Works matching Personally identifiable information (PII)
Results: 102
A Digital Forensic Investigation of the Presence of Personally Identifiable Information (PII) in Refurbished Hard Drives.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 244, doi. 10.54216/JCIM.150219
- By:
- Publication type:
- Article
Data Privacy and Academic Libraries: Non-PII, PII, and Librarians' Reflections (Part 1).
- Published in:
- Journal of Library Administration, 2019, v. 59, n. 5, p. 532, doi. 10.1080/01930826.2019.1616973
- By:
- Publication type:
- Article
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms.
- Published in:
- Future Internet, 2024, v. 16, n. 5, p. 176, doi. 10.3390/fi16050176
- By:
- Publication type:
- Article
Data Privacy and Academic Libraries: Non-PII, PII, and Librarians' Reflections (Part 2).
- Published in:
- Journal of Library Administration, 2019, v. 59, n. 7, p. 768, doi. 10.1080/01930826.2019.1649969
- By:
- Publication type:
- Article
Information Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information.
- Published in:
- Journal of Information Systems Applied Research, 2023, v. 16, n. 2, p. 61
- By:
- Publication type:
- Article
隱私防護資料發布資訊系統之 保護剖繪初論:根基於 個人資料去識別化的議題
- Published in:
- Journal of Advanced Technology & Management, 2016, v. 6, n. 1, p. 47, doi. 10.3966/222014242016050601003
- By:
- Publication type:
- Article
A New Information Lens: The Self-concept and Exchange Context as a Means to Understand Information Sensitivity of Anonymous and Personal Identifying Information.
- Published in:
- Journal of Interactive Marketing, 2018, v. 42, p. 46, doi. 10.1016/j.intmar.2018.01.004
- By:
- Publication type:
- Article
Ethical Issues Implicit in Library Authentication and Access Management: Risks and Best Practices.
- Published in:
- Journal of Library Administration, 2008, v. 47, n. 3-4, p. 141, doi. 10.1080/01930820802186480
- By:
- Publication type:
- Article
The Development of a Named Entity Recognizer for Detecting Personal Information Using a Korean Pretrained Language Model.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 13, p. 5682, doi. 10.3390/app14135682
- By:
- Publication type:
- Article
INTERNET SECURITY AND PRIVACY THREATS, AS PERCEIVED BY AMERICAN AND INTERNATIONAL BUSINESS STUDENTS.
- Published in:
- Global Journal of Business Disciplines, 2017, v. 1, n. 1, p. 36, doi. 10.47177/gjbd.01.01.2017.036
- By:
- Publication type:
- Article
個人資料管理系統要求事項標準化及其實作初論: 根基於歐盟《一般資料保護條例》(GDPR)之 驗證與資料去識別化的議題
- Published in:
- Journal of Advanced Technology & Management, 2018, v. 8, n. 1, p. 21, doi. 10.6193/JATM.201808_8(1).0002
- By:
- Publication type:
- Article
Assessing cybersecurity risks and practices in the broker-dealer industry.
- Published in:
- Journal of Securities Operations & Custody, 2017, v. 9, n. 4, p. 302, doi. 10.69554/lczf8550
- By:
- Publication type:
- Article
Identity Crisis.
- Published in:
- Marketing Research, 2005, v. 17, n. 4, p. 8
- By:
- Publication type:
- Article
Multivariate Microaggregation of Set-Valued Data.
- Published in:
- Information Technology & Control, 2022, v. 51, n. 1, p. 104, doi. 10.5755/j01.itc.51.1.29826
- By:
- Publication type:
- Article
An Advanced Semantic Feature-Based Cross-Domain PII Detection, De-Identification, and Re-Identification Model Using Ensemble Learning.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 12, p. 763, doi. 10.14569/ijacsa.2024.0151277
- By:
- Publication type:
- Article
PRIVACY PROTECTION GAPS, FREE APPS, AND MARKETING TRAPS: DETERMINING WHO ARE "SUBSCRIBERS" UNDER THE VIDEO PRIVACY PROTECTION ACT.
- Published in:
- Michigan State Law Review, 2018, v. 2018, n. 2, p. 403
- By:
- Publication type:
- Article
DOES THE VIDEO PRIVACY PROTECTION ACT PROTECT USERS OF FREE CELL PHONE APPLICATIONS?
- Published in:
- Rutgers Computer & Technology Law Journal, 2018, v. 44, n. 2, p. 242
- By:
- Publication type:
- Article
ENHANCING CYBER SECURITY IN HEALTH CARE INDUSTRY BY USING ISO 27001 ACCREDITATION.
- Published in:
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 2, p. 26, doi. 10.26634/jdf.1.2.20020
- By:
- Publication type:
- Article
Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques.
- Published in:
- Review of Policy Research, 2012, v. 29, n. 1, p. 63, doi. 10.1111/j.1541-1338.2011.00538.x
- By:
- Publication type:
- Article
Application Level Security in a Public Library: A Case Study.
- Published in:
- Information Technology & Libraries, 2018, v. 37, n. 4, p. 107, doi. 10.6017/ital.v37i4.10405
- By:
- Publication type:
- Article
Data on the Move.
- Published in:
- Internal Auditor, 2009, v. 66, n. 5, p. 23
- By:
- Publication type:
- Article
Online Disclosure of Personally Identifiable Information with Strangers: Effects of Public and Private Sharing.
- Published in:
- Interacting with Computers, 2014, v. 26, n. 6, p. 614, doi. 10.1093/iwc/iwt058
- By:
- Publication type:
- Article
PATRON DATA PRIVACY AND SECURITY IN THE CASINO INDUSTRY: A CASE FOR A U.S. DATA PRIVACY STATUTE.
- Published in:
- UNLV Gaming Law Journal, 2012, v. 3, n. 1, p. 81
- By:
- Publication type:
- Article
Am I Safe? Exploring Relationships between Primary Territories and Online Privacy.
- Published in:
- Journal of Internet Commerce, 2010, v. 9, n. 1, p. 3, doi. 10.1080/15332861.2010.487413
- By:
- Publication type:
- Article
A Framework for Protecting Users' Privacy in Cloud.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 4, p. 33, doi. 10.4018/IJISP.2016100102
- By:
- Publication type:
- Article
AGAINST NOTICE AND CHOICE: THE MANIFEST FAILURE OF THE PROCEDURALIST PARADIGM TO PROTECT PRIVACY ONLINE (OR ANYWHERE ELSE).
- Published in:
- Cleveland State Law Review, 2018, v. 66, n. 3, p. 559
- By:
- Publication type:
- Article
A pseudonymized corpus of occupational health narratives for clinical entity recognition in Spanish.
- Published in:
- BMC Medical Informatics & Decision Making, 2024, v. 24, n. 1, p. 1, doi. 10.1186/s12911-024-02609-w
- By:
- Publication type:
- Article
‘All that Glitters is not Gold’: The Role of Impression Management in Data Breach Notification.
- Published in:
- Western Journal of Communication, 2014, v. 78, n. 3, p. 337, doi. 10.1080/10570314.2013.866686
- By:
- Publication type:
- Article
Mainzelliste SecureEpiLinker (MainSEL): privacy-preserving record linkage using secure multi-party computation.
- Published in:
- Bioinformatics, 2022, v. 38, n. 6, p. 1657, doi. 10.1093/bioinformatics/btaa764
- By:
- Publication type:
- Article
Privacy in Public Archives: Managing Personally Identifiable Information in Special Collections.
- Published in:
- RBM: A Journal of Rare Books, Manuscripts, & Cultural Heritage, 2021, v. 22, n. 2, p. 85, doi. 10.5860/rbm.22.2.85
- By:
- Publication type:
- Article
Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 7, p. 1370, doi. 10.3390/app9071370
- By:
- Publication type:
- Article
Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 9, p. 5400, doi. 10.3390/su14095400
- By:
- Publication type:
- Article
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers.
- Published in:
- International Journal of Information Security & Privacy, 2011, v. 5, n. 1, p. 50, doi. 10.4018/jisp.2011010104
- By:
- Publication type:
- Article
INDIGNITY: REDEFINING THE HARM CAUSED BY DATA BREACHES.
- Published in:
- Wake Forest Law Review, 2016, v. 51, n. 1, p. 1
- By:
- Publication type:
- Article
MicrobeTrace: Retooling molecular epidemiology for rapid public health response.
- Published in:
- PLoS Computational Biology, 2021, v. 17, n. 9, p. 1, doi. 10.1371/journal.pcbi.1009300
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2017, v. 57, n. 2, p. 64
- By:
- Publication type:
- Article
THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION.
- Published in:
- New York University Law Review, 2011, v. 86, n. 6, p. 1814
- By:
- Publication type:
- Article
Developing accountability-based solutions for data privacy in the cloud.
- Published in:
- Innovation: The European Journal of Social Sciences, 2013, v. 26, n. 1/2, p. 7, doi. 10.1080/13511610.2013.732753
- By:
- Publication type:
- Article
Privacy Preservation Using Machine Learning in the Internet of Things.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3477, doi. 10.3390/math11163477
- By:
- Publication type:
- Article
A Two-Stage De-Identification Process for Privacy-Preserving Medical Image Analysis.
- Published in:
- Healthcare (2227-9032), 2022, v. 10, n. 5, p. 755, doi. 10.3390/healthcare10050755
- By:
- Publication type:
- Article
Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2019, v. 11, n. 4, p. N.PAG, doi. 10.4018/IJITN.2019100105
- By:
- Publication type:
- Article
THE PRICE OF FREE MOBILE APPS UNDER THE VIDEO PRIVACY PROTECTION ACT.
- Published in:
- American University Business Law Review, 2016, v. 6, n. 1, p. 115
- By:
- Publication type:
- Article
Reconciling Personal Information in the United States and European Union.
- Published in:
- 2014
- By:
- Publication type:
- Essay
PriMed: Private federated training and encrypted inference on medical images in healthcare.
- Published in:
- Expert Systems, 2025, v. 42, n. 1, p. 1, doi. 10.1111/exsy.13283
- By:
- Publication type:
- Article
A Sudy on Information Privacy Issue on Social Networks.
- Published in:
- ISeCure, 2019, v. 11, n. 3, p. 19
- By:
- Publication type:
- Article
Establishing a framework for privacy-preserving record linkage among electronic health record and administrative claims databases within PCORnet<sup>®</sup>, the National Patient-Centered Clinical Research Network.
- Published in:
- BMC Research Notes, 2022, v. 15, n. 1, p. 1, doi. 10.1186/s13104-022-06243-5
- By:
- Publication type:
- Article
LearningPad Conundrum: The Perils of Using Third-Party Software and Student Privacy.
- Published in:
- Journal of Cases in Educational Leadership, 2017, v. 20, n. 4, p. 17, doi. 10.1177/1555458917690191
- By:
- Publication type:
- Article
IoT Privacy Risks Revealed.
- Published in:
- Entropy, 2024, v. 26, n. 7, p. 561, doi. 10.3390/e26070561
- By:
- Publication type:
- Article
Social media engagement tactics in U.S. community policing: Potential privacy and security concerns.
- Published in:
- Police Journal, 2021, v. 94, n. 4, p. 556, doi. 10.1177/0032258X20968588
- By:
- Publication type:
- Article
ARE YOU SITTING ON A CYBER SECURITY BOMBSHELL?
- Published in:
- Journal of Property Management, 2015, v. 80, n. 5, p. 8
- By:
- Publication type:
- Article