Results 161 to 170 of about 12,885 (184)

Automating the Detection of Personally Identifiable Information (PII) in Japanese-American WWII Incarceration Camp Records

open access: closed2018 IEEE International Conference on Big Data (Big Data), 2018
We describe computational treatments of archival collections through a case study involving World War II Japanese-American Incarceration Camps. We focus on automating the detection of personally identifiable information or PII. The paper also discusses the emergence of computational archival science (CAS) and the development of a computational ...
Richard Marciano   +5 more
openaire   +2 more sources

Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track

open access: closedProceedings of the 37th annual ACM SIGUCCS fall conference: communication and collaboration, 2009
To avoid prohibitively expensive remediation costs associated with the exposure of personally identifiable information (PII), scans of systems can be run proactively to help find and remove sensitive data. System disks can also be encrypted to obfuscate the data on the drive from all but those to whom access is explicitly granted.
Ken Layng
openaire   +2 more sources

SecP2I A Secure Multi-party Discovery of Personally Identifiable Information (PII) in Structured and Semi-structured Datasets

open access: closed2019 IEEE International Conference on Big Data (Big Data), 2019
Personal data governance is became a key issue within organisations. This is mainly due to (i) the strategic value of personal data which provide more insights improving commercial and operational efficiency; and data security risk issues and privacy regulation restrictions (GDPR, CCPA,..
Mrabet, Amine   +2 more
openaire   +2 more sources

Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy

open access: closed2019 IEEE International Symposium on Technologies for Homeland Security (HST), 2019
In critical infrastructure (CI) sectors such as emergency management or healthcare, researchers can analyze and detect useful patterns in data and help emergency management personnel efficaciously allocate limited resources or detect epidemiology spread patterns. However, all of this data contains personally identifiable information (PII) that needs to
Asma Alnemari   +3 more
openaire   +2 more sources

A case history in architectural acoustics: Security, acoustics, the protection of personally identifiable information (PII), and accessibility for the disabled

open access: closedThe Journal of the Acoustical Society of America, 2014
This paper discusses the re-design of a field office to enhance the protection of Personally Identifiable Information (PII), physical security, and accessibility for the disabled at the Social Security Administration (SSA) field office in Roxbury, MA.
Donna A. Ellis
openaire   +2 more sources

A Digital Forensic Investigation of the Presence of Personally Identifiable Information (PII) in Refurbished Hard Drives

open access: closedJournal of Cybersecurity and Information Management
The last decade has seen a massive explosion of data, with a lot of Personally Identifiable Information (PII) flooding devices and the cyberspace. This has necessitated the growing call and global awareness for data protection, to ensure the responsible use of data, protect the privacy of data subjects, and prevent crimes such as identity theft and ...
Robinson Robinson, Blossom U. Idigbo
openaire   +2 more sources

Home - About - Disclaimer - Privacy