Results 331 to 340 of about 703,137 (389)
Some of the next articles are maybe not open access.

The Collection, Dissemination and Tagging of Personally Identifying Information

SSRN Electronic Journal, 2008
As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire   +2 more sources

A Digital Forensic Investigation of the Presence of Personally Identifiable Information (PII) in Refurbished Hard Drives

Journal of cybersecurity and information management
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible ...
Robinson Robinson, Blossom U. Idigbo
semanticscholar   +1 more source

General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management

2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2018
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben   +4 more
semanticscholar   +1 more source

Modeling Personal Identifiable Information using First-Order Logic

2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018
Estimating the quality of Personal Identifiable Information (PII) creates a corresponding need to model and formalize PII for both the real-world and electronic data, in a way that supports rigorous reasoning relative to real-world constraints, rules from domain experts, and rules about expected data patterns.
Stephen W. Clyde, Amani Shatnawi
openaire   +1 more source

Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog [PDF]

open access: possible, 2014
Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now.
Shi Guangjun   +3 more
openaire   +1 more source

Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy

IEEE International Conference on Technologies for Homeland Security, 2019
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari   +3 more
semanticscholar   +1 more source

Analysis and Nudging of Personally Identifiable Information in Online Used Markets

2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2019
In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime.
Hyunsu Mun, Youngseok Lee
openaire   +2 more sources

An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic

International Conference on Ubiquitous and Future Networks, 2019
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go   +5 more
semanticscholar   +1 more source

Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research

International Conference on Identity, Security and Behavior Analysis, 2019
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang   +4 more
semanticscholar   +1 more source

Replacing Personally-Identifying Information in Medical Records, the Scrub System

Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium, 1996
We define a new approach to locating and replacing personally-identifying information in unrestricted text that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy