Results 331 to 340 of about 703,137 (389)
Some of the next articles are maybe not open access.
The Collection, Dissemination and Tagging of Personally Identifying Information
SSRN Electronic Journal, 2008As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires.
openaire +2 more sources
Journal of cybersecurity and information management
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible ...
Robinson Robinson, Blossom U. Idigbo
semanticscholar +1 more source
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible ...
Robinson Robinson, Blossom U. Idigbo
semanticscholar +1 more source
2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 2018
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben+4 more
semanticscholar +1 more source
Surveillance and secrecy breaching incidents of users' privacy questioned the current third-parties data collection procedure. Massive amounts of Personally Identifiable Information (PII) are being exploited due to malpractice, identity theft, spamming ...
Nasr Al-Zaben+4 more
semanticscholar +1 more source
Modeling Personal Identifiable Information using First-Order Logic
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018Estimating the quality of Personal Identifiable Information (PII) creates a corresponding need to model and formalize PII for both the real-world and electronic data, in a way that supports rigorous reasoning relative to real-world constraints, rules from domain experts, and rules about expected data patterns.
Stephen W. Clyde, Amani Shatnawi
openaire +1 more source
Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog [PDF]
Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now.
Shi Guangjun+3 more
openaire +1 more source
IEEE International Conference on Technologies for Homeland Security, 2019
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari+3 more
semanticscholar +1 more source
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread ...
Asma Alnemari+3 more
semanticscholar +1 more source
Analysis and Nudging of Personally Identifiable Information in Online Used Markets
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2019In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime.
Hyunsu Mun, Youngseok Lee
openaire +2 more sources
International Conference on Ubiquitous and Future Networks, 2019
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go+5 more
semanticscholar +1 more source
The widespread adoption of social networking and cloud computing has transformed today's Internet to a trove of personal information. As a consequence, data breaches are expected to increase in gravity and occurrence.
Sharleen Joy Y. Go+5 more
semanticscholar +1 more source
International Conference on Identity, Security and Behavior Analysis, 2019
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang+4 more
semanticscholar +1 more source
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately,
Jiaju Huang+4 more
semanticscholar +1 more source
Replacing Personally-Identifying Information in Medical Records, the Scrub System
Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium, 1996We define a new approach to locating and replacing personally-identifying information in unrestricted text that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally ...
openaire +2 more sources