Results 201 to 210 of about 703,137 (389)
Data Collection and Leakage [PDF]
Every year millions of digital records containing personally identifiable information are exposed. When are malicious hackers to blame, and when is it organizational malfeasance?
Erickson, Kris, Howard, P.N.
core +1 more source
An Expected Harm Approached To Compensating Consumers for Unauthorized Information Disclosures [PDF]
On May 22, 2007, the Executive Office of the President of the United States issued a memorandum concerned with safeguarding personal information, which first defined the term “personally identifiable information” as follows: [I]nformation which can be ...
Yoo, Rachel
core +1 more source
First analytical evidence and replication of yet undescribed substantial change in gilding technology in the early modern period ‐ the replacement of imported red clay (bole) with locally available bauxite. Proof of its source ‐ Croatian Minjera, according to a unique find of mineral diaspore.
David Hradil+3 more
wiley +1 more source
JumpStarter: Getting Started on Personal Goals with Adaptive Personal Context Curation [PDF]
Everyone aspires to achieve personal goals. However, getting started is often complex and daunting, especially for large projects. AI has the potential to create plans and help jumpstart progress, but it often lacks sufficient personal context to be useful.
arxiv
Security Without Obscurity: Managing Personally Identifiable Information in Born-Digital Archives
Ben Goldman, Timothy D. Pyatt
openalex +2 more sources
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information [PDF]
Sebastian Labitzke
openalex +1 more source
Psychedelics, such as psilocybin and lysergic acid diethylamide (LSD), are being investigated for the treatment of depressive and anxiety disorders, for which concomitant treatment with selective serotonin reuptake inhibitors (SSRIs) is prevalent.
Anna M. Becker+12 more
wiley +1 more source
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process [PDF]
Iuon‐Chang Lin+2 more
openalex +1 more source
ABSTRACT This study examines a unique form of public inquiry that we refer to as “privately commissioned public inquiries.” These inquiries focus on events or incidents that indicate broader structural problems of neglect, misjudgment, or injustice. Using qualitative interview methods, we explore such an inquiry in the global mining industry.
Jill Harris, Deanna Kemp, John R. Owen
wiley +1 more source
Solutions to Mitigate Information Security Breaches and Protect Personally Identifiable Information in a Public-Sector Cloud Computing Environment [PDF]
Information is a significant asset to organizations because more organizations are moving data and applications to the cloud, so it is critical to ensure the protection of personally identifiable information (PII) stored in the cloud.
Rountree, Valerie Johneeda
core +1 more source