A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated identification of sensitive data from implicit user specification
2018
Cybersecurity
In this paper, we propose S3, an automated approach to identify sensitive data based on users' implicit specifications. ...
Our approach is able to learn users' preferences from readable concepts initially provided by users, and automatically identify related sensitive data. ...
Availability of data and material The dataset supporting the conclusions of this article is available in the Dropbox repository https://www.dropbox.com/s/00hjztyw2zw35i3/s3.zip?dl=0. ...
doi:10.1186/s42400-018-0011-x
fatcat:46zzkshfprbufpeoj77ugllpga
DMS AND RFID AS AN INNOVATION IN THE ARCHIVING AND DOCUMENT MANAGEMENT IN THE COMPANY
2017
Research on Enterprise in Modern Economy Theory and Practice
Archiving and document management are issues faced by all companies regardless of their size and specific action. ...
The aim of the article is to present created in the framework of research and development project management support system and the archiving of documents the organization. ...
Automate the tracking of the documents submitted, the appropriate organizational conditions may constitute a specific doubling (reserve) records resulting from human activities. ...
doi:10.19253/reme.2017.03.002
doaj:488fa2d3f9aa4e5aabeb1b1ea36438ad
fatcat:kyl3g2gytzcznk6z75awe5sygy
Sensitive Information Tracking in Commodity IoT
[article]
2018
arXiv
pre-print
to identify sensitive data flows. ...
SainT operates in three phases; (a) translation of platform-specific IoT source code into an intermediate representation (IR), (b) identifying sensitive sources and sinks, and (c) performing static analysis ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory ...
arXiv:1802.08307v1
fatcat:uc55f2yqr5bpxjmkwkio64xahq
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT
2021
Security and Communication Networks
The extensive data collection performed by the Internet of Things (IoT) devices can put users at risk of data leakage. ...
The implicit purpose extraction of the adapted model significantly improves the F1-score by 11%. ...
Acknowledgments is work was supported by the National Natural Science Foundation of China (nos. U19A2081 and 61802270). ...
doi:10.1155/2021/5552501
fatcat:45zmgsjjkrh3palfjqbxjf25cu
Implicit dimension identification in user-generated text with LSTM networks
2019
Information Processing & Management
In the process of online storytelling, individual users create and consume highly diverse content that contains a great deal of implicit beliefs and not plainly expressed narrative. ...
perspective detection in news articles 2) identification of informational vs. conversational questions in community question answering (CQA) archives and. ...
DIMENSION IDENTIFICATION IN USER-GENERATED TEXT 5 benefit from automated classification of these implicit dimensions. ...
doi:10.1016/j.ipm.2019.02.007
fatcat:2ux6ybrvjngztm72addfqumy3y
Improving Recommender Systems Through the Automation of Design Decisions
2023
Proceedings of the 17th ACM Conference on Recommender Systems
Furthermore, we focus specifically on the development of novel automation approaches for data processing and training. We note that the realization of AutoRecSys is going to be a community effort. ...
The goal of AutoRecSys is not to replace recommender systems developers but to improve performance through the automation of design decisions. ...
On the other hand, if a data set contains only the implicit interactions of users with items, this data set is said to contain implicit feedback. ...
doi:10.1145/3604915.3608877
fatcat:aoqivogol5aopdp3uunc5vbmhy
Exploring Privacy Implications in OAuth Deployments
[article]
2021
arXiv
pre-print
We categorize user data made available by four identity providers (Google, Facebook, Apple and LinkedIn) and evaluate popular services accessing user data from the SSO platforms of these providers. ...
These services can both identify users and access a subset of the user's data stored with the provider. ...
Perceived sensitivity of specific user data could also vary across countries, and consequently lead to different privacy implications for users.
B. ...
arXiv:2103.02579v1
fatcat:p6bn5smgrze4zhxb2q24lzd5ny
Metamorphic Security Testing for Web Systems
2020
2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)
Security testing verifies that the data and the resources of software systems are protected from attackers. ...
Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. ...
We measured specificity and sensitivity [111] . ...
doi:10.1109/icst46399.2020.00028
dblp:conf/icst/MaiPGB20
fatcat:frwc3ss6v5er5ni3fdf252pxu4
Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection
2016
EURASIP Journal on Wireless Communications and Networking
Monitoring sensitive data with TaintChaser provides informed use of third-party applications for phone users and valuable input for smart-phone security service firms seeking to identify misbehaving applications ...
To better detect user's implicit taint and privacy leakage in the Android platform, this paper analyzes implicit taint detection and then proposes an automated detection system based on dynamic taint tracking ...
I thank Jim Yao and Tom Wang for their feedback during the writing of this paper. ...
doi:10.1186/s13638-016-0711-4
fatcat:fgcfyowo55g6pia5umx3vmo5mq
WND-Identifier: Automated and Efficient Identification of Wireless Network Devices
2021
Security and Communication Networks
) efficiently without user interaction. ...
To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task. ...
To overcome the above problems, ARE [35] establishes automated acquisitional rules to capture specific identifications including type, vendor, and model from the response data of IoT devices. ...
doi:10.1155/2021/9069123
fatcat:3zlaxv2y65ftrlphoszfnoxfzi
Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR
2017
Social Science Research Network
The IoT is defined by connections and linked services, tailored to the specific requirements of users. ...
The paper concludes that in order to minimise the privacy impact of the conflicts between data protection principles and identification in the IoT, GDPR standards urgently require further specification ...
Funding This article is a deliverable of the Privacy-Enhancing and Identification-Enabling Solutions for IoT (PEIESI) project, part of the PETRAS Internet of Things research hub. ...
doi:10.2139/ssrn.3083554
fatcat:4iunn3i52nhhpdebakrhxd73qy
Metamorphic Security Testing for Web Systems
[article]
2019
arXiv
pre-print
Security testing verifies that the data and the resources of software systems are protected from attackers. ...
Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. ...
We measured specificity and sensitivity [111] . ...
arXiv:1912.05278v1
fatcat:ez2yqzch2jhvvlxuoa4pgohfju
Exploring gender biases in ML and AI academic research through systematic literature review
2022
Frontiers in Artificial Intelligence
Through a detailed analysis of N = 120 papers, we map the current research landscape on gender specific biases present in ML and AI assisted automated systems. ...
We further point out the aspects of ML/AI gender biases research that are less explored and require more attention. Mainly we focus on the lack of user studies and inclusivity in this field of study. ...
Acknowledgments We would like to acknowledge the Inclusive Security and Privacy-focused Innovative Research in Information Technology (InSPIRIT) lab at the University of Denver. ...
doi:10.3389/frai.2022.976838
fatcat:blhqy5v42new7ogzk7yyj5ikly
Review: Privacy-preservation in the context of Natural Language Processing
2021
IEEE Access
A considerable portion of user-contributed data is in natural language, and in the past few years, many researchers have proposed NLP-based methods to address these data privacy challenges. ...
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. ...
The sensitivity of the data can be categorized as 1) implicit information and 2) explicit information. ...
doi:10.1109/access.2021.3124163
fatcat:pb5kf2yv7jbyfhtmpxwvrmtfdm
Automation bias: a systematic review of frequency, effect mediators, and mitigators
2012
JAMIA Journal of the American Medical Informatics Association
Automation bias (AB)dthe tendency to over-rely on automationdhas been studied in various academic fields. Clinical decision support systems (CDSS) aim to benefit the clinical decision-making process. ...
Funding This review was carried out as part of ongoing PhD research funded by the Engineering and Physical Sciences Research Council. ...
The effect is usually found in a post-hoc analysis of data, and the data reported often show indirect, implicit, evidence of AB. ...
doi:10.1136/amiajnl-2011-000089
pmid:21685142
pmcid:PMC3240751
fatcat:lkicvd63jrhwrlxixjoszjlzi4
« Previous
Showing results 1 — 15 out of 20,647 results