IIM  Vol.4 No.4 , July 2012
Experimentation with Personal Identifiable Information
ABSTRACT
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.

Cite this paper
S. Al-Fedaghi and A. Al-Azmi, "Experimentation with Personal Identifiable Information," Intelligent Information Management, Vol. 4 No. 4, 2012, pp. 123-133. doi: 10.4236/iim.2012.44019.
References
[1]   P. M. Schwartz and D. J. Solove, “The PII Problem: Privacy and a New Concept of Personal Identifiable Information,” New York University Law Review, Vol. 86, 2011, p. 1814.

[2]   DHS, “Handbook for Safeguarding Sensitive Personally Identifiable Information,” The Privacy Office, US Department of Homeland Security, Washington DC.www.dhs.gov/privacy

[3]   M. McMeekin, “Personally Identifable Information (PII) Incident Security Guidelines,” Northern Rockies Coordinating Group NRCG, 2010

[4]   J. Yakowtiz, “Tragedy of the Data Commons,” 2011. www.papers.ssrn.com/sol3/papers.cfm?abstract_id=178979

[5]   P. Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” UCLA Law Review, Vol. 57, 2010, p. 1701. www.epic.org/privacy/reidentification/ohm_article.pdf

[6]   J. Yakowitz, “Space Invaders: Intrusion in the Digital Age,” 2012. http://ssrn.com/abstract=2019079

[7]   “W3C Platform for Privacy Preferences.” www.w3.org/p3p

[8]   S. Lederer, C. Beckmann, A. Dey and J. Mankoff, “Managing Personal Information Disclosure in Ubiquitous Computing Environments,” 2003. http://www.intel-esearch.net/Publications/Berkeley/070920030922_139.pdf

[9]   L. Bygrave, “Data protection Law,” 2002.http://www.michaelkirby.com.au

[10]   J. Bing, “Classification of Personal Information, with Respect to the Sensitivity Aspect,” Proceedings of the First International Oslo Symposium on Data Banks and Societies, Oslo, 1972, pp. 98-150.

[11]   R. Lee, “Personal Data Protection in the Semantic Web,” 2002. http://www.w3.org/2002/01/pedal/thesis.html

[12]   Clearing House Privacy Rights Clearinghouse, “Chronology of Data Breaches Security Breaches 2005-Present,” 2005. http://www.privacyrights.org/ar/ChronDataBreaches.htm

[13]   P. Fule and J. Roddick, “Detecting Privacy and Ethical Sensitivity in Data Mining Results,” Twenty-Seventh Australasian Computer Science Conference (ACSC 2004), Dunedin, 2004. http://crpit.com/confpapers/CRPITV26Fule.pdf

[14]   S. Al-Fedaghi, “How Sensitive is Your Personal Information?” The 22nd ACM Symposium on Applied Computing (ACM SAC 2007), Seoul, 11-15 March 2007, pp. 165169.

[15]   J. Kang, “Information Privacy in Cyberspace Transactions,” Stanford Law Review, Vol. 50, No. 4, 1998, pp. 1193-1294. doi:10.2307/1229286

[16]   L. Floridi, “Information Ethics: On the Philosophical Foundation of Computer Ethics,” ETHICOMP98 Fourth International Conference on Ethical Issues of Information Technology, 1998. http://www.wolfson.ox.ac.uk/~floridi/ie.htm

[17]   S. Al-Fedaghi, “Crossing Privacy, Information, and Ethics,” 17th International Conference Information Resources Management Association (IRMA 2006), Washington DC, 21-24 May 2006. www.irma-international.org/viewtitle/32702/

[18]   S. Al-Fedaghi, “The Ethics of Information: What is Valued Most,” The Open Ethics Journal, Vol. 3, No. 1, 2009, pp. 118-126. doi:10.2174/1874761200903010118

[19]   S. Al-Fedaghi, “Personal Information Ethics, Encyclopedia of Information Ethics and Security,” M. Quigley, Ed., Information Science Publishing, Hershey, 2007, pp. 513519. doi:10.4018/978-1-59140-987-8.ch076

[20]   S. Al-Fedaghi and Fl. Al-Haqan, “Privacy Sensitivity: Application in Arabic,” International Conference on Asian Language Processing (IALP 2009), Singapore, 7-9 December 7-9 2009.

[21]   National Institute of Health, “A Sample Health Record.” http://www.nlm.nih.gov/medlineplus/magazine/issues/summer09/articles/summer09pg17.html

[22]   Supercoder.com, “Avoid under Coding: Billing for HighLevel, Single-System E/M Services.” http://www.supercoder.com/articles/articles-alerts/pmc/avoid-undercoding-billing-for-high-level-single-system-em-services/

[23]   Women’s Justice Center, “The Maria Teresa Macias Case.” http://www.justicewomen.com/macias_case_as_filed.html

 
 
Top