Clinical epidemiology and patient-oriented health care research that incorporates neighborhood-level data is becoming increasingly common. A key step in conducting this research is converting patient address data to longitude and latitude data,
Andrew Graham Rundle +2 more
doaj +3 more sources
NLP-based removal of personally identifiable information from Hungarian electronic health records [PDF]
IntroductionElectronic health records (EHR) in text format serve as crucial resources for data-driven medical research. To safeguard patient confidentiality, under the General Data Protection Regulation (GDPR), strict measures are required to ensure ...
András Berzi +5 more
doaj +4 more sources
Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data [PDF]
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in
Abdul Majeed +2 more
doaj +4 more sources
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data [PDF]
With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII).
Abhishek Sharma, May Bantan
doaj +3 more sources
Rainbow: reliable personally identifiable information retrieval across multi-cloud [PDF]
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.
Zishuai Song +4 more
doaj +2 more sources
Ensuring a safe(r) harbor: Excising personally identifiable information from structured electronic health record data [PDF]
Recent findings have shown that the continued expansion of the scope and scale of data collected in electronic health records are making the protection of personally identifiable information (PII) more challenging and may inadvertently put our ...
Emily R. Pfaff +7 more
doaj +2 more sources
Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smart ...
Imran Makhdoom +5 more
doaj +2 more sources
Improving targeted password guessing attacks by using personally identifiable information and old password [PDF]
Text-based passwords serve as a primary means of authentication and play a crucial role in securing information systems. However, easy-to-remember passwords are often vulnerable to targeted password guessing attacks.
Wei Ou +5 more
doaj +2 more sources
Navigating the tradeoff between personal privacy and data utility in speech anonymization for clinical research [PDF]
Speech data inherently contains personally identifiable information. Anonymization strategies to obscure this while preserving essential characteristics all represent a tradeoff between privacy and utility.
Catherine Diaz-Asper +2 more
doaj +2 more sources
KDPII: A New Korean Dialogic Dataset for the Deidentification of Personally Identifiable Information
The rapid growth of social media in the era of big data and artificial intelligence has raised significant safety concerns related to the communication of sensitive personal information.
Li Fei +5 more
doaj +2 more sources

