Results 11 to 20 of about 703,137 (389)

Does fine-tuning GPT-3 with the OpenAI API leak personally-identifiable information? [PDF]

open access: greenarXiv.org, 2023
Machine learning practitioners often fine-tune generative pre-trained models like GPT-3 to improve model performance at specific tasks. Previous works, however, suggest that fine-tuned machine learning models memorize and emit sensitive information from ...
A. Sun   +6 more
semanticscholar   +3 more sources

Enabling Efficient Personally Identifiable Information Detection with Automatic Consent Discovery

open access: diamondECTI Transactions on Computer and Information Technology, 2023
Personal data leakage prevention has now become a critical issue for implementing data management and sharing in many industries. Several data privacy regulations such as General Data Protection Regulation (GDPR), Health Insurance Portability and ...
S. Fugkeaw, Pattavee Sanchol
semanticscholar   +3 more sources

Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique [PDF]

open access: goldInternational Journal of Advanced Computer Science and Applications, 2021
Personally Identifiable Information (PII) has gained much attention with the rapid development of technologies and the exploitation of information relating to an individual.
Poornima Kulkarni, Cauvery N K
semanticscholar   +2 more sources

Effect of Adopting AI to Explore Big Data on Personally Identifiable Information (PII) for Financial and Economic Data Transformation

open access: bronzeAsian Journal of Economics Business and Accounting
The integration of Artificial Intelligence (AI) into big data analytics represents a pivotal shift in the management of Personally Identifiable Information (PII) within the financial sector.
S. Olabanji   +5 more
semanticscholar   +3 more sources

On the leakage of personally identifiable information via online social networks [PDF]

open access: bronzeACM SIGCOMM Computer Communication Review, 2009
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual.
Craig E. Wills   +1 more
openaire   +4 more sources

Privacy in Public Archives: Managing Personally Identifiable Information in Special Collections

open access: diamondRBM A Journal of Rare Books Manuscripts and Cultural Heritage, 2021
Archivists aim to make research and manuscripts accessible to the public. However, accessibility becomes tricky when donors or institutions enforce limitations. Sometimes limitations need to be enforced, especially when dealing with sensitive information
Zachary Stein
semanticscholar   +3 more sources

Trust Concerns Regarding Health-Related Smartphone Apps in Collecting Personally Identifiable Information Throughout COVID-19-like Zoonosis

open access: goldJournal of Engineering Advancements, 2021
Coronavirus disease 2019 or COVID-19 is a zoonosis, which means a disease that contaminates from the animals to the humans. Since it is very highly epizootic, it has forced the public health experts to implement smartphone-based applications to trace its
Molla Rashied Hussein   +4 more
semanticscholar   +2 more sources

A pseudonymized corpus of occupational health narratives for clinical entity recognition in Spanish [PDF]

open access: yesBMC Medical Informatics and Decision Making
Despite the high creation cost, annotated corpora are indispensable for robust natural language processing systems. In the clinical field, in addition to annotating medical entities, corpus creators must also remove personally identifiable information ...
Jocelyn Dunstan   +8 more
doaj   +2 more sources

Cyber-Assets at Risk (CAR): The Cost of Personally Identifiable Information Data Breaches [PDF]

open access: yes, 2020
: Severe financial consequences of data breaches enforce organizations to reconsider their cybersecurity investment. Although attack frequency and trends seem similar per industry, the impact of a data breach may exponentially increase depending on the ...
Bouazzaoui, Sarah   +4 more
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy