Results 81 to 90 of about 12,885 (184)

Understanding how to identify and manage personal identifying information (PII) to further data interoperability

open access: yesJournal of eScience Librarianship
Respect for research participant rights is a key aspect for consideration when creating and utilizing interoperable data. From that perspective, requirements for sharing research data often call for the data to be de-identified, i.e., the removal of all personal identifying information (PII) prior to data sharing, to ensure that the participant’s data ...
openaire   +2 more sources

CAPRI: A Context-Aware Privacy Framework for Multi-Agent Generative AI Applications

open access: yesIEEE Access
While the swift advancement of cloud-based Large Language Models (LLMs) has significantly increased the efficiency and automation in business processes, it has also introduced considerable privacy concerns regarding Personally Identifiable Information ...
Jae H. Park, Vijay K. Madisetti
doaj   +1 more source

Extra Editorial: On the Release of Patron Data in Issue 58 of Code4Lib Journal

open access: yesCode4Lib Journal
We, the editors of the Code4Lib Journal, sincerely apologize for the recent incident in which Personally Identifiable Information (PII) was released through the publication of an article in issue 58.
Code4Lib Editorial Board
doaj  

European Trends in Privacy: How can we increase internet security and protect individual privacy? [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases ...
Soren Duus Ostergaard
doaj  

Bridging the Data Divide: Understanding State Agency and University Research Partnerships within SLDS [PDF]

open access: yes, 2014
This report examines this question through an analysis of state agency-university researcher partnerships that exist in State Longitudinal Data Systems (SLDS). Building state agency-university researcher partnerships is an important value of SLDS.
at Virginia Commonwealth University, The Grace E. Harris Leadership Institute   +3 more
core   +1 more source

Cyber-Assets at Risk (CAR): The Cost of Personally Identifiable Information Data Breaches [PDF]

open access: yes, 2020
Severe financial consequences of data breaches enforce organizations to reconsider their cybersecurity investment. Although attack frequency and trends seem similar per industry, the impact of a data breach may exponentially increase depending on the ...
Bouazzaoui, Sarah   +4 more
core   +1 more source

Diagnosing and Mitigating LLM Failures in Recognizing Culturally Specific Korean Names: An Error-Driven Prompting Framework

open access: yesApplied Sciences
As large language models (LLMs) improve in understanding and reasoning, they are increasingly used in privacy protection tasks such as de-identification, privacy-sensitive text generation, and entity obfuscation.
Xiaonan Wang   +7 more
doaj   +1 more source

A framework of privacy shield in organizational information systems [PDF]

open access: yes, 2005
Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in ...
Chang, Elizabeth   +2 more
core  

Personal Identifiable Information (PII) Detection and Identification for Fintech with AI and Text Analytics

open access: yes, 2023
The detection of Personally Identifiable Information (PII) in text datasets is a critical task to safeguard privacy and ensure data protection. This abstract provides an overview of the application of Named Entity Recognition (NER) algorithms, particularly the BERT NER model, for PII detection on Unstructured text dataset.
openaire   +1 more source

Privacy Harm and Non-Compliance from a Legal Perspective

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and ...
Suvineetha Herath   +2 more
doaj  

Home - About - Disclaimer - Privacy