Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Personally identifiable information

Known as: Personally-identifiable information, Personal details, Personally-identifying information 
Personally identifiable information (PII), or sensitive personal information (SPI), as used in US privacy law and information security, is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Abstract The General Data Protection Regulation (GDPR) will come into force in the European Union (EU) in May 2018 to meet… Expand
  • table 1
Is this relevant?
Review
2017
Review
2017
Privacy seems to be the Achilles’ heel of today’s web. Most web services make continuous efforts to track their users and to… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • table III
Is this relevant?
Review
2017
Review
2017
Automated and smart meters are devices that are able to monitor the energy consumption of electricity consumers in near real-time… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Review
2017
Review
2017
Abstract Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow… Expand
  • table 1
Is this relevant?
Review
2017
Review
2017
Do people really care about their privacy? Surveys show that privacy is a primary concern for citizens in the digital age. On the… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Review
2017
Review
2017
Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Is this relevant?
Review
2016
Review
2016
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smart… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
We analyze the personal information security behavior and awareness of 881 IS users.We propose four scales to measure how risky… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish… Expand
Is this relevant?