Results 21 to 30 of about 187,926 (331)

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum

open access: yesIEEE Access, 2021
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero   +4 more
doaj   +1 more source

Identifying Personal Information in Internet Traffic [PDF]

open access: yesProceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Users today access a multitude of online services---among the most popular of which are online social networks (OSNs)---via both web sites and dedicated mobile applications (apps), using a range of devices (traditional PCs, tablets, and smartphones) that are connected via a variety of networks.
Liu, Y.   +5 more
openaire   +3 more sources

Unresolved Privacy and Ethics Issues Related to Learning Analytics in Higher Education and Academic Librarianship

open access: yesEmerging Library & Information Perspectives, 2021
Learning analytics involve big data collection, analysis processes, and technology that are used in higher education institutes and academic libraries to support student success and perform organizational assessment.
Chad Currier
doaj   +1 more source

Prioritizing Personal Data Protection in Insurance Organizations: A Review

open access: yesJournal of Information Security and Cybercrimes Research, 2023
This literature review focuses on the importance of prioritizing personal data security in insurance organizations in the context of Web 2.0 and the fourth industrial revolution.
Cosmas Knowen, Lamek Ronoh, Anne
doaj   +1 more source

What’s on the Horizon? An In-Depth Forensic Analysis of Android and iOS Applications

open access: yesIEEE Access, 2021
In the digital forensics discipline, the lack of comprehensive research that addresses investigative challenges and opportunities for newer mobile Operating Systems (OSs) such as Android and iOS keeps continuing.
Fahad E. Salamh   +4 more
doaj   +1 more source

Protection of Personal Information in Medical Journal Publications [PDF]

open access: yesNeurointervention, 2019
It aimed to present the definition of personal information based on Korean laws that protect personal information and the process of protection of personal information in journal publishing based on the guidelines of the International Committee of ...
Sun Huh
doaj   +1 more source

Experimentation with Personal Identifiable Information

open access: yesIntelligent Information Management, 2012
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that
Sabah Al-Fedaghi   +1 more
openaire   +3 more sources

Detection and Labeling of Personal Identifiable Information in E-mails [PDF]

open access: yes, 2014
The protection of personal identifiable information (PII) is increasingly demanded by customers and data protection regulation. To safeguard PII a organization has to find out which incoming communication actually contains it. Only then PII can be labeled, tracked, and protected. E-mails are one of the main means of communication.
Bier, C., Prior, J.
openaire   +4 more sources

Analysis of Factors in Technological Development to Accelerate the Customer Interaction: Based on Patent Data from Xiaomi in China

open access: yesAAOS Transactions, 2022
The purpose of this report is to identify distinctive efforts in Xiaomi's technology development based on an analysis of patent data from Xiaomi in China.
Sachiko MIYAGAWA
doaj   +1 more source

Home - About - Disclaimer - Privacy