Results 81 to 90 of about 12,885 (184)
Respect for research participant rights is a key aspect for consideration when creating and utilizing interoperable data. From that perspective, requirements for sharing research data often call for the data to be de-identified, i.e., the removal of all personal identifying information (PII) prior to data sharing, to ensure that the participant’s data ...
openaire +2 more sources
CAPRI: A Context-Aware Privacy Framework for Multi-Agent Generative AI Applications
While the swift advancement of cloud-based Large Language Models (LLMs) has significantly increased the efficiency and automation in business processes, it has also introduced considerable privacy concerns regarding Personally Identifiable Information ...
Jae H. Park, Vijay K. Madisetti
doaj +1 more source
Extra Editorial: On the Release of Patron Data in Issue 58 of Code4Lib Journal
We, the editors of the Code4Lib Journal, sincerely apologize for the recent incident in which Personally Identifiable Information (PII) was released through the publication of an article in issue 58.
Code4Lib Editorial Board
doaj
European Trends in Privacy: How can we increase internet security and protect individual privacy? [PDF]
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases ...
Soren Duus Ostergaard
doaj
Bridging the Data Divide: Understanding State Agency and University Research Partnerships within SLDS [PDF]
This report examines this question through an analysis of state agency-university researcher partnerships that exist in State Longitudinal Data Systems (SLDS). Building state agency-university researcher partnerships is an important value of SLDS.
at Virginia Commonwealth University, The Grace E. Harris Leadership Institute +3 more
core +1 more source
Cyber-Assets at Risk (CAR): The Cost of Personally Identifiable Information Data Breaches [PDF]
Severe financial consequences of data breaches enforce organizations to reconsider their cybersecurity investment. Although attack frequency and trends seem similar per industry, the impact of a data breach may exponentially increase depending on the ...
Bouazzaoui, Sarah +4 more
core +1 more source
As large language models (LLMs) improve in understanding and reasoning, they are increasingly used in privacy protection tasks such as de-identification, privacy-sensitive text generation, and entity obfuscation.
Xiaonan Wang +7 more
doaj +1 more source
A framework of privacy shield in organizational information systems [PDF]
Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in ...
Chang, Elizabeth +2 more
core
The detection of Personally Identifiable Information (PII) in text datasets is a critical task to safeguard privacy and ensure data protection. This abstract provides an overview of the application of Named Entity Recognition (NER) algorithms, particularly the BERT NER model, for PII detection on Unstructured text dataset.
openaire +1 more source
Privacy Harm and Non-Compliance from a Legal Perspective
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and ...
Suvineetha Herath +2 more
doaj

