A CONTEXT ANALYSIS SCHEME OF DETECTING PERSONAL AND CONFIDENTIAL INFORMATION

被引:0
|
作者
Satomi, Toshihiro [1 ]
El-Sayed, Atlam [1 ,2 ]
Morita, Kazuhiro [1 ]
Fuketa, Masao [1 ]
Aoe, Jun-ichi [1 ]
机构
[1] Univ Tokushima, Dept Informat Sci & Intelligent Syst, Tokushima 7708506, Japan
[2] Tanta Univ, Fac Sci, Dept Comp Sci & Stat, Tanta, Gharbia, Egypt
关键词
Personal and confidential information; Multi-attribute matching; Neglected expressions; KNOWLEDGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The frequent information exchange has been spread widely in the Internet making communication convenience to a huge number of people. However, there are many problems related to stolen personal and confidential (PC) information through the Internet and resources in organizations. In order to support the supervision of PC information, there are many PC texts depending on detection systems. The traditional methods depend on words or a sequence of words without considering the context analysis, and many irrelevant candidates of possible PC information are extracted. This paper presents a new detection scheme for non-PC texts by using context analysis. The heart of the new approach is introducing neglect (NEC) expressions that can cancel the detected PC information. It enables us to reduce extra-detections or human efforts for non-PC texts. Experimental results for context data show that the improvement of the presented method becomes 66.5% compared with the traditional methods. Moreover, the human efforts reduce by about 80% comparing to by using the traditional methods.
引用
收藏
页码:3115 / 3134
页数:20
相关论文
共 50 条
  • [1] NATIONAL HEALTH SCHEME AND CONFIDENTIAL INFORMATION
    WALKER, WG
    [J]. MEDICAL JOURNAL OF AUSTRALIA, 1973, 2 (14) : 709 - 709
  • [2] Consent for release of confidential information-ethics in context?
    Tamin, Jacques
    [J]. OCCUPATIONAL MEDICINE-OXFORD, 2014, 64 (08): : 647 - 647
  • [3] Consent for release of confidential information-ethics in context?
    Lloyd, Stewart
    [J]. OCCUPATIONAL MEDICINE-OXFORD, 2014, 64 (06): : 398 - 399
  • [4] A Confidential Information Hiding Scheme for 3D Model Based on Contour Analysis
    Ren, Shuai
    Fan, Aoxiong
    Shi, Lei
    Lei, Xuemei
    Dan, Zhuoyi
    [J]. International Journal of Network Security, 2021, 23 (04) : 677 - 684
  • [5] Private and Confidential? Handling Personal Information in Social and Health Services
    Kornbeck, Jacob
    [J]. BRITISH JOURNAL OF SOCIAL WORK, 2010, 40 (07): : 2355 - 2356
  • [6] Private and Confidential? Handling Personal Information in the Social and Health Services
    Munro, Eileen
    [J]. ETHICS & SOCIAL WELFARE, 2009, 3 (01): : 106 - 108
  • [7] Private and Confidential? Handling Personal Information in the Social and Health Services
    Feng, Patrick
    [J]. SURVEILLANCE & SOCIETY, 2009, 7 (01) : 83 - 84
  • [8] A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems
    Bu, Lake
    Isakov, Mihailo
    Kinsy, Michel A.
    [J]. arXiv, 2019,
  • [9] A secure and robust scheme for sharing confidential information in IoT systems
    Bu, Lake
    Isakov, Mihailo
    Kinsy, Michel A.
    [J]. AD HOC NETWORKS, 2019, 92
  • [10] Keeping confidential information confidential
    Hey, Edmund
    [J]. LANCET, 2009, 373 (9664): : 630 - 630