HIT Consultant Insightful coverage of healthcare innovation
 

anonymity

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: Adobe     Published Date: Aug 02, 2017
Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently. The distinction between anonymous and authenticated hinges on personally identifiable information (PII)—information that can be used alone, in combination, or in context to contact an individual. This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection, adobe
    
Adobe
Published By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
    
SAS
Published By: Gigya     Published Date: Jun 06, 2014
This white paper will go over three ways user anonymity can negatively affect ROI for businesses and lead to poor customer experiences.
Tags : 
gigya, anonymity, user data, social networking, social networks, customer engagement, customer experience, user insight
    
Gigya
Published By: Quocirca     Published Date: Apr 23, 2007
After the relative anonymity and privacy of more discrete forms of communication – letters, email, the telephone – is the experience useful and comfortable for the individual and does video now add sufficient value to the organization to justify the cost?
Tags : 
video, video collaboration, collaboration, video conference, video conferencing, conferencing, face to face, face-to-face
    
Quocirca
Published By: Envisional     Published Date: Dec 21, 2006
The Internet's reach and anonymity have played a big part in the 100-fold growth of counterfeiting since the 1980s. The web provides a shop window on the world, yet it's impossible to police.
Tags : 
counterfeiting, hacker, counterfeit, brand infringement, branding, copy, envisional
    
Envisional
Search      

Add Research

Get your company's research in the hands of targeted business professionals.