Results 101 to 110 of about 703,137 (389)

Explaining Scenarios for Information Personalization [PDF]

open access: yesarXiv, 2001
Personalization customizes information access. The PIPE ("Personalization is Partial Evaluation") modeling methodology represents interaction with an information space as a program. The program is then specialized to a user's known interests or information seeking activity by the technique of partial evaluation.
arxiv  

Managing Personal Identifiable Information in Data Lakes

open access: yesIEEE Access
Privacy is a fundamental human right according to the Universal Declaration of Human Rights of the United Nations. Adoption of the General Data Protection Regulation (GDPR) in European Union in 2018 was turning point in management of personal data, specifically personal identifiable information (PII).
Dražen Oreščanin   +2 more
openaire   +2 more sources

Folktales - La Llorona - Heard story from - Brother - Female (1982) [PDF]

open access: yes, 1982
Folktales collected by anthropology students in 1982. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1004/thumbnail ...

core   +1 more source

Supporting the Recovery of NDIS Participants With Psychosocial Disability: A Narrative Literature Review

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This narrative literature review examines key issues surrounding psychosocial disability support in the National Disability Insurance Scheme (NDIS). It highlights the NDIS's neoliberal approach to support, which has underpinned a lack of clarity around the conceptualisation of psychosocial disability and recovery.
Johnny Choi, Kathy Ellem, John Drayton
wiley   +1 more source

Implementing privacy-preserving record linkage: welcome to the real world

open access: yesInternational Journal of Population Data Science, 2017
Objectives While record linkage has become a strategic research priority within Australia and internationally, legal and administrative issues prevent data linkage in some situations due to privacy concerns.
James Boyd   +4 more
doaj   +1 more source

Folktales - La Llorona - Heard story from - Cousin - Female (1980-1992) [PDF]

open access: yes, 1980
Folktales collected by anthropology students in 1980–1992. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1005/thumbnail ...

core   +1 more source

Folktales - La Llorona - Heard story from - Father - Female (1980-1996) [PDF]

open access: yes, 1980
Folktales collected by anthropology students from 1980–1996. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1006/thumbnail ...

core   +1 more source

On the problem of protection of personal information

open access: yesХабаршы. Заң сериясы, 2015
The article analyzes the concepts and different regulatory approaches to the concept and content of personal information. It accentuates the de­ ficiencies of modern legislation on the status of personal information and their constituents.
A. Ye. Zhatkanbayeva
doaj  

Medical students' initial experiences of the dissection room and interaction with body donors: A qualitative study of professional identity formation, educational benefits, and the experience of Pasifika students

open access: yesAnatomical Sciences Education, EarlyView.
Abstract The first experience of medical students in the dissecting room (DR) likely influences professional identity formation (PIF). Sparse data exist exploring how exposure to the DR and body donors without undertaking dissection influences PIF, or how culture may influence this experience.
Jacob Madgwick   +2 more
wiley   +1 more source

The Development of a Named Entity Recognizer for Detecting Personal Information Using a Korean Pretrained Language Model

open access: yesApplied Sciences
Social network services and chatbots are susceptible to personal information leakage while facilitating language learning without time or space constraints. Accurate detection of personal information is paramount in avoiding such leaks.
Sungsoon Jang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy