Personal Information Classification for Privacy Negotiation

被引:0
|
作者
Jang, Injoo [1 ]
Yoo, Hyeong Seon [1 ]
机构
[1] Inha Univ, Sch Comp Sci & Engn, Inchon 402751, South Korea
关键词
Classification; Privacy; Personal Information; Formal Concept Analysis; FORMAL CONCEPT ANALYSIS; KNOWLEDGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy has been recognized as a critical topic in the Internet for a long time, and technical developments in this area are ongoing. With the proliferation of various network sites and the unification of them, it has become more evident that the problem of privacy is not bounded by the perimeters of a specific system. Nowadays, many network services rapidly drive toward unification. In this paper, we mainly consider unified personal information. We propose an evaluation method of privacy sensitivity-level. The information sensitivity level (S(L)) is evaluated with four main factors; the degree of conjunction (D(C)), the principle of identity (I(A)), the principle of privacy (P(A)), and the value of analogism (A(A)), S(L) := Sigma(D(C), J(A), P(A), A(A)). If we classify the information based on the information sensitivity level (SO, it can show the objective validity. Finally, we outline new research directions for currently existing methods for privacy-preserving data analysis in the combined social network environment
引用
下载
收藏
页码:1117 / 1122
页数:6
相关论文
共 50 条
  • [1] Privacy of Personal Information
    Mondal S.
    Gharote M.S.
    Lodha S.P.
    Queue, 2022, 20 (03): : 41 - 87
  • [2] Privacy and pricing personal information
    Jaisingh, Jeevan
    Barron, Jack
    Mehta, Shailendra
    Chaturvedi, Alok
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 187 (03) : 857 - 870
  • [3] Automatic Privacy Classification of Personal Photos
    Buschek, Daniel
    Bader, Moritz
    von Zezschwitz, Emanuel
    De Luca, Alexander
    HUMAN-COMPUTER INTERACTION - INTERACT 2015, PT II, 2015, 9297 : 428 - 435
  • [4] A framework for protecting personal information and privacy
    Zheng, Hongying
    Yuan, Quan
    Chen, Jianyong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2867 - 2874
  • [5] Internet privacy, technology, and personal information
    Price, Marjorie S.
    ETHICS AND INFORMATION TECHNOLOGY, 2020, 22 (02) : 163 - 173
  • [6] Personal information privacy and emerging technologies
    Conger, Sue
    Pratt, Joanne H.
    Loch, Karen D.
    INFORMATION SYSTEMS JOURNAL, 2013, 23 (05) : 401 - 417
  • [7] PRIVACY - SECURITY OF COMPUTERIZED PERSONAL INFORMATION
    OCONNOR, KP
    INFORMATION PRIVACY, 1979, 1 (03): : 120 - 123
  • [8] Trading with privacy: the price of personal information
    Steinfeld, Nili
    ONLINE INFORMATION REVIEW, 2015, 39 (07) : 923 - 938
  • [9] Privacy: Personal information, threats, and technologies
    Beckwith, R
    Mainwaring, S
    2005 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), PROCEEDINGS: WEAPONS AND WIRES: PREVENTION AND SAFETY IN A TIME OF FEAR, 2005, : 9 - 16
  • [10] Internet privacy, technology, and personal information
    Marjorie S. Price
    Ethics and Information Technology, 2020, 22 : 163 - 173