Results 31 to 40 of about 217,163 (333)
The aim of this work is to revolutionize digital identity management by introducing a secure, decentralized and user-centric approach using block chain. It includes a number of trained websites which are both risky and nonrisky.
T. Mukilan, P. Kavitha, S. Kamalakkannan
openalex +2 more sources
Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes [PDF]
Personally Identifiable Information (PII) is often called the "currency of the Internet" as identity assets are collected, shared, sold, and used for almost every transaction on the Internet. PII is used for all types of applications from access control
Chen, Chia-Ju
core +1 more source
Prioritizing Personal Data Protection in Insurance Organizations: A Review
This literature review focuses on the importance of prioritizing personal data security in insurance organizations in the context of Web 2.0 and the fourth industrial revolution.
Cosmas Knowen, Lamek Ronoh, Anne
doaj +1 more source
What’s on the Horizon? An In-Depth Forensic Analysis of Android and iOS Applications
In the digital forensics discipline, the lack of comprehensive research that addresses investigative challenges and opportunities for newer mobile Operating Systems (OSs) such as Android and iOS keeps continuing.
Fahad E. Salamh+4 more
doaj +1 more source
Protection of Personal Information in Medical Journal Publications [PDF]
It aimed to present the definition of personal information based on Korean laws that protect personal information and the process of protection of personal information in journal publishing based on the guidelines of the International Committee of ...
Sun Huh
doaj +1 more source
Experimentation with Personal Identifiable Information
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that
Sabah Al-Fedaghi+1 more
openaire +3 more sources
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss+10 more
doaj +1 more source
Detection and Labeling of Personal Identifiable Information in E-mails [PDF]
The protection of personal identifiable information (PII) is increasingly demanded by customers and data protection regulation. To safeguard PII a organization has to find out which incoming communication actually contains it. Only then PII can be labeled, tracked, and protected. E-mails are one of the main means of communication.
Bier, C., Prior, J.
openaire +4 more sources
The purpose of this report is to identify distinctive efforts in Xiaomi's technology development based on an analysis of patent data from Xiaomi in China.
Sachiko MIYAGAWA
doaj +1 more source
Gender bias recognition in political news articles
Gender bias exists not only in the stereotypes used to portray male and female figures, but more importantly, in the word choice media outlets use to describe political figures.
Sara R. Davis+2 more
doaj +1 more source