Results 291 to 300 of about 225,999 (330)
Some of the next articles are maybe not open access.

Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web

Intelligence and Security Informatics, 2020
Personally identifiable information (PII) has become a major target of cyber-attacks, causing severe losses to data breach victims. To protect data breach victims, researchers focus on collecting exposed PII to assess privacy risk and identify at-risk ...
Yizhi Liu   +8 more
semanticscholar   +1 more source

Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem

Conference on Data and Application Security and Privacy
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA).
Mehrnoosh Zaeifi   +8 more
semanticscholar   +1 more source

Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information

International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, 2020
People continue to store their sensitive information in their smart-phone applications. Users seldom read an app’s privacy policy to see how their information is being collected, used, and shared.
Kai-Chi Chang   +3 more
semanticscholar   +1 more source

Sign Up Wallet: A Blockchain based Personally Identifiable Information (PII) Masking using Lookup Substitution

2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
The aim of this work is to revolutionize digital identity management by introducing a secure, decentralized and user-centric approach using block chain. It includes a number of trained websites which are both risky and nonrisky.
P. Kalyanasundaram   +4 more
semanticscholar   +1 more source

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach

2020 International Conference on Data Mining Workshops (ICDMW), 2020
The information privacy of the Internet users has become a major societal concern. The rapid growth of online services increases the risk of unauthorized access to Personally Identifiable Information (PII) of at-risk populations, who are unaware of their
Fangyu Lin   +8 more
semanticscholar   +1 more source

A Note on the Power of Personal Identifying Information

Journal of the Operational Research Society, 1982
The values of names, addresses and dates of birth for identifying individuals uniquely depends on several factors. This note shows how to combine the inherent power of an identifier, its availability and its error rate to give a practical measure for ranking its usefulness.
openaire   +1 more source

Scanning electronic documents for personally identifiable information

Proceedings of the 5th ACM workshop on Privacy in electronic society, 2006
Sometimes, it is necessary to remove author names and other personally identifiable information (PII) from documents before publication. We have implemented a novel defensive tool for detecting such data automatically. By using the detection tool, we have learned about where PII may be stored in documents and how it is put there.
Tuomas Aura, Thomas A. Kuhn, Michael Roe
openaire   +1 more source

The Case for De-Identifying Personal Health Information

SSRN Electronic Journal, 2011
The demand on data custodians to disclose health information for secondary purposes is increasing dramatically. These demands come from researchers, public health professionals, commercial actors, and governments. In many jurisdictions, de-identification is one set of methods that can be used to allow the use and disclosure of health information ...
Khaled El Emam   +2 more
openaire   +1 more source

General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management

2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2018
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben   +4 more
semanticscholar   +1 more source

The Collection, Dissemination and Tagging of Personally Identifying Information

SSRN Electronic Journal, 2008
As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire   +1 more source

Home - About - Disclaimer - Privacy