Results 1 to 10 of about 12,885 (184)

Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect [PDF]

open access: hybridJournal of Accounting, Finance, Economics, and Social Sciences, 2020
This paper presents application of deep learning and machine learning models in detecting personally identifiable information (PII) in unstructured text (emails). The proposed models use support vector machine (trained using sequential minimal optimization) and long short term memory (LSTM) artificial neural network.
Anil K. Makhija
core   +5 more sources

Personally Identifiable Information: Identifying unprotected PII using file-indexing search tools and quantitative analysis [PDF]

open access: goldProceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 2010
This paper reports on a project in which employees at Federal agencies are surveyed regarding their knowledge of security policies in place in their offices and their knowledge of PII (Personally Identifiable Information) stored on their systems.
Brandis W. Matthews, Albert Esterline
openaire   +3 more sources

Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique [PDF]

open access: diamondInternational Journal of Advanced Computer Science and Applications, 2021
Personally Identifiable Information (PII) has gained much attention with the rapid development of technologies and the exploitation of information relating to an individual. The corporates and other organizations store a large amount of information that is primarily disseminated in the form of emails that include personnel information of the user ...
Poornima Kulkarni, Cauvery N K
openaire   +2 more sources

A hybrid rule-based NLP and machine learning approach for PII detection and anonymization in financial documents [PDF]

open access: yesScientific Reports
Safeguarding Personally Identifiable Information (PII) in financial documents is essential to prevent data breaches and maintain regulatory compliance.
Kushagra Mishra   +2 more
doaj   +2 more sources

A systematic literature review of blockchain cyber security [PDF]

open access: yesDigital Communications and Networks, 2020
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems.
Paul J. Taylor   +4 more
doaj   +4 more sources

Sign Up Wallet: A Blockchain based Personally Identifiable Information (PII) Masking using Lookup Substitution

open access: diamond2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
Digital identity is akin to a digital version of a physical ID, such as a passport or driver’s license, containingvarious attributes that represent a user online. Currently, centralized and federated identity management systems,such as those enabling logins via Google or Facebook, dominate the digital landscape. While these systemssimplify access, they
P Kalyanasundaram   +4 more
  +6 more sources

The PII Problem: Privacy and a New Concept of Personally Identifiable Information [PDF]

open access: gold, 2011
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved.
Paul M. Schwartz, Daniel J. Solove
core   +4 more sources

Triggering the Personalization Backfire Effect: The Moderating Role of Situational Privacy Concern [PDF]

open access: yesBehavioral Sciences
Personalized marketing presents a powerful but delicate strategy, as its benefits can be negated by rising consumer privacy concerns. To illuminate this tension, this study investigates what causes personalization to fail, focusing on the interaction ...
Hyeongseok Kim, Seunghee Han
doaj   +2 more sources

NLP-based removal of personally identifiable information from Hungarian electronic health records [PDF]

open access: yesFrontiers in Artificial Intelligence
IntroductionElectronic health records (EHR) in text format serve as crucial resources for data-driven medical research. To safeguard patient confidentiality, under the General Data Protection Regulation (GDPR), strict measures are required to ensure ...
András Berzi   +5 more
doaj   +2 more sources

A pseudonymized corpus of occupational health narratives for clinical entity recognition in Spanish [PDF]

open access: yesBMC Medical Informatics and Decision Making
Despite the high creation cost, annotated corpora are indispensable for robust natural language processing systems. In the clinical field, in addition to annotating medical entities, corpus creators must also remove personally identifiable information ...
Jocelyn Dunstan   +8 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy