Results 281 to 290 of about 225,999 (330)
Some of the next articles are maybe not open access.
Securing Personally Identifiable Information (PII) in Personal Financial Statements
FICC, 2023George Hamilton +2 more
openaire +2 more sources
BigData Congress [Services Society], 2023
This comprehensive study investigates the application of Large Language Models (LLMs) for detecting and protecting Personally Identifiable Information (PII) in archival data, a pressing concern for archives under the mandate to increase public access ...
Jianliang Yang +3 more
semanticscholar +1 more source
This comprehensive study investigates the application of Large Language Models (LLMs) for detecting and protecting Personally Identifiable Information (PII) in archival data, a pressing concern for archives under the mandate to increase public access ...
Jianliang Yang +3 more
semanticscholar +1 more source
How educational institutions reveal students’ personally identifiable information on Facebook
Journal of Educational Media, 2022Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy.
J. Rosenberg +5 more
semanticscholar +1 more source
Simple and Efficient Identification of Personally Identifiable Information on a Public Website
2022 IEEE International Conference on Big Data (Big Data), 2022Personally Identifiable Information (PII) is a key concept in privacy regulation. This form of information can provide revealing information about individuals, which may be collected and used for malicious purposes, such as social engineering and ...
Caitlin Brown, C. Morisset
semanticscholar +1 more source
Databases of Personal Identifiable Information
2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008This paper explores the difference between two types of information: personal identifiable information (PII), and non-identifiable information (NII) to argue that security, policy, and technical requirements set PII apart from NII. The paper describes databases of personal identifiable information that are built exclusively for this type of information
Sabah A. Al-Fedaghi, Bernhard Thalheim
openaire +1 more source
Cloud Data Breach Disclosures: the Consumer and their Personally Identifiable Information (PII)?
2021 IEEE Conference on Norbert Wiener in the 21st Century (21CW), 2021The incidence of cloud computing data breaches across the world is increasing as retailers, financial institutions, health providers and businesses of all sizes rely on infrastructure, platform, software, and anything as a service (IaaS, PaaS, SaaS and ...
David Kolevski +3 more
semanticscholar +1 more source
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM, 2010Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about individuals increase exponentially.
Arvind Narayanan, Vitaly Shmatikov
openaire +1 more source
The Impact of Personally Identifiable Information
IT Professional, 2007As CIO and IT managers, we need to start looking outside the box to prevent the loss of personally identifiable information (PII). This means looking beyond hardware and software solutions to the personnel solutions that might result in an improved quality of life, with less work outside the office. Personal information can include your financial data,
openaire +1 more source
Experimentation with the Design of Databases of Personal Identifiable Information
Journal of Convergence Information Technology, 2011A database of personal identifiable information (PII) is designed based on PII, analogous to normalizing relational database schema using data dependencies. A PII database with its own conceptual scheme, system management, and physical structure can be justified according to security and privacy considerations.
Sabah AlFedaghi - +2 more
openaire +1 more source
2024 4th International Conference on Advanced Research in Computing (ICARC)
The advent of the Internet has significantly stream-lined daily tasks through the rapid increase of online services. Everyday activities, such as purchasing goods and scheduling appointments with healthcare professionals, have become more speedy ...
Milinda Arambawela, A. Aponso
semanticscholar +1 more source
The advent of the Internet has significantly stream-lined daily tasks through the rapid increase of online services. Everyday activities, such as purchasing goods and scheduling appointments with healthcare professionals, have become more speedy ...
Milinda Arambawela, A. Aponso
semanticscholar +1 more source

