Intelligent Information Management

Intelligent Information Management

ISSN Print: 2160-5912
ISSN Online: 2160-5920
www.scirp.org/journal/iim
E-mail: iim@scirp.org
"Experimentation with Personal Identifiable Information"
written by Sabah Al-Fedaghi, Abdul Aziz Rashid Al-Azmi,
published by Intelligent Information Management, Vol.4 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] SARA: A Collection of Sensitivity-Aware Relevance Assessments
arXiv preprint arXiv:2401.05144, 2024
[2] Intelligent Broker Design for IoT Using a Multi-Cloud Environment
… of Deep Learning and Internet of …, 2023
[3] I Never Trust My University for This! Investigating Student PII Leakage at Vietnamese Universities
IEICE TRANSACTIONS on …, 2023
[4] A Survey Study of Social Media User Awareness Towards Personal Identifiable Information's Data Security in Indonesian Millennial Generation
2023 3rd International …, 2023
[5] Analysis of Air Pollution Level In Settlement Area Using Passive Sampler Method
… of Hydrological and …, 2022
[6] Uma Administração Tributária artificialmente “inteligente”? Entre a integração da inteligência artificial no procedimento tributário, o direito à …
2022
[7] La definición de perfiles en el derecho tributário y la protección de los datos personales de los obligados tributários en el derecho portugués
Revista de la Facultad de Derecho, 2021
[8] La definição de perfis no direito tributário ea tutela dos dados pessoais dos obrigados tributários no direito português
Revista de la Facultad de Derecho, 2021
[9] Privacy, Self-Sovereign Identity Technology and the Willingness to Provide Personal Information
2021
[10] The Profiling in Tax Law and the Protection of the Personal Data of Taxpayers in Portuguese Law
Revista de la Facultad de Derecho, 2021
[11] Design and Development of a Dynamic and Efficient PII Data Loss Prevention System
2021
[12] Was sind persönliche Daten wert? Entwicklung eines Artefakts zur Ermittlung der optimalen Methode zur Bewertung von persönlichen Daten/eingereicht von Thomas …
2020
[13] Software Architecture as a Thinging Machine: A Case Study of Monthly Salary System
2019
[14] Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information
2018
[15] CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
2018
[16] CINEMA: Efficient and privacy-preserving online medical primary diagnosis with skyline query
2018
[17] Privacy Things
Fedaghi - International Journal of Computer Science and …, 2018
[18] Medicare
2017
[19] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data breaches in the …
2017
[20] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[21] HEART DISEASE PREDICTION USING ANN ALGORITHM IN DATA MINING
International Journal of Computer Science & Mobile Computing, 2017
[22] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[23] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data …
2017
[24] A responsible de-identification of the Real Data Corpus: building a framework for PII management
2016
[25] Thing-oriented learning: Application to mathematical objects
2016
[26] Mobile Health Monitoring System using cloud computing
2016
[27] Public cloud user authentication and data confidentiality using image steganography with hash function
American Journal of Applied Mathematics, 2015
[28] CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
IJSEAT, 2015
[29] An Effective Mobile Online Health Monitoring System In Cloud
2015
[30] Attribute Based Encryption For Secure And E-Sharing Health Records In Cloud
International Journal of Mechanical Engineering and Computer Applications, 2015
[31] Evaluation of online resources on the implementation of the protection of personal information act in south africa
Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015, 2015
[32] Altruism as a Tool for optimization: Literature Review
International Journal of Engineering Trends and Technology (IJETT), 2015
[33] Design and Analysis of Aircraft Wing
International Journal & Magazine of Engineering, Technology, Management and Research, 2015
[34] Health Monitoring For Secrecy Conserving Using Cloud Computing
International Journal of Engineering Research and Applications, 2014
[35] Mobile Health Monitoring Technique using Cloud Computing
International Journal of Recent Technology and Engineering, 2014
[36] A Literature Survey on Facial Expression Recognition techniques using Appearance based feature
International Journal of Computer Trends and Technology (IJCTT), 2014
[37] AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING
International Journal of Computer Science and Mobile Computing, 2014
[38] Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
International Journal of Science Engineering and Advance Technology, 2014
[39] Discretion Preservative Itinerant Health Scrutinising By Haze Succour
International Journal of Science Engineering and Advance Technology, 2014
[40] Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
International Journal of Innovative Research in Computer and Communication Engineering, 2014
[41] Privacy Towards Cloud Based Mobile Health Monitoring Services
International Journal of Scientific Research in Computer Science (IJSRCS), 2014
[42] PPM: Privacy Preserving In Mobile Health Monitoring System
IJRIT International Journal of Research in Information Technology, 2014
[43] Secured Health Monitoring System in Mobile Cloud Computing
International Journal of Computer Trends and Technology (IJCTT), 2014
[44] An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam
IJRCCT, 2014
[45] A Key Private Re-Encryption Scheme To Secure And Privacy-Preserving Using Cam
IJRCCT, 2014
[46] CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Information Forensics and Security, IEEE Transactions on 8.6, 2013
[47] The Design and Implementation of Intellectualized PSTN in China.
International Journal of Digital Content Technology & its Applications, 2013
[48] A Modified Anonymisation Algorithm Towards Reducing Information Loss.
2013
[49] A modified anonymisation algorithm towards reducing information loss
2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top