Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect [PDF]
This paper presents application of deep learning and machine learning models in detecting personally identifiable information (PII) in unstructured text (emails). The proposed models use support vector machine (trained using sequential minimal optimization) and long short term memory (LSTM) artificial neural network.
Anil K. Makhija
core +5 more sources
Personally Identifiable Information: Identifying unprotected PII using file-indexing search tools and quantitative analysis [PDF]
This paper reports on a project in which employees at Federal agencies are surveyed regarding their knowledge of security policies in place in their offices and their knowledge of PII (Personally Identifiable Information) stored on their systems.
Brandis W. Matthews, Albert Esterline
openaire +3 more sources
Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique [PDF]
Personally Identifiable Information (PII) has gained much attention with the rapid development of technologies and the exploitation of information relating to an individual. The corporates and other organizations store a large amount of information that is primarily disseminated in the form of emails that include personnel information of the user ...
Poornima Kulkarni, Cauvery N K
openaire +2 more sources
A hybrid rule-based NLP and machine learning approach for PII detection and anonymization in financial documents [PDF]
Safeguarding Personally Identifiable Information (PII) in financial documents is essential to prevent data breaches and maintain regulatory compliance.
Kushagra Mishra +2 more
doaj +2 more sources
A systematic literature review of blockchain cyber security [PDF]
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems.
Paul J. Taylor +4 more
doaj +4 more sources
Digital identity is akin to a digital version of a physical ID, such as a passport or driver’s license, containingvarious attributes that represent a user online. Currently, centralized and federated identity management systems,such as those enabling logins via Google or Facebook, dominate the digital landscape. While these systemssimplify access, they
P Kalyanasundaram +4 more
+6 more sources
The PII Problem: Privacy and a New Concept of Personally Identifiable Information [PDF]
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved.
Paul M. Schwartz, Daniel J. Solove
core +4 more sources
Triggering the Personalization Backfire Effect: The Moderating Role of Situational Privacy Concern [PDF]
Personalized marketing presents a powerful but delicate strategy, as its benefits can be negated by rising consumer privacy concerns. To illuminate this tension, this study investigates what causes personalization to fail, focusing on the interaction ...
Hyeongseok Kim, Seunghee Han
doaj +2 more sources
NLP-based removal of personally identifiable information from Hungarian electronic health records [PDF]
IntroductionElectronic health records (EHR) in text format serve as crucial resources for data-driven medical research. To safeguard patient confidentiality, under the General Data Protection Regulation (GDPR), strict measures are required to ensure ...
András Berzi +5 more
doaj +2 more sources
A pseudonymized corpus of occupational health narratives for clinical entity recognition in Spanish [PDF]
Despite the high creation cost, annotated corpora are indispensable for robust natural language processing systems. In the clinical field, in addition to annotating medical entities, corpus creators must also remove personally identifiable information ...
Jocelyn Dunstan +8 more
doaj +2 more sources

