Results 281 to 290 of about 187,926 (331)

Personally identifiable information leakage through online social networks

open access: closedProceedings of the South African Institute for Computer Scientists and Information Technologists Conference, 2013
Information sharing on the Internet has become a streamlined process through services such as e-mail, blogs and recently also Online Social Networks (OSNs). The speed of posting information in one central place and the convenience of this information reaching a vast audience at the same time is a great advantage of this style of communication, but at ...
Candice Louw, Sebastiaan von Solms
openalex   +3 more sources

Databases of Personal Identifiable Information

2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
This paper explores the difference between two types of information: personal identifiable information (PII), and non-identifiable information (NII) to argue that security, policy, and technical requirements set PII apart from NII. The paper describes databases of personal identifiable information that are built exclusively for this type of information
Bernhard Thalheim, S.A. Al-Fedaghi
openaire   +2 more sources

Myths and fallacies of "Personally Identifiable Information"

Communications of the ACM, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about individuals increase exponentially.
Vitaly Shmatikov, Arvind Narayanan
openaire   +2 more sources

Experimentation with the Design of Databases of Personal Identifiable Information

Journal of Convergence Information Technology, 2011
A database of personal identifiable information (PII) is designed based on PII, analogous to normalizing relational database schema using data dependencies. A PII database with its own conceptual scheme, system management, and physical structure can be justified according to security and privacy considerations.
Sabah AlFedaghi   +2 more
openaire   +2 more sources

Hashing of personally identifiable information is not sufficient

2018
It is common practice of web tracking services to hash personally identifiable information (PII), e. g., e-mail or IP addresses, in order to avoid linkability between collected data sets of web tracking services and the corresponding users while still preserving the ability to update and merge data sets associated to the very same user over time ...
Matthias Marx   +4 more
openaire   +2 more sources

The Impact of Personally Identifiable Information

IT Professional, 2007
As CIO and IT managers, we need to start looking outside the box to prevent the loss of personally identifiable information (PII). This means looking beyond hardware and software solutions to the personnel solutions that might result in an improved quality of life, with less work outside the office. Personal information can include your financial data,
openaire   +2 more sources

Scanning electronic documents for personally identifiable information

Proceedings of the 5th ACM workshop on Privacy in electronic society, 2006
Sometimes, it is necessary to remove author names and other personally identifiable information (PII) from documents before publication. We have implemented a novel defensive tool for detecting such data automatically. By using the detection tool, we have learned about where PII may be stored in documents and how it is put there.
Thomas Kuhn, Michael Roe, Tuomas Aura
openaire   +2 more sources

The Case for De-Identifying Personal Health Information

SSRN Electronic Journal, 2011
The demand on data custodians to disclose health information for secondary purposes is increasing dramatically. These demands come from researchers, public health professionals, commercial actors, and governments. In many jurisdictions, de-identification is one set of methods that can be used to allow the use and disclosure of health information ...
Anita Fineberg   +2 more
openaire   +2 more sources

Personal Identifiable Information and Laws: The Case of Financial Services

INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences, 2011
The ability of information and communication technology to gather, process, and distribute vast amounts of information has magnified privacy concerns. Information privacy laws regulate the handling of personal identifiable information (PII) by recognizing the rights that persons should have and the responsibilities organizations should accept.
Saud A. AlBehairy, Sabah S. AlFedaghi
openaire   +2 more sources

Modelling of personal identifiable information in a resource description framework

International Journal of Metadata, Semantics and Ontologies, 2008
This paper introduces a Resource Description Framework (RDF)-based ontology to model Personal Identifiable Information (PII). The triples construct is applied to 'atomic' private statements. RDF is divided into two modes: personal information mode (PIRDF) and non-personal information mode.
Sabah Al-Fedaghi, Anfal Ashkanani
openaire   +2 more sources

Home - About - Disclaimer - Privacy