Results 71 to 80 of about 12,885 (184)
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
Mapping the “X” Debate: Water Fluoridation Sentiment Analysis With Advanced Machine Learning
ABSTRACT Objectives This study aimed to examine public sentiment regarding community water fluoridation (CWF) using data from “X” (formerly Twitter) over the past decade. The goal was to understand public opinion trends and identify opportunities for targeted public health communication.
Nilesh Torwane +3 more
wiley +1 more source
A Multimodal Privacy Filtering System Using Deep Learning for Visual-Audio Input Streams
Protecting personally identifiable information (PII) in visual and audio data streams that are continuously being captured by sensing systems remains a critical challenge.
Kunwoo Kim +4 more
doaj +1 more source
Revolutionizing Cyber Defense: Leveraging Generative AI for Adaptive Threat Hunting
ABSTRACT Adaptive threat hunting, powered by Generative AI (GenAI), is reshaping the cybersecurity landscape, equipping analysts with the tools to predict, detect, and dynamically mitigate cyber threats. Adaptive threat hunting is critical because it enables an organization to detect threats proactively in the infrastructure, thereby reducing the risks
Aditya K. Sood, Sherali Zeadally
wiley +1 more source
Efficient privacy-preserving record linkage (PPRL) is essential for integrating data from different providers without exposing personally identifiable information (PII).
Dean Resnick, Núria Adell Raventós
doaj +1 more source
An Attribute-based Statistic Model for Privacy Impact Assessment [PDF]
Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual’s identity such as name, social security number, date and place of birth, mother’s maiden name, or biometric records.
Liu, Jun, Wang, Yong
core +1 more source
The first part of this review discussed challenges related to data complexity, management, standardization, privacy, and awareness, and how data repositories, such as caNanoLab, help users access large datasets related to nanomedicine characterization.
Weina Ke +3 more
wiley +1 more source
An Attribtue-Based Statistic Model for Privacy Impact Assessment [PDF]
Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual\u27s identity such as name, social security number, date and place of birth, mother\u27s maiden name, or biometric records.
Liu, Jun, Wang, Yong
core +1 more source
Abstract INTRODUCTION The Alzheimer's Disease Data Initiative (AD Data Initiative) is a global coalition of partners accelerating scientific discoveries in Alzheimer's disease (AD) and related dementias (ADRD) by breaking down data silos, eliminating barriers to research, and fostering collaboration among scientists studying these issues.
Caitlin P. McHugh +2 more
wiley +1 more source
Honey password vaults tolerating leakage of both personally identifiable information and passwords
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An +4 more
doaj +1 more source

