Results 11 to 20 of about 19,515 (229)

A hybrid rule-based NLP and machine learning approach for PII detection and anonymization in financial documents [PDF]

open access: yesScientific Reports
Safeguarding Personally Identifiable Information (PII) in financial documents is essential to prevent data breaches and maintain regulatory compliance.
Kushagra Mishra   +2 more
doaj   +2 more sources

Examining the applicability of hard data protection law on demographically identifiable information (DII): the case of humanitarian UAV/drone images in Malawi [PDF]

open access: yesJournal of International Humanitarian Action
Research carried out in Northern Malawi concluded that protecting and ensuring responsible use of drone-collected data in disaster-risk areas should be left entirely to the humanitarian organisations collecting these data, with little participation ...
Rogers Alunge Alunge Nnangsope
doaj   +2 more sources

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum

open access: yesIEEE Access, 2021
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero   +4 more
doaj   +1 more source

The Protection of Personally Identifiable Information

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2007
Personally identifiable information (PII) can be defined as any piece of information that can, directly or indirectly and unrelated to the public interest, be used to identify a natural person.
DeLiang Liu
doaj   +1 more source

Prioritizing Personal Data Protection in Insurance Organizations: A Review

open access: yesJournal of Information Security and Cybercrimes Research, 2023
This literature review focuses on the importance of prioritizing personal data security in insurance organizations in the context of Web 2.0 and the fourth industrial revolution.
Cosmas Knowen, Lamek Ronoh, Anne
doaj   +1 more source

What’s on the Horizon? An In-Depth Forensic Analysis of Android and iOS Applications

open access: yesIEEE Access, 2021
In the digital forensics discipline, the lack of comprehensive research that addresses investigative challenges and opportunities for newer mobile Operating Systems (OSs) such as Android and iOS keeps continuing.
Fahad E. Salamh   +4 more
doaj   +1 more source

Protection of Personal Information in Medical Journal Publications [PDF]

open access: yesNeurointervention, 2019
It aimed to present the definition of personal information based on Korean laws that protect personal information and the process of protection of personal information in journal publishing based on the guidelines of the International Committee of ...
Sun Huh
doaj   +1 more source

Building a best-in-class automated de-identification tool for electronic health records through ensemble learning

open access: yesPatterns, 2021
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss   +10 more
doaj   +1 more source

Analysis of Factors in Technological Development to Accelerate the Customer Interaction: Based on Patent Data from Xiaomi in China

open access: yesAAOS Transactions, 2022
The purpose of this report is to identify distinctive efforts in Xiaomi's technology development based on an analysis of patent data from Xiaomi in China.
Sachiko MIYAGAWA
doaj   +1 more source

Home - About - Disclaimer - Privacy