Results 91 to 100 of about 12,885 (184)

MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs [PDF]

open access: yes, 2016
Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly become a major threat to our privacy. As "tracking the trackers" has become a necessity, various static and dynamic analysis tools have been developed in
Achara, Jagdish Prasad   +3 more
core   +2 more sources

De-anonymizing Social Networks

open access: yes, 2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e.
Narayanan, Arvind, Shmatikov, Vitaly
core   +2 more sources

MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms

open access: yesFuture Internet
The Metaverse brings together components of parallel processing computing platforms, the digital development of physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties to the ...
Faisal Fiaz   +4 more
doaj   +1 more source

De-Identification of Electronic Health Records Using Deep Learning and Transformers

open access: yesApplied Sciences
Adoption of electronic health records (EHRs) has significantly advanced healthcare by enabling extensive data storage and analysis for clinical decisions and research.
Fatih Dilmaç, Adil Alpkocak
doaj   +1 more source

Regulating Data as Property: A New Construct for Moving Forward [PDF]

open access: yes, 2018
The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets.
Mayer, Anna, Ritter, Jeffrey
core   +1 more source

Addressing Memorization and Aggregation Risks in AI: A Knowledge Graph Approach to Privacy

open access: yesApplied Sciences
Recent studies have shown that AI models can memorize specific data records, resulting in sensitive data exposure through model access. Current privacy-enhancing technologies often overlook the crucial, context-dependent nature of privacy risk as they ...
Jinhui Zuo, Seok-Won Lee
doaj   +1 more source

Airport Wi-Fi Service Delivery and Monetisation Strategies – an International Perspective. [PDF]

open access: yesAfrican Journal of Hospitality, Tourism and Leisure, 2019
With internet connectivity becoming an important enabler to knowledge sharing, information access and communication, free Wi-Fi offerings are becoming more prevalent not only in a business context, but also in a leisure context.
Dr Candice Louw
doaj  

Applying PII fingerprints in security incident analysis [PDF]

open access: yes, 2012
Regulations in many countries govern the use of personally identifiable information (PII) in IT systems. A key aspect of these regulations is to retain PII only as long as necessary and delete it immediately afterwards.
Milman, Ivan   +2 more
core   +1 more source

UEG Week 2025 Poster Presentations

open access: yes
United European Gastroenterology Journal, Volume 13, Issue S8, Page S803-S1476, October 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy