Results 301 to 310 of about 225,999 (330)
Some of the next articles are maybe not open access.
IEEE International Conference on Technologies for Homeland Security, 2019
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari +3 more
semanticscholar +1 more source
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari +3 more
semanticscholar +1 more source
International Conference on Ubiquitous and Future Networks, 2019
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go +5 more
semanticscholar +1 more source
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go +5 more
semanticscholar +1 more source
Personal Identifiable Information and Laws: The Case of Financial Services
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences, 2011The ability of information and communication technology to gather, process, and distribute vast amounts of information has magnified privacy concerns. Information privacy laws regulate the handling of personal identifiable information (PII) by recognizing the rights that persons should have and the responsibilities organizations should accept.
Sabah S. AlFedaghi - +1 more
openaire +1 more source
2018 IEEE International Conference on Big Data (Big Data), 2018
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII.
R. Marciano +5 more
semanticscholar +1 more source
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII.
R. Marciano +5 more
semanticscholar +1 more source
International Conference on Identity, Security and Behavior Analysis, 2019
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang +4 more
semanticscholar +1 more source
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang +4 more
semanticscholar +1 more source
De-Identifying Student Personally Identifying Information with GPT-4
Education is increasingly taking place in learning environments mediated by technology. This transition has made it easier to collect student-generated data including comments in discussion forums and chats. Although this data is extremely valuable to researchers, it often contains sensitive information like names, locations, social media links, and ...Shreya Singhal +5 more
openaire +1 more source
Modelling of personal identifiable information in a resource description framework
International Journal of Metadata, Semantics and Ontologies, 2008This paper introduces a Resource Description Framework (RDF)-based ontology to model Personal Identifiable Information (PII). The triples construct is applied to 'atomic' private statements. RDF is divided into two modes: personal information mode (PIRDF) and non-personal information mode.
Sabah Al Fedaghi, Anfal Ashkanani
openaire +1 more source
Personally identifiable information does not always include a name
Recruiting & Retaining Adult Learners, 2020Case name: Letter to: University of Texas Medical Branch (SPPO 11/22/19).
openaire +2 more sources
The Cleaned Repository of Annotated Personally Identifiable Information
Protecting student privacy is of paramount importance and has historically meant that that educational datasets are not released to the general community and instead shared among a small number of researchers working on specific projects. However, these datasets could provide significant value to the educational research community if they were made ...Langdon Holmes +3 more
openaire +1 more source
Replacing Personally-Identifying Information in Medical Records, the Scrub System
Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium, 1996We define a new approach to locating and replacing personally-identifying information in unrestricted text that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally ...
openaire +2 more sources

