Results 291 to 300 of about 217,163 (333)
Some of the next articles are maybe not open access.
Personal Identifiable Information and Laws: The Case of Financial Services
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences, 2011The ability of information and communication technology to gather, process, and distribute vast amounts of information has magnified privacy concerns. Information privacy laws regulate the handling of personal identifiable information (PII) by recognizing the rights that persons should have and the responsibilities organizations should accept.
Saud A. AlBehairy, Sabah S. AlFedaghi
openaire +2 more sources
Conference on Data and Application Security and Privacy
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA).
Mehrnoosh Zaeifi+8 more
semanticscholar +1 more source
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA).
Mehrnoosh Zaeifi+8 more
semanticscholar +1 more source
Modelling of personal identifiable information in a resource description framework
International Journal of Metadata, Semantics and Ontologies, 2008This paper introduces a Resource Description Framework (RDF)-based ontology to model Personal Identifiable Information (PII). The triples construct is applied to 'atomic' private statements. RDF is divided into two modes: personal information mode (PIRDF) and non-personal information mode.
Sabah Al-Fedaghi, Anfal Ashkanani
openaire +2 more sources
2024 International Conference on Engineering and Emerging Technologies (ICEET)
Modern Day Enterprises collect a vast amount of Personal Identifiable Information (PII) from different sources, including interactions with customers, online behavior, survey responses, user feedback, Internet of Things (loT) devices, smartphone usage ...
Dorababu Nadella
semanticscholar +1 more source
Modern Day Enterprises collect a vast amount of Personal Identifiable Information (PII) from different sources, including interactions with customers, online behavior, survey responses, user feedback, Internet of Things (loT) devices, smartphone usage ...
Dorababu Nadella
semanticscholar +1 more source
A Note on the Power of Personal Identifying Information
Journal of the Operational Research Society, 1982The values of names, addresses and dates of birth for identifying individuals uniquely depends on several factors. This note shows how to combine the inherent power of an identifier, its availability and its error rate to give a practical measure for ranking its usefulness.
openaire +2 more sources
International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, 2020
People continue to store their sensitive information in their smart-phone applications. Users seldom read an app’s privacy policy to see how their information is being collected, used, and shared.
Kai-Chi Chang+3 more
semanticscholar +1 more source
People continue to store their sensitive information in their smart-phone applications. Users seldom read an app’s privacy policy to see how their information is being collected, used, and shared.
Kai-Chi Chang+3 more
semanticscholar +1 more source
An Overview of Techniques for De-Identifying Personal Health Information
SSRN Electronic Journal, 2009There is increasing demand for the use and disclosure of personal health information (PHI) for secondary purposes. In the context of health information, 'secondary purposes' is defined as any retrospective processing of existing data that is not part of providing care to the patient.
Khaled El Emam, Anita Fineberg
openaire +2 more sources
Identifying the information people use to build personality ratings
Personality and Individual Differences, 2014Personality ratings based on the five-factor model (FFM) predict important outcomes, including work and academic performance, health, and longevity. Despite this substantial evidence of predictive validity, little research has examined what information people use to produce these ratings.
Arthur Eugene Poropat, M. Weimers
openaire +2 more sources
2020 International Conference on Data Mining Workshops (ICDMW), 2020
The information privacy of the Internet users has become a major societal concern. The rapid growth of online services increases the risk of unauthorized access to Personally Identifiable Information (PII) of at-risk populations, who are unaware of their
Fangyu Lin+8 more
semanticscholar +1 more source
The information privacy of the Internet users has become a major societal concern. The rapid growth of online services increases the risk of unauthorized access to Personally Identifiable Information (PII) of at-risk populations, who are unaware of their
Fangyu Lin+8 more
semanticscholar +1 more source
The Collection, Dissemination and Tagging of Personally Identifying Information
SSRN Electronic Journal, 2008As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire +2 more sources