Results 61 to 70 of about 217,163 (333)

Software Reliability Attributes Estimation for Information Systems of Personally Identifiable Information

open access: yesБезопасность информационных технологий, 2012
This paper deals with reliability estimation for information systems of personally identifiable information in the case of infrequent failures. The method for samples aggregation is presented.
A. V. Titov, V. O. Chukanov
doaj  

Semi-Supervised First-Person Activity Recognition in Body-Worn Video [PDF]

open access: yes, 2019
Body-worn cameras are now commonly used for logging daily life, sports, and law enforcement activities, creating a large volume of archived footage. This paper studies the problem of classifying frames of footage according to the activity of the camera ...
Akar, Osman   +8 more
core   +1 more source

Customized Malware: Identifying Target Systems Using Personally Identifiable Information [PDF]

open access: yes
Given the increasing popularity of sandbox analysis, malware authors have adapted sandbox evasion functionalities into modern malware. In addition, attackers can create Customized Malware that hide their malicious payload until the identifier of the ...
Ichikawa, Daigo   +6 more
core   +1 more source

Down Syndrome in Maternity Care: Mothers' Experiences of Prenatal Screening

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT Prenatal screening for Down syndrome (DS) is offered to expectant parents receiving antenatal care in many countries, with an emphasis on providing parents with the opportunity to make informed choices about their pregnancy. We examined experiences of prenatal screening among mothers of children with DS living in England, Scotland, or Wales ...
Tamar Rutter   +5 more
wiley   +1 more source

Understanding the Security and Privacy Concerns About the Use of Identifiable Health Data in the Context of the COVID-19 Pandemic: Survey Study of Public Attitudes Toward COVID-19 and Data-Sharing

open access: yesJMIR Formative Research, 2022
BackgroundThe COVID-19 pandemic increased the availability and use of population and individual health data to optimize tracking and analysis of the spread of the virus.
Charlotte Summers   +3 more
doaj   +1 more source

Information Security: Protecting Personally Identifiable Information [PDF]

open access: yes, 2008
A letter report issued by the Government Accountability Office with an abstract that begins "The loss of personally identifiable information can result in substantial harm, embarrassment, and inconvenience to individuals and may lead to identity theft or
United States. Government Accountability Office.
core  

Equitable Collaboration Between LMIC and HIC Researchers, Part I: A Preliminary Framework for Capacity Building in Psychiatric Genetics Research

open access: yesAmerican Journal of Medical Genetics Part B: Neuropsychiatric Genetics, EarlyView.
ABSTRACT International collaborations between high‐income countries (HICs) and low‐ and middle‐income countries (LMICs) have become increasingly essential in advancing global health, particularly within psychiatric research. These partnerships not only accelerate scientific discovery and enhance public health, but they also bring to light significant ...
Brenda Cabrera‐Mendoza   +27 more
wiley   +1 more source

Patient Privacy in the Era of Big Data

open access: yesBalkan Medical Journal, 2018
Protecting patient privacy requires various technical tools. It involves regulations for sharing, de-identifying, securely storing, transmitting and handling protected health information (PHI). It involves privacy laws and legal agreements.
Mehmet Kayaalp
doaj   +1 more source

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]

open access: yes, 2012
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David   +3 more
core  

The Willingness of Crowds: Cohort Disclosure Preferences for Personally Identifying Information

open access: yesProceedings of the International AAAI Conference on Web and Social Media, 2019
Exploiting personal identifying information (PII) is critical for secure access to digital and web-based systems, it is also a significant element of the online social media business model. However, how this exploitation relates to users’ valuation of their PII is poorly understood as an individual’s willingness to disclose items of PII in different ...
Marmion, Vincent, Joseph   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy