People, devices, and networks are generating data incessantly. The rapid growth in personal information processing and the new developments in technology have led to the situation in which private actors, such as the network operators in the telecommunications (telecom) industry, process and transform remarkable volumes of data. The Internet of Things makes it possible for any devices or components of machines to be connected to the Internet and to exchange sensitive data with each other and network services. Interaction between objects, and between objects and individuals are generating data flows which are difficult to control. Data controllers and processors are responsible for ensuring that the data is protected adequately by implementi...
This article discussed the challenges of pseudonymizing unstructured, noisy social media data for cy...
Encryption of personal data is widely regarded as a privacy preserving technology which could potent...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...
Pseudonymisation is gaining traction among modern electronic identification systems as a privacy enh...
Art. 4(5) introduces the concept of “pseudonymisation”, which consists in processing personal data i...
© The Authors, published by EDP Sciences, 2020. The topic of pseudonymization of personal data has s...
The debate on the use of personal data in language resources usually focuses — and rightfully so — o...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regula...
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regula...
The Internet of Things (IoT) paves the way for smart applications such as in E-health, E-homes, tran...
The primary scope of application of the General Data Protection Regulation - Regulation (UE) 2016/67...
In the technology and digital era, data is used daily by all businesses including insurance companie...
This article discussed the challenges of pseudonymizing unstructured, noisy social media data for cy...
Encryption of personal data is widely regarded as a privacy preserving technology which could potent...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...
Pseudonymisation is gaining traction among modern electronic identification systems as a privacy enh...
Art. 4(5) introduces the concept of “pseudonymisation”, which consists in processing personal data i...
© The Authors, published by EDP Sciences, 2020. The topic of pseudonymization of personal data has s...
The debate on the use of personal data in language resources usually focuses — and rightfully so — o...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regula...
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regula...
The Internet of Things (IoT) paves the way for smart applications such as in E-health, E-homes, tran...
The primary scope of application of the General Data Protection Regulation - Regulation (UE) 2016/67...
In the technology and digital era, data is used daily by all businesses including insurance companie...
This article discussed the challenges of pseudonymizing unstructured, noisy social media data for cy...
Encryption of personal data is widely regarded as a privacy preserving technology which could potent...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...