Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information...
26 KB (3,165 words) - 06:02, 6 July 2025
de-identified data to identify individuals is known as data re-identification. Successful re-identifications cast doubt on de-identification's effectiveness...
20 KB (2,107 words) - 07:53, 14 July 2025
Extended Display Identification Data (EDID) and Enhanced EDID (E-EDID) are metadata formats for display devices to describe their capabilities to a video...
84 KB (3,141 words) - 11:29, 4 July 2025
Pseudonymization (category Data anonymization techniques)
Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced...
20 KB (2,561 words) - 17:37, 13 July 2025
and geometric variables on urban street segments using FCD. Vehicle re-identification methods require sets of detectors mounted along the road. In this...
7 KB (882 words) - 22:27, 3 September 2024
Doxing (category Data security)
surrounding data privacy, with its citizens' personal information often easily accessible online due to various data brokers. Data re-identification Doomscrolling...
40 KB (4,349 words) - 17:25, 12 July 2025
Caller ID (redirect from Caller line identification)
Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits...
52 KB (5,741 words) - 17:11, 13 May 2025
such a de-identification process should or could be performed. The focus is on the outcome: that data should be such as not to allow the data subject to...
10 KB (1,161 words) - 18:11, 5 June 2025
Latanya Sweeney (section Data Privacy Lab at Harvard)
Center on Media, Politics and Public Policy. Datafly algorithm Data re-identification "Latanya Sweeney". Harvard Kennedy School Faculty Profile. Retrieved...
12 KB (1,029 words) - 00:49, 27 April 2025
Stylometry (category Personal identification)
while being a major difference between chat data and any other type of written information. Data re-identification Digital watermarking Linguistics and the...
59 KB (6,676 words) - 01:57, 6 July 2025
ESIM (redirect from ISIM (subscriber identification module))
key generated by the carrier. If the eSIM is eUICC-compatible, it can be re-programmed with new SIM information. Otherwise, the eSIM is programmed with...
17 KB (1,715 words) - 08:56, 1 July 2025
Licence Ouverte (category Open data)
Information released under the Open License may be re-used with attribution, such as a URL or other identification of the producer. The Open License is used by...
1 KB (125 words) - 14:27, 16 June 2025
system identification include any system where the inputs and outputs can be measured and include industrial processes, control systems, economic data, biology...
23 KB (3,454 words) - 11:07, 14 July 2025
Aadhaar (redirect from Unique Identification Number India)
India based on their biometrics and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority...
187 KB (16,655 words) - 08:55, 6 July 2025
Identity document (redirect from Identification card)
country in the world to use an identification card that incorporates both photo identification and fingerprint biometric data on an in-built computer chip...
194 KB (23,071 words) - 12:32, 14 July 2025
applicable, transfers of personal data to a third country or an international organisation, including the identification of that third country or international...
128 KB (13,227 words) - 13:51, 30 June 2025
Payment card number (redirect from Bank Identification Number)
leading six or eight digits are the issuer identification number (IIN) sometimes referred to as the bank identification number (BIN).: 33 The remaining numbers...
20 KB (1,696 words) - 10:51, 19 June 2025
Biometrics (redirect from Biometric identification)
realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups...
73 KB (8,222 words) - 10:05, 13 July 2025
continuously re-executed for synchronization. Difficulties also arise in constructing data warehouses when one has only a query interface to summary data sources...
32 KB (3,795 words) - 13:08, 4 June 2025
constructed using technologies like Flash cookies or IndexedDB and data re-identification methods like browser fingerprinting to create tracking systems that...
12 KB (1,549 words) - 19:44, 23 June 2025
analyzed using simple linear methods. Nonlinear data analysis is closely related to nonlinear system identification. In the main analysis phase, analyses aimed...
66 KB (7,188 words) - 08:32, 14 July 2025
Investopedia. Retrieved 2022-09-07.</re Benefit plan participation number Private health care authorization, access, or identification number Bank account number...
3 KB (231 words) - 23:07, 11 March 2025
Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data-processing software. Data with many entries...
160 KB (16,259 words) - 14:07, 30 June 2025
Fayda ID (category National identification numbers)
Ethiopian Digital Identification Proclamation 1284/2023 provides the rules on personal data protection. It recognizes that personal data belongs to the resident...
8 KB (788 words) - 22:13, 3 June 2025
for Direct Taxes (CBDT) and it also serves as an important proof of identification. It is also issued to foreign nationals (such as investors) subject...
21 KB (2,451 words) - 12:58, 16 June 2025
standardizes several types of information transmitted, including time, station identification and program information. The standard began as a project of the European...
42 KB (4,316 words) - 15:37, 24 June 2025
(outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation...
46 KB (4,934 words) - 13:32, 1 July 2025
research project so that the participants will not suffer from data re-identification.[citation needed] A privacy attack is the exploitation of an opportunity...
13 KB (1,634 words) - 15:25, 26 November 2023
Unique Identification Marking, UID marking, Item Unique Identification or IUID, is a part of the compliance process mandated by the United States Department...
15 KB (2,159 words) - 08:28, 10 November 2024