Improved De-Identification of Physician Notes Through Integrative Modeling of Both Public and Private Medical Text

Improved De-Identification of Physician Notes Through Integrative Modeling of Both Public and Private Medical Text

Improved de-identification of physician notes through integrative modeling of both public and private medical text The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation McMurry, Andrew J. et al. “Improved De-identification of Physician Notes through Integrative Modeling of Both Public and Private Medical Text.” BMC Medical Informatics and Decision Making 13.1 (2013): 112. As Published http://dx.doi.org/10.1186/1472-6947-13-112 Publisher BioMed Central Ltd Version Final published version Citable link http://hdl.handle.net/1721.1/81881 Terms of Use Creative Commons Attribution Detailed Terms http://creativecommons.org/licenses/by/2.0 McMurry et al. BMC Medical Informatics and Decision Making 2013, 13:112 http://www.biomedcentral.com/1472-6947/13/112 RESEARCH ARTICLE Open Access Improved de-identification of physician notes through integrative modeling of both public and private medical text Andrew J McMurry1,2,3,5*†, Britt Fitch1*†, Guergana Savova2, Isaac S Kohane1,2,4 and Ben Y Reis1,2 Abstract Background: Physician notes routinely recorded during patient care represent a vast and underutilized resource for human disease studies on a population scale. Their use in research is primarily limited by the need to separate confidential patient information from clinical annotations, a process that is resource-intensive when performed manually. This study seeks to create an automated method for de-identifying physician notes that does not require large amounts of private information: in addition to training a model to recognize Protected Health Information (PHI) within private physician notes, we reverse the problem and train a model to recognize non-PHI words and phrases that appear in public medical texts. Methods: Public and private medical text sources were analyzed to distinguish common medical words and phrases from Protected Health Information. Patient identifiers are generally nouns and numbers that appear infrequently in medical literature. To quantify this relationship, term frequencies and part of speech tags were compared between journal publications and physician notes. Standard medical concepts and phrases were then examined across ten medical dictionaries. Lists and rules were included from the US census database and previously published studies. In total, 28 features were used to train decision tree classifiers. Results: The model successfully recalled 98% of PHI tokens from 220 discharge summaries. Cost sensitive classification was used to weight recall over precision (98% F10 score, 76% F1 score). More than half of the false negatives were the word “of” appearing in a hospital name. All patient names, phone numbers, and home addresses were at least partially redacted. Medical concepts such as “elevated white blood cell count” were informative for de-identification. The results exceed the previously approved criteria established by four Institutional Review Boards. Conclusions: The results indicate that distributional differences between private and public medical text can be used to accurately classify PHI. The data and algorithms reported here are made freely available for evaluation and improvement. Keywords: Natural language processing (L01.224.065.580), Confidentiality (I01.880.604.473.650.500), Pattern recognition automated (L01.725), Electronic Health Records (E05.318.308.940.968.625.500) * Correspondence: [email protected]; [email protected] †Equal contributors 1Harvard Medical School Center for Biomedical Informatics, Boston, MA, USA 2Children's Hospital Informatics Program at the Harvard-MIT division of Health Sciences and Technology, Boston, MA, USA Full list of author information is available at the end of the article © 2013 McMurry et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. McMurry et al. BMC Medical Informatics and Decision Making 2013, 13:112 Page 2 of 11 http://www.biomedcentral.com/1472-6947/13/112 Background texts to learn the distributional characteristics of indi- Physician's notes contain information that may never be vidual PHI tokens that could appear in any type of recorded in a coded format in the patient health record physician note. This is in contrast to other models [1-3], such as family history [4], smoking history [5-7], that use features that may be specific to the style and and descriptions of lab results [8,9]. Nonetheless, the format of discharge summaries such as section head- “uncoded” information buried in physician notes is so ings [21], sentence position [18], and longer token se- valuable that numerous attempts have been made to- quences [17-20]. We show that publicly available wards indexing and sharing notes for research use. How- medical texts provide an informative background dis- ever, since physician notes can contain patient names, tribution of sharable medical words, a property that is home addresses, social security numbers, and other largely underutilized in patient privacy research. types of Protected Health Information (PHI) [10], vast quantities of doctors’ notes have gone largely unused for Methods medical research studies. Methods to simultaneously Instead of trying to recognize PHI words in physician protect patient privacy and increase research utility are notes, we reversed the problem towards recognizing needed – as the number of electronic health record sys- non-PHI words. We asked, “what are the chances that tems increases and with it the opportunity to study lar- a word or phrase would appear in a medical journal ger numbers of patients [11-13]. or medical dictionary? What are the lexical properties Existing methods for de-identifying medical texts of PHI words? To what extent can we use publicly range from simple rule-based systems to sophisticated available data to recognize data that is private and machine learning algorithms [14,15]. The majority of confidential?” currently implemented methods are rule-based systems While human annotated datasets of PHI are few in that match patterns and dictionaries of expressions that number and difficult to obtain, examples of public med- frequently contain PHI [16]. The advantage of rule- ical text are broadly available and generally underutilized based systems is that experts can quickly define rules for de-identification. By definition, medical journal pub- and iteratively fine tune them to achieve higher accur- lications provide the distributional evidence for words acy. While rule-based systems have shown high recall in that are not PHI. Of course, some medical words will some settings [16], they often have the disadvantage of end up being proper names but the public corpora pro- hard coding rules to a specific note format or physician vide a heuristic measure of likelihood that we exploit as writing style, resulting in poor performance in other described below. In this context, relatively fewer human contexts. Adjusting existing rule systems for use at other annotated examples are treated as approximations of the medical centers is often too costly, limiting broad use distributional properties of PHI. Lexical comparisons be- across institutions. This problem is well recognized tween PHI words and non-PHI words reveal that PHI [14,15], and has prompted efforts using an alternative, words are generally nouns and numbers – whereas verbs machine learning approach. Rather than using the expert and adjectives are probably ok to share -- especially to author rules, the rules for PHI removal are “learned” medically relevant verbs and adjectives that are of more by training an algorithm using human annotated exam- relevant to research studies. Publicly available lists of ples (i.e. a supervised learning task). For example, suspicious words and expert rules are also incorporated competitors in the i2b2 de-identification challenge into this algorithm, such as US census data and the [14] were asked to train or tune their algorithms on Beckwith regex list [16]. We combine the discrimination one set of human annotated notes and then validate power of these complementary perspectives to achieve their best model on a separate set of annotated notes. improved de-identification performance. As an add- Generally, the highest scoring algorithms used ma- itional safeguard, notes can be indexed [25] and later chine learning methods such as conditional random searched using coded medical concepts, thereby redu- fields [17-20], decision trees [21], support vector ma- cing the number of full-text reports that need to be chines [22,23], and meta-classifiers that combine and shared in early phases of research [26]. weight different strategies for high-recall with false positive filtering [24]. Design principles The work reported here was trained and validated The Scrubber was designed with the following general on the same i2b2 challenge datasets, which allows for observations about physician notes and other types of comparison to prior work. Our algorithm performed medical text: (1) words that occur only in physician favorably with regards to recall, albeit with lower pre- notes have increased risk for PHI, especially nouns cision (see results). The primary difference between and numbers which are the only types of PHI words; our method and other top scores in the i2b2 chal- (2) words that

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us