Results 161 to 170 of about 12,885 (184)
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII. The paper also discusses the emergence of computational archival science (CAS) and the development of a computational ...
Richard Marciano +5 more
openaire +2 more sources
To avoid prohibitively expensive remediation costs associated with the exposure of personally identifiable information (PII), scans of systems can be run proactively to help find and remove sensitive data. System disks can also be encrypted to obfuscate the data on the drive from all but those to whom access is explicitly granted.
Ken Layng
openaire +2 more sources
Personal data governance is became a key issue within organisations. This is mainly due to (i) the strategic value of personal data which provide more insights improving commercial and operational efficiency; and data security risk issues and privacy regulation restrictions (GDPR, CCPA,..
Mrabet, Amine +2 more
openaire +2 more sources
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread patterns. However, all of this data contains personally identifiable information (PII) that needs to
Asma Alnemari +3 more
openaire +2 more sources
This paper discusses the re-design of a field office to enhance the protection of Personally Identifiable Information (PII), physical security, and accessibility for the disabled at the Social Security Administration (SSA) field office in Roxbury, MA.
Donna A. Ellis
openaire +2 more sources
Securing Personally Identifiable Information (PII) in Personal Financial Statements
George Hamilton +2 more
openaire +2 more sources
Methods for Using Anaconda on Personally Identifiable Information (PII)‒Restricted Computers
Dale Shires +2 more
openaire +2 more sources
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible use of data, protect the privacy of data subjects, and prevent crimes such as identity theft and ...
Robinson Robinson, Blossom U. Idigbo
openaire +2 more sources
Personally Identifiable Information (PII) Detection and Obfuscation Using YOLOv3 Object Detector
Saurabh Soni, Kamal Kant Hiran
openaire +2 more sources

