Results 291 to 300 of about 187,926 (331)
Some of the next articles are maybe not open access.
A Note on the Power of Personal Identifying Information
Journal of the Operational Research Society, 1982The values of names, addresses and dates of birth for identifying individuals uniquely depends on several factors. This note shows how to combine the inherent power of an identifier, its availability and its error rate to give a practical measure for ranking its usefulness.
openaire +2 more sources
Identifying the information people use to build personality ratings
Personality and Individual Differences, 2014Personality ratings based on the five-factor model (FFM) predict important outcomes, including work and academic performance, health, and longevity. Despite this substantial evidence of predictive validity, little research has examined what information people use to produce these ratings.
Arthur Eugene Poropat, M. Weimers
openaire +2 more sources
An Overview of Techniques for De-Identifying Personal Health Information
SSRN Electronic Journal, 2009There is increasing demand for the use and disclosure of personal health information (PHI) for secondary purposes. In the context of health information, 'secondary purposes' is defined as any retrospective processing of existing data that is not part of providing care to the patient.
Khaled El Emam, Anita Fineberg
openaire +2 more sources
The Collection, Dissemination and Tagging of Personally Identifying Information
SSRN Electronic Journal, 2008As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire +2 more sources
Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog [PDF]
Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now.
Shi Guangjun+3 more
openaire +1 more source
Modeling Personal Identifiable Information using First-Order Logic
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018Estimating the quality of Personal Identifiable Information (PII) creates a corresponding need to model and formalize PII for both the real-world and electronic data, in a way that supports rigorous reasoning relative to real-world constraints, rules from domain experts, and rules about expected data patterns.
Stephen W. Clyde, Amani Shatnawi
openaire +1 more source
2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 2020
Personally identifiable information (PII) has become a major target of cyber-attacks, causing severe losses to data breach victims. To protect data breach victims, researchers focus on collecting exposed PII to assess privacy risk and identify at-risk individuals.
Hsinchun Chen+8 more
openaire +2 more sources
Personally identifiable information (PII) has become a major target of cyber-attacks, causing severe losses to data breach victims. To protect data breach victims, researchers focus on collecting exposed PII to assess privacy risk and identify at-risk individuals.
Hsinchun Chen+8 more
openaire +2 more sources
Analysis and Nudging of Personally Identifiable Information in Online Used Markets
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2019In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime.
Hyunsu Mun, Youngseok Lee
openaire +2 more sources
Replacing Personally-Identifying Information in Medical Records, the Scrub System
Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium, 1996We define a new approach to locating and replacing personally-identifying information in unrestricted text that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally ...
openaire +2 more sources
Identifying textual personal information using bidirectional LSTM networks
2018 26th Signal Processing and Communications Applications Conference (SIU), 2018Data-driven approaches based on the data collected from individuals are improving everyday life as a result of the developments in big data studies. Prior to developing such an approach, removal of personal information from the data is important since personal information contained in data would jeopardize people's privacy and may harm related ...
Memduh Cagri Demir, Seyda Ertekin
openaire +2 more sources