language:
Find link is a tool written by Edward Betts.searching for De-identification 31 found (53 total)
alternate case: de-identification
NIE number
(583 words)
[view diff]
no match in snippet
view article
find links to article
The NIE is a tax identification number in Spain, known in Spanish as the NIE, or more formally the Número de identidad de extranjero ("Foreigner IdentityScholarly communication (1,935 words) [view diff] exact match in snippet view article find links to article
confidential material is through de-identification or anonymization. There are numerous techniques for the de-identification of data including simply removingZiya Gökalp (3,634 words) [view diff] exact match in snippet view article find links to article
nationalism and modernization". His nationalist ideals espoused a de-identification with Ottoman Turkey's nearby Arab neighbors, instead advocating forElectronic data capture (1,540 words) [view diff] exact match in snippet view article find links to article
component for data entry a validation component to check user data a de-identification component to make data less identifiable a reporting tool for analysisK-anonymity (1,849 words) [view diff] exact match in snippet view article find links to article
42. ISBN 978-0-7695-2285-2. ISSN 1084-4627. S2CID 17044848. Data de-identification reconciles the demand for release of data for research purposes andPersonal Information Protection Law of the People's Republic of China (3,339 words) [view diff] case mismatch in snippet view article find links to article
habits, hobbies or economic, health, credit status, and so forth. De-Identification: The process of handling personal information to make it impossibleBiomedical text mining (6,752 words) [view diff] exact match in snippet view article find links to article
Kotfila C, Uzuner Ö (December 2015). "Automated systems for the de-identification of longitudinal clinical narratives: Overview of 2014 i2b2/UTHealthKhaled El Emam (772 words) [view diff] exact match in snippet view article find links to article
Electronic Health Information Laboratory, conducting academic research on de-identification and re-identification risk. As of 2022, El-Emam has served as Editor-in-ChiefGeneral Data Protection Regulation (12,543 words) [view diff] exact match in snippet view article find links to article
provides no guidance on how or what constitutes an effective data de-identification scheme, with a grey area on what would be considered as inadequatePrivacy-enhancing technologies (3,181 words) [view diff] exact match in snippet view article find links to article
information with an artificial identifiers known as Pseudonyms. This de-identification method enables contents and fields of information to be covered upTurkification (8,054 words) [view diff] exact match in snippet view article find links to article
non-Muslims in the Republic of Turkey, Turkification resulted in "de-identification, in which a person loses all references to his or her own grandparentsAnn Cavoukian (2,311 words) [view diff] exact match in snippet view article find links to article
similarly commit to de-identify data collected at the source. The de-identification of data at source was significant according to Cavoukian because "theInformation sensitivity (2,446 words) [view diff] exact match in snippet view article find links to article
2002. Retrieved Feb. 9 2013. "Sensitive Data Discovery" "Methods for De-identification of PHI". 7 September 2012. "International Privacy Laws " InformationShieldCostas Simitis (2,673 words) [view diff] exact match in snippet view article find links to article
decision, claiming that the action pursued deviously the religious de-identification of the Greek nation. Faced with the government's robust but unpopularIdentity document (22,430 words) [view diff] no match in snippet view article find links to article
citizens and foreigners. The new document is called "Documento Personal de Identification" (DPI) (Personal Identity Document). It is based on a smartcard with2009 Iranian presidential election protests (13,831 words) [view diff] exact match in snippet view article find links to article
online repression by adopting different strategies such as: "(1) de-identification, (2) network reformation, (3) circumvention, (4) self-censoring, andJohn Kamateros (logothetes tou dromou) (805 words) [view diff] exact match in snippet view article
JSTOR 44170347. Kazhdan, A. P. (1969). "John Doukas – an attempt at de-identification". Le Parole e le Idee. 11: 242–247. Kazhdan, A. P.; Epstein, Ann WhartonDisease informatics (1,325 words) [view diff] exact match in snippet view article find links to article
The data used must also undergo rigorous data anonymization and de-identification protocols to protect patient privacy. Through the further use andCinchona pubescens (1,861 words) [view diff] no match in snippet view article find links to article
Rachel Atkinson, Ana Mireya Guerrero, Johanna Mader 2006. Manual de Identification y Manejo de Malezas en las Islas Galápagos. Segunda edición, FundaciónJohn Doukas (megas hetaireiarches) (474 words) [view diff] exact match in snippet view article
JSTOR 44170347. Kazhdan, A. P. (1969). "John Doukas – an attempt at de-identification". Le Parole e le Idee. 11: 242–247. Polemis, Demetrios I. (1968).Tokenization (data security) (4,493 words) [view diff] exact match in snippet view article
payments". Computerworld. Retrieved 2022-11-23. Mark, S. J. (2018). "De-identification of personal information for use in software testing to ensure complianceMichael P. C. Carns (901 words) [view diff] exact match in snippet view article find links to article
PrivaSource, Inc., a small software firm specializing in the security and de-identification of large, sensitive databases, in Weston, Massachusetts. Carns isGenetic privacy (3,719 words) [view diff] exact match in snippet view article find links to article
PMID 26522470. Rights (OCR), Office for Civil (2012-09-07). "Methods for De-identification of PHI". HHS.gov. Retrieved 2020-10-31. "Privacy in Genomics". GenomeMasking (Electronic Health Record) (1,668 words) [view diff] exact match in snippet view article
2013. Retrieved 2013-06-01. El Emam, Khaled (2013). "Methods for the De-identification of Electronic Health Records". Genome Medicine. 3 (4): 25. doi:10Ted Myerson (1,003 words) [view diff] exact match in snippet view article find links to article
that preserves the value of underlying data. Specifically, Anonos de-identification and dynamic data obscurity risk management tools provide trusted partySpark NLP (987 words) [view diff] exact match in snippet view article find links to article
entity linking, entity normalization, assertion status detection, de-identification, relation extraction, and spell checking and correction. The libraryFive safes (2,243 words) [view diff] exact match in snippet view article find links to article
Stephanie; Elliot, Mark; Mackay, Elaine; O'Hara, Kieran (2017). De-identification decision-making framework. CSIRO. Green, Elizabeth; Ritchie, FelixPrivacy in education (7,583 words) [view diff] exact match in snippet view article find links to article
"location and interpretation of data; informed consent, privacy, and de-identification of data; and classification and management of data." Students believeIdentity replacement technology (3,950 words) [view diff] exact match in snippet view article find links to article
being done on deepfakes techniques such as face morphing and face de-identification. However, deepfake prevention techniques tend to be worse at identifyingMyDemocracy.ca (1,215 words) [view diff] exact match in snippet view article find links to article
ISSN 1073-1105. PMID 11066504. S2CID 46014405. in No silver bullet: De-identification still doesn't work Archived 2016-12-16 at the Wayback Machine, ArvindGari Clifford (2,022 words) [view diff] exact match in snippet view article find links to article
George B.; Mark, Roger G.; Clifford, Gari D. (2008). "Automated de-identification of free-text medical records". BMC Medical Informatics and Decision