Results 71 to 80 of about 703,137 (389)

The Reliability Analysis for Information Security Metrics in Academic Environment

open access: yesJOIV: International Journal on Informatics Visualization, 2023
Today, academic institution involves digital data to support the educational process. It has advantages, especially related to ease of access and process. However, security problems appear related to digital data.
Prajna Deshanta Ibnugraha   +4 more
doaj   +1 more source

“Who's breaking the law … not us, them!”: Inside immigration detention in Portugal

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract In this paper, we examine immigration detention in Portugal, a system whose daily operations and inherent violence are overlooked in both public and academic discourses. Even within community psychology, discussions on immigration detention have largely remained on the fringes of scholarly debates. Guided by a justice‐centered ecological lens,
Francesca Esposito   +3 more
wiley   +1 more source

Patient Privacy in the Era of Big Data

open access: yesBalkan Medical Journal, 2018
Protecting patient privacy requires various technical tools. It involves regulations for sharing, de-identifying, securely storing, transmitting and handling protected health information (PHI). It involves privacy laws and legal agreements.
Mehmet Kayaalp
doaj   +1 more source

Personalization Trade-offs in Designing a Dialogue-based Information System for Support-Seeking of Sexual Violence Survivors [PDF]

open access: yesarXiv, 2022
The lack of reliable, personalized information often complicates sexual violence survivors' support-seeking. Recently, there is an emerging approach to conversational information systems for support-seeking of sexual violence survivors, featuring personalization with wide availability and anonymity.
arxiv  

Privacy Rights Versus FOIA Disclosure Policy: The Uses and Effects Double Standard in Access to Personally-Identifiable Information in Government Records [PDF]

open access: yes, 2003
The U.S. government maintains a vast amount of personally-identifiable information on millions of American citizens. Much of this information is contained in electronic databases maintained by federal agencies.
Chamberlin, Bill F.   +2 more
core   +1 more source

Software Reliability Attributes Estimation for Information Systems of Personally Identifiable Information

open access: yesБезопасность информационных технологий, 2012
This paper deals with reliability estimation for information systems of personally identifiable information in the case of infrequent failures. The method for samples aggregation is presented.
A. V. Titov, V. O. Chukanov
doaj  

Identity Theft: The Importance of Prosecuting on Behalf of Victims

open access: yesLaws
Rates of victimization from identity theft continue to rise exponentially. Personally identifiable information (PII) has become vitally valuable data bad actors use to commit fraud against individuals.
Christopher S. Kayser   +2 more
doaj   +1 more source

Building a best-in-class automated de-identification tool for electronic health records through ensemble learning

open access: yesPatterns, 2021
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss   +10 more
doaj  

Use of apps in the COVID-19 response and the loss of privacy protection [PDF]

open access: yes, 2020
Mobile apps provide a convenient source of tracking and data collection to fight against the spread of COVID-19. We report our analysis of 50 COVID-19-related apps, including their use and their access to personally identifiable information, to ensure ...
Bashir, Masooda, Sharma, Tanusree
core   +1 more source

Enabling the Analysis of Personality Aspects in Recommender Systems [PDF]

open access: yesTwenty-Third Pacific Asia Conference on Information Systems, China 2019, 2020
Existing Recommender Systems mainly focus on exploiting users' feedback, e.g., ratings, and reviews on common items to detect similar users. Thus, they might fail when there are no common items of interest among users. We call this problem the Data Sparsity With no Feedback on Common Items (DSW-n-FCI). Personality-based recommender systems have shown a
arxiv  

Home - About - Disclaimer - Privacy