Results 311 to 320 of about 217,163 (333)
Some of the next articles are maybe not open access.
2018 IEEE International Conference on Big Data (Big Data), 2018
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII.
R. Marciano+5 more
semanticscholar +1 more source
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII.
R. Marciano+5 more
semanticscholar +1 more source
International Conference on Identity, Security and Behavior Analysis, 2019
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang+4 more
semanticscholar +1 more source
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang+4 more
semanticscholar +1 more source
2018 International Conference on Applied Information Technology and Innovation (ICAITI), 2018
Based on Indonesian regulations, organizations that manage personal data must implement internal policies in protecting and securing personal data. In providing personal data protection can be done by identifying the impact level of information to be mapped to Security and Privacy Control of NIST SP800-53.
Nanang Trianto, Fajar Yoga Pradana
openaire +2 more sources
Based on Indonesian regulations, organizations that manage personal data must implement internal policies in protecting and securing personal data. In providing personal data protection can be done by identifying the impact level of information to be mapped to Security and Privacy Control of NIST SP800-53.
Nanang Trianto, Fajar Yoga Pradana
openaire +2 more sources
Securing Personally Identifiable Information (PII) in Personal Financial Statements
FICC, 2023George Hamilton+2 more
semanticscholar +1 more source
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
Security and Privacy in Communication Networks, 2022Qiying Dong+3 more
semanticscholar +1 more source
Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches
The Geneva Papers on Risk and Insurance - Issues and Practice, 2020Omer Ilker Poyraz+4 more
semanticscholar +1 more source
Research on the Bundles of Personal Identifiable Information Right
Wonkwang University Legal Research Institute, 2018law, Dongde Hou
openaire +1 more source
International Conference on Advanced Information Networking and Applications
Md Hasan Shahriar+2 more
semanticscholar +1 more source
Md Hasan Shahriar+2 more
semanticscholar +1 more source