Intelligent Information Management

Volume 4, Issue 4 (July 2012)

ISSN Print: 2160-5912   ISSN Online: 2160-5920

Google-based Impact Factor: 1.6  Citations  

Experimentation with Personal Identifiable Information

HTML  Download Download as PDF (Size: 210KB)  PP. 123-133  
DOI: 10.4236/iim.2012.44019    6,222 Downloads   10,441 Views  Citations

ABSTRACT

In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.

Share and Cite:

S. Al-Fedaghi and A. Al-Azmi, "Experimentation with Personal Identifiable Information," Intelligent Information Management, Vol. 4 No. 4, 2012, pp. 123-133. doi: 10.4236/iim.2012.44019.

Cited by

[1] Analysis of Air Pollution Level In Settlement Area Using Passive Sampler Method
… of Hydrological and …, 2022
[2] La definición de perfiles en el derecho tributário y la protección de los datos personales de los obligados tributários en el derecho portugués
Revista de la Facultad de Derecho, 2021
[3] La definição de perfis no direito tributário ea tutela dos dados pessoais dos obrigados tributários no direito português
Revista de la Facultad de Derecho, 2021
[4] Privacy, Self-Sovereign Identity Technology and the Willingness to Provide Personal Information
2021
[5] Design and Development of a Dynamic and Efficient PII Data Loss Prevention System
2021
[6] Was sind persönliche Daten wert? Entwicklung eines Artefakts zur Ermittlung der optimalen Methode zur Bewertung von persönlichen Daten/eingereicht von Thomas …
2020
[7] Software Architecture as a Thinging Machine: A Case Study of Monthly Salary System
2019
[8] Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information
2018
[9] CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
2018
[10] CINEMA: Efficient and privacy-preserving online medical primary diagnosis with skyline query
2018
[11] Medicare
2017
[12] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data breaches in the …
2017
[13] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[14] HEART DISEASE PREDICTION USING ANN ALGORITHM IN DATA MINING
International Journal of Computer Science & Mobile Computing, 2017
[15] The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in …
2017
[16] The defining approaches and practical paradox of sensitive data: An investigation of data protection laws in 92 countries and regions and 200 data …
2017
[17] A responsible de-identification of the Real Data Corpus: building a framework for PII management
2016
[18] Thing-oriented learning: Application to mathematical objects
2016
[19] Mobile Health Monitoring System using cloud computing
2016
[20] Public cloud user authentication and data confidentiality using image steganography with hash function
American Journal of Applied Mathematics, 2015
[21] CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
IJSEAT, 2015
[22] An Effective Mobile Online Health Monitoring System In Cloud
2015
[23] Attribute Based Encryption For Secure And E-Sharing Health Records In Cloud
International Journal of Mechanical Engineering and Computer Applications, 2015
[24] Evaluation of online resources on the implementation of the protection of personal information act in south africa
Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015, 2015
[25] Altruism as a Tool for optimization: Literature Review
International Journal of Engineering Trends and Technology (IJETT), 2015
[26] Design and Analysis of Aircraft Wing
International Journal & Magazine of Engineering, Technology, Management and Research, 2015
[27] Health Monitoring For Secrecy Conserving Using Cloud Computing
International Journal of Engineering Research and Applications, 2014
[28] Mobile Health Monitoring Technique using Cloud Computing
International Journal of Recent Technology and Engineering, 2014
[29] A Literature Survey on Facial Expression Recognition techniques using Appearance based feature
International Journal of Computer Trends and Technology (IJCTT), 2014
[30] AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING
International Journal of Computer Science and Mobile Computing, 2014
[31] Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
International Journal of Science Engineering and Advance Technology, 2014
[32] Discretion Preservative Itinerant Health Scrutinising By Haze Succour
International Journal of Science Engineering and Advance Technology, 2014
[33] Privacy and Efficiency On Health Care Data Using Private Proxy Reencryption Scheme
International Journal of Innovative Research in Computer and Communication Engineering, 2014
[34] Privacy Towards Cloud Based Mobile Health Monitoring Services
International Journal of Scientific Research in Computer Science (IJSRCS), 2014
[35] PPM: Privacy Preserving In Mobile Health Monitoring System
IJRIT International Journal of Research in Information Technology, 2014
[36] Secured Health Monitoring System in Mobile Cloud Computing
International Journal of Computer Trends and Technology (IJCTT), 2014
[37] An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam
IJRCCT, 2014
[38] A Key Private Re-Encryption Scheme To Secure And Privacy-Preserving Using Cam
IJRCCT, 2014
[39] CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Information Forensics and Security, IEEE Transactions on 8.6, 2013
[40] The Design and Implementation of Intellectualized PSTN in China.
International Journal of Digital Content Technology & its Applications, 2013
[41] A Modified Anonymisation Algorithm Towards Reducing Information Loss.
2013
[42] A modified anonymisation algorithm towards reducing information loss
2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.