Results 301 to 310 of about 217,163 (333)
Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog [PDF]
Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now.
Shi Guangjun+3 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Modeling Personal Identifiable Information using First-Order Logic
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018Estimating the quality of Personal Identifiable Information (PII) creates a corresponding need to model and formalize PII for both the real-world and electronic data, in a way that supports rigorous reasoning relative to real-world constraints, rules from domain experts, and rules about expected data patterns.
Stephen W. Clyde, Amani Shatnawi
openaire +1 more source
Analysis and Nudging of Personally Identifiable Information in Online Used Markets
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2019In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime.
Hyunsu Mun, Youngseok Lee
openaire +2 more sources
Journal of cybersecurity and information management
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible ...
Robinson Robinson, Blossom U. Idigbo
semanticscholar +1 more source
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible ...
Robinson Robinson, Blossom U. Idigbo
semanticscholar +1 more source
2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2018
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben+4 more
semanticscholar +1 more source
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben+4 more
semanticscholar +1 more source
Replacing Personally-Identifying Information in Medical Records, the Scrub System
Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium, 1996We define a new approach to locating and replacing personally-identifying information in unrestricted text that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally ...
openaire +2 more sources
IEEE International Conference on Technologies for Homeland Security, 2019
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari+3 more
semanticscholar +1 more source
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari+3 more
semanticscholar +1 more source
Proposal on personal identifiers generated from the STR information of DNA
International Journal of Information Security, 2002Summary: The individual differences in the repeat count of several bases, Short Tandem Repeat (STR), among all of the DeoxyriboNucleic Acid (DNA) base sequences, can be used as unique DNA information for a personal IDentification (ID). We propose a method to generate a personal identifier (hereafter referred to as a ``DNA personal ID'') by specifying ...
Toshio Nagashima+3 more
openaire +2 more sources
Identifying textual personal information using bidirectional LSTM networks
2018 26th Signal Processing and Communications Applications Conference (SIU), 2018Data-driven approaches based on the data collected from individuals are improving everyday life as a result of the developments in big data studies. Prior to developing such an approach, removal of personal information from the data is important since personal information contained in data would jeopardize people's privacy and may harm related ...
Memduh Cagri Demir, Seyda Ertekin
openaire +2 more sources
International Conference on Ubiquitous and Future Networks, 2019
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go+5 more
semanticscholar +1 more source
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go+5 more
semanticscholar +1 more source