Clinical epidemiology and patient-oriented health care research that incorporates neighborhood-level data is becoming increasingly common. A key step in conducting this research is converting patient address data to longitude and latitude data,
Andrew Graham Rundle +2 more
doaj +4 more sources
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data [PDF]
With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII).
Abhishek Sharma, May Bantan
doaj +4 more sources
A Survey on Securing Personally Identifiable Information on Smartphones [PDF]
With an ever-increasing footprint, already topping three billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this also makes them a popular target for hackers.
Pope, Dar’rell +2 more
core +6 more sources
Rainbow: reliable personally identifiable information retrieval across multi-cloud [PDF]
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.
Zishuai Song +4 more
doaj +3 more sources
Ensuring a safe(r) harbor: Excising personally identifiable information from structured electronic health record data [PDF]
Recent findings have shown that the continued expansion of the scope and scale of data collected in electronic health records are making the protection of personally identifiable information (PII) more challenging and may inadvertently put our ...
Emily R. Pfaff +7 more
doaj +3 more sources
Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smart ...
Imran Makhdoom +5 more
doaj +3 more sources
NLP-based removal of personally identifiable information from Hungarian electronic health records [PDF]
IntroductionElectronic health records (EHR) in text format serve as crucial resources for data-driven medical research. To safeguard patient confidentiality, under the General Data Protection Regulation (GDPR), strict measures are required to ensure ...
András Berzi +5 more
doaj +4 more sources
Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data [PDF]
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in
Abdul Majeed +2 more
doaj +4 more sources
The Protection of Personally Identifiable Information
Personally identifiable information (PII) can be defined as any piece of information that can, directly or indirectly and unrelated to the public interest, be used to identify a natural person.
DeLiang Liu
doaj +3 more sources
Navigating the tradeoff between personal privacy and data utility in speech anonymization for clinical research [PDF]
Speech data inherently contains personally identifiable information. Anonymization strategies to obscure this while preserving essential characteristics all represent a tradeoff between privacy and utility.
Catherine Diaz-Asper +2 more
doaj +2 more sources

