Results 61 to 70 of about 12,885 (184)

A Survey on Securing Personally Identifiable Information on Smartphones [PDF]

open access: yes, 2020
With an ever-increasing footprint, already topping 3 billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this
Hoppa, Mary Ann   +2 more
core   +1 more source

Automated Redaction of Personally Identifiable Information on Drug Labels Using Optical Character Recognition and Large Language Models for Compliance with Thailand’s Personal Data Protection Act

open access: yesApplied Sciences
The rapid proliferation of artificial intelligence (AI) across various industries presents both opportunities and challenges, particularly concerning personal data privacy. With the enforcement of regulations like Thailand’s Personal Data Protection Act (
Parinya Thetbanthad   +2 more
doaj   +1 more source

Social Identity and Crisis Resilience in Agriculture: Caste, Gender, and Migration in Nepal

open access: yesAsia &the Pacific Policy Studies, Volume 12, Issue 3, September 2025.
ABSTRACT Capacity to weather economic shocks is often mediated by social identity, which in turn determines access to social, economic and physical capital. We study the repercussions of a large economic shock on access to agriculture inputs, agricultural extension, output markets, and the consequent effects on income and livelihoods in rural Nepal. We
Muzna Alvi   +3 more
wiley   +1 more source

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Engineering MLOps Pipelines With Data Quality: A Case Study on Tabular Datasets in Kaggle

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 9, September 2025.
Our study shows that open‐source datasets—while having become indispensable in advancing ML research and applications—exhibit low‐quality but high accessibility enables practitioners to test algorithms, benchmark models, and prototype solutions efficiently but with unfathomable longer‐term consequences.
Matteo Pancini   +3 more
wiley   +1 more source

Privacy Risks of Cybersquatting Attacks

open access: yesJournal of Cybersecurity and Privacy
Cybersquatting is a collection of methods commonly used by malicious actors to mislead or trick internet users into accessing fraudulent or malicious content.
Jack Kolenbrander   +2 more
doaj   +1 more source

Habitat Protection Alone Is Insufficient: Costa Rican Parrots Thrive in Altered Landscapes but Remain Vulnerable to Poaching

open access: yesDiversity and Distributions, Volume 31, Issue 9, September 2025.
ABSTRACT Aim Human population growth and resource overexploitation have induced major changes in global biodiversity. Costa Rica, with 26% of its land area protected, is often cited as a model of environmental conservation. However, conservation efforts have largely focused on habitat preservation, while overharvesting remains an unquantified factor in
P. Romero‐Vidal   +5 more
wiley   +1 more source

Implementação de Sticky Policies em um provedor OpenID Connect [PDF]

open access: yes, 2017
TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Sistemas de Informação.Com o crescente mercado de sistemas web, deve crescer também o cuidado das organizações com os dados sensíveis dos usuários de seus serviços, em especial ...
Monfardine, Lucas Maltempi   +1 more
core  

Integrating Generative AI Into Enterprise Platforms: Insights From Salesforce

open access: yesInformation Systems Journal, Volume 35, Issue 5, Page 1497-1512, September 2025.
ABSTRACT The widespread applications of generative AI (GenAI) have sparked significant interest, with many organisations eager to leverage its transformative potential. Rather than focusing on individual organisations, this study examines GenAI integration within enterprise platforms, which are extensively adopted by many organisations and thus amplify
Kazem Haki   +3 more
wiley   +1 more source

The Development of a Named Entity Recognizer for Detecting Personal Information Using a Korean Pretrained Language Model

open access: yesApplied Sciences
Social network services and chatbots are susceptible to personal information leakage while facilitating language learning without time or space constraints. Accurate detection of personal information is paramount in avoiding such leaks.
Sungsoon Jang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy