Results 21 to 30 of about 703,137 (389)

Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect

open access: bronzeJournal of Accounting, Finance, Economics, and Social Sciences, 2020
This paper presents application of deep learning and machine learning models in detecting personally identifiable information (PII) in unstructured text (emails).
Anil K. Makhija
semanticscholar   +3 more sources

Using Data Mining Methods to Predict Personally Identifiable Information in Emails

open access: green, 2008
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many potential sources for privacy leaks. Information extraction methods have been applied to detect private information in text files.
Geng, L.   +5 more
openaire   +5 more sources

Enhancing the De-identification of Personally Identifiable Information in Educational Data [PDF]

open access: green
Protecting Personally Identifiable Information (PII), such as names, is a critical requirement in learning technologies to safeguard student and teacher privacy and maintain trust. Accurate PII detection is an essential step toward anonymizing sensitive information while preserving the utility of educational data.
Shen, Y.   +3 more
openaire   +3 more sources

Detection and Classification of Personally Identifiable Information in Images Using Artificial Intelligence [PDF]

open access: greenJournal of Current Trends in Computer Science Research
Personally Identifiable Information (PII) is any content that is sensitive that needs to be treated as secure and private. When data pieces such as a person’s name, address, Social Security number, phone number, email address, and so on may be used to identify a specific individual, they are deemed PII.
Owais Shaikh
openaire   +2 more sources

Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation

open access: goldJMIR Med Inform, 2017
Xianlai Chen   +4 more
openalex   +2 more sources

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum

open access: yesIEEE Access, 2021
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero   +4 more
doaj   +1 more source

Building strength for the long haul toward liberation: What psychology can contribute to the resilience of communities targeted by state‐sanctioned violence

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 475-492, December 2022., 2022
Abstract State‐sanctioned violence (SSV) has resounding effects on entire populations, and marginalized communities have long persisted in the work toward liberation despite continued SSV. This paper aims to bridge the gap between the vast scholarship on resilience and the practical challenge of sustaining and thriving in communities targeted by SSV ...
Kris T. Gebhard   +4 more
wiley   +1 more source

Facilitating connection to enhance college student well‐being: Evaluation of an experiential group program

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 314-326, December 2022., 2022
Abstract This randomized controlled trial examined the impact of The Connection Project, an experiential, relationship‐focused intervention designed to improve school belongingness and decrease symptoms of depression and loneliness among new college students.
Meghan A. Costello   +6 more
wiley   +1 more source

Identifying Personal Information in Internet Traffic [PDF]

open access: yesProceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Users today access a multitude of online services---among the most popular of which are online social networks (OSNs)---via both web sites and dedicated mobile applications (apps), using a range of devices (traditional PCs, tablets, and smartphones) that are connected via a variety of networks.
Liu, Y.   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy