
208+
<author>Garfinkel</author>
209+
<doi>10.6028/NIST.IR.8053</doi>
210+
<cYear>2015</cYear>
211+
<unstructured_citation>Garfinkel, S. L. (2015). De-identification of personal information. NIST. https://doi.org/10.6028/NIST.IR.8053</unstructured_citation>
212+
</citation>
213+
<citation key="integrateIO">
214+
<article_title>6 steps for data pseudonymization</article_title>
215+
<author>Integrate.IO</author>
216+
<unstructured_citation>Integrate.IO. (n.d.). 6 steps for data pseudonymization. https://www.integrate.io/blog/6-steps-to-pseudonymize-pii/#steps</unstructured_citation>
217+
</citation>
218+
<citation key="tidyverse">
219+
<article_title>Welcome to the tidyverse</article_title>
220+
<author>Wickham</author>
221+
<journal_title>Journal of Open Source Software</journal_title>
222+
<issue>43</issue>
223+
<volume>4</volume>
224+
<doi>10.21105/joss.01686</doi>
225+
<cYear>2019</cYear>
226+
<unstructured_citation>Wickham, H., Averick, M., Bryan, J., Chang, W., McGowan, L. D., François, R., Grolemund, G., Hayes, A., Henry, L., Hester, J., Kuhn, M., Pedersen, T. L., Miller, E., Bache, S. M., Müller, K., Ooms, J., Robinson, D., Seidel, D. P., Spinu, V., … Yutani, H. (2019). Welcome to the tidyverse. Journal of Open Source Software, 4(43), 1686. https://doi.org/10.21105/joss.01686</unstructured_citation>
227+
</citation>
228+
<citation key="babynames2021">
229+
<volume_title>Babynames: US baby names 1880-2017</volume_title>
230+
<author>Wickham</author>
231+
<doi>10.32614/cran.package.babynames</doi>
232+
<cYear>2021</cYear>
233+
<unstructured_citation>Wickham, H. (2021). Babynames: US baby names 1880-2017. https://doi.org/10.32614/cran.package.babynames</unstructured_citation>
234+
</citation>
235+
</citation_list>
236+
</journal_article>
237+
</journal>
238+
</body>
239+
</doi_batch>

joss.07157/10.21105.joss.07157.pdf

227 KB
Binary file not shown.

0 commit comments

Comments
 (0)