Results 71 to 80 of about 703,137 (389)
The Reliability Analysis for Information Security Metrics in Academic Environment
Today, academic institution involves digital data to support the educational process. It has advantages, especially related to ease of access and process. However, security problems appear related to digital data.
Prajna Deshanta Ibnugraha+4 more
doaj +1 more source
“Who's breaking the law … not us, them!”: Inside immigration detention in Portugal
Abstract In this paper, we examine immigration detention in Portugal, a system whose daily operations and inherent violence are overlooked in both public and academic discourses. Even within community psychology, discussions on immigration detention have largely remained on the fringes of scholarly debates. Guided by a justice‐centered ecological lens,
Francesca Esposito+3 more
wiley +1 more source
Patient Privacy in the Era of Big Data
Protecting patient privacy requires various technical tools. It involves regulations for sharing, de-identifying, securely storing, transmitting and handling protected health information (PHI). It involves privacy laws and legal agreements.
Mehmet Kayaalp
doaj +1 more source
Personalization Trade-offs in Designing a Dialogue-based Information System for Support-Seeking of Sexual Violence Survivors [PDF]
The lack of reliable, personalized information often complicates sexual violence survivors' support-seeking. Recently, there is an emerging approach to conversational information systems for support-seeking of sexual violence survivors, featuring personalization with wide availability and anonymity.
arxiv
Privacy Rights Versus FOIA Disclosure Policy: The Uses and Effects Double Standard in Access to Personally-Identifiable Information in Government Records [PDF]
The U.S. government maintains a vast amount of personally-identifiable information on millions of American citizens. Much of this information is contained in electronic databases maintained by federal agencies.
Chamberlin, Bill F.+2 more
core +1 more source
This paper deals with reliability estimation for information systems of personally identifiable information in the case of infrequent failures. The method for samples aggregation is presented.
A. V. Titov, V. O. Chukanov
doaj
Identity Theft: The Importance of Prosecuting on Behalf of Victims
Rates of victimization from identity theft continue to rise exponentially. Personally identifiable information (PII) has become vitally valuable data bad actors use to commit fraud against individuals.
Christopher S. Kayser+2 more
doaj +1 more source
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss+10 more
doaj
Use of apps in the COVID-19 response and the loss of privacy protection [PDF]
Mobile apps provide a convenient source of tracking and data collection to fight against the spread of COVID-19. We report our analysis of 50 COVID-19-related apps, including their use and their access to personally identifiable information, to ensure ...
Bashir, Masooda, Sharma, Tanusree
core +1 more source
Enabling the Analysis of Personality Aspects in Recommender Systems [PDF]
Existing Recommender Systems mainly focus on exploiting users' feedback, e.g., ratings, and reviews on common items to detect similar users. Thus, they might fail when there are no common items of interest among users. We call this problem the Data Sparsity With no Feedback on Common Items (DSW-n-FCI). Personality-based recommender systems have shown a
arxiv