• Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information...
    26 KB (3,165 words) - 06:02, 6 July 2025
  • Thumbnail for De-identification
    de-identified data to identify individuals is known as data re-identification. Successful re-identifications cast doubt on de-identification's effectiveness...
    20 KB (2,107 words) - 07:53, 14 July 2025
  • Extended Display Identification Data (EDID) and Enhanced EDID (E-EDID) are metadata formats for display devices to describe their capabilities to a video...
    84 KB (3,141 words) - 11:29, 4 July 2025
  • Pseudonymization (category Data anonymization techniques)
    Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced...
    20 KB (2,561 words) - 17:37, 13 July 2025
  • and geometric variables on urban street segments using FCD. Vehicle re-identification methods require sets of detectors mounted along the road. In this...
    7 KB (882 words) - 22:27, 3 September 2024
  • Thumbnail for Doxing
    Doxing (category Data security)
    surrounding data privacy, with its citizens' personal information often easily accessible online due to various data brokers. Data re-identification Doomscrolling...
    40 KB (4,349 words) - 17:25, 12 July 2025
  • Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits...
    52 KB (5,741 words) - 17:11, 13 May 2025
  • such a de-identification process should or could be performed. The focus is on the outcome: that data should be such as not to allow the data subject to...
    10 KB (1,161 words) - 18:11, 5 June 2025
  • Stylometry (category Personal identification)
    while being a major difference between chat data and any other type of written information. Data re-identification Digital watermarking Linguistics and the...
    59 KB (6,676 words) - 01:57, 6 July 2025
  • Thumbnail for Latanya Sweeney
    Center on Media, Politics and Public Policy. Datafly algorithm Data re-identification "Latanya Sweeney". Harvard Kennedy School Faculty Profile. Retrieved...
    12 KB (1,029 words) - 00:49, 27 April 2025
  • Thumbnail for Licence Ouverte
    Licence Ouverte (category Open data)
    Information released under the Open License may be re-used with attribution, such as a URL or other identification of the producer. The Open License is used by...
    1 KB (125 words) - 14:27, 16 June 2025
  • Thumbnail for ESIM
    key generated by the carrier. If the eSIM is eUICC-compatible, it can be re-programmed with new SIM information. Otherwise, the eSIM is programmed with...
    17 KB (1,715 words) - 08:56, 1 July 2025
  • system identification include any system where the inputs and outputs can be measured and include industrial processes, control systems, economic data, biology...
    23 KB (3,454 words) - 11:07, 14 July 2025
  • India based on their biometrics and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority...
    187 KB (16,655 words) - 08:55, 6 July 2025
  • Thumbnail for Identity document
    country in the world to use an identification card that incorporates both photo identification and fingerprint biometric data on an in-built computer chip...
    194 KB (23,071 words) - 12:32, 14 July 2025
  • Thumbnail for General Data Protection Regulation
    applicable, transfers of personal data to a third country or an international organisation, including the identification of that third country or international...
    128 KB (13,227 words) - 13:51, 30 June 2025
  • leading six or eight digits are the issuer identification number (IIN) sometimes referred to as the bank identification number (BIN).: 33  The remaining numbers...
    20 KB (1,696 words) - 10:51, 19 June 2025
  • realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups...
    73 KB (8,222 words) - 10:05, 13 July 2025
  • constructed using technologies like Flash cookies or IndexedDB and data re-identification methods like browser fingerprinting to create tracking systems that...
    12 KB (1,549 words) - 19:44, 23 June 2025
  • continuously re-executed for synchronization. Difficulties also arise in constructing data warehouses when one has only a query interface to summary data sources...
    32 KB (3,795 words) - 13:08, 4 June 2025
  • Investopedia. Retrieved 2022-09-07.</re Benefit plan participation number Private health care authorization, access, or identification number Bank account number...
    3 KB (231 words) - 23:07, 11 March 2025
  • Thumbnail for Metadata
    Metadata (redirect from Meta data)
    and identification. It includes elements such as title, abstract, author, and keywords. Structural metadata – metadata about containers of data and indicates...
    104 KB (11,353 words) - 23:11, 13 July 2025
  • Thumbnail for Data analysis
    analyzed using simple linear methods. Nonlinear data analysis is closely related to nonlinear system identification. In the main analysis phase, analyses aimed...
    66 KB (7,188 words) - 08:32, 14 July 2025
  • Thumbnail for Big data
    Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data-processing software. Data with many entries...
    160 KB (16,259 words) - 14:07, 30 June 2025
  • standardizes several types of information transmitted, including time, station identification and program information. The standard began as a project of the European...
    42 KB (4,316 words) - 15:37, 24 June 2025
  • Thumbnail for Fayda ID
    Fayda ID (category National identification numbers)
    Ethiopian Digital Identification Proclamation 1284/2023 provides the rules on personal data protection. It recognizes that personal data belongs to the resident...
    8 KB (788 words) - 22:13, 3 June 2025
  • (outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation...
    46 KB (4,934 words) - 13:32, 1 July 2025
  • Thumbnail for Permanent account number
    for Direct Taxes (CBDT) and it also serves as an important proof of identification. It is also issued to foreign nationals (such as investors) subject...
    21 KB (2,451 words) - 12:58, 16 June 2025
  • research project so that the participants will not suffer from data re-identification.[citation needed] A privacy attack is the exploitation of an opportunity...
    13 KB (1,634 words) - 15:25, 26 November 2023
  • Unique Identification Marking, UID marking, Item Unique Identification or IUID, is a part of the compliance process mandated by the United States Department...
    15 KB (2,159 words) - 08:28, 10 November 2024