26,570 research outputs found

    PRIVAFRAME: A Frame-Based Knowledge Graph for Sensitive Personal Data

    Get PDF
    The pervasiveness of dialogue systems and virtual conversation applications raises an important theme: the potential of sharing sensitive information, and the consequent need for protection. To guarantee the subject’s right to privacy, and avoid the leakage of private content, it is important to treat sensitive information. However, any treatment requires firstly to identify sensitive text, and appropriate techniques to do it automatically. The Sensitive Information Detection (SID) task has been explored in the literature in different domains and languages, but there is no common benchmark. Current approaches are mostly based on artificial neural networks (ANN) or transformers based on them. Our research focuses on identifying categories of personal data in informal English sentences, by adopting a new logical-symbolic approach, and eventually hybridising it with ANN models. We present a frame-based knowledge graph built for personal data categories defined in the Data Privacy Vocabulary (DPV). The knowledge graph is designed through the logical composition of already existing frames, and has been evaluated as background knowledge for a SID system against a labeled sensitive information dataset. The accuracy of PRIVAFRAME reached 78%. By comparison, a transformer-based model achieved 12% lower performance on the same dataset. The top-down logical-symbolic frame-based model allows a granular analysis, and does not require a training dataset. These advantages lead us to use it as a layer in a hybrid model, where the logical SID is combined with an ANNs SID tested in a previous study by the authors

    Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review

    Get PDF
    Text mining and related analytics emerge as a technological approach to support human activities in extracting useful knowledge through texts in several formats. From a managerial point of view, it can help organizations in planning and decision-making processes, providing information that was not previously evident through textual materials produced internally or even externally. In this context, within the public/governmental scope, public security agencies are great beneficiaries of the tools associated with text mining, in several aspects, from applications in the criminal area to the collection of people's opinions and sentiments about the actions taken to promote their welfare. This article reports details of a systematic literature review focused on identifying the main areas of text mining application in public security, the most recurrent technological tools, and future research directions. The searches covered four major article bases (Scopus, Web of Science, IEEE Xplore, and ACM Digital Library), selecting 194 materials published between 2014 and the first half of 2021, among journals, conferences, and book chapters. There were several findings concerning the targets of the literature review, as presented in the results of this article

    Contextual Knowledge and Information Fusion for Maritime Piracy Surveillance

    Get PDF
    Proceedings of: NATO Advanced Study Institute (ASI) on Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems, Salamanca, 19-30 September, 2011Though piracy accounts for only a small fraction of the general losses of the maritime industry it creates a serious threat to the maritime security because of the connections between organized piracy and wider criminal networks and corruption on land. Fighting piracy requires monitoring the waterways, harbors,and criminal networks on the land to increase the ability of the decision makers to predict piracy attracts and manage operations to prevent or contain them. Piracy surveillance involves representing and processing huge amount heterogeneous information often uncertain, unreliable, and irrelevant within a specific context to detect and recognize suspicious activities to alert decision makers on vessel behaviors of interest with minimal false alarm. The paper discusses the role of information fusion, and context representation and utilization in building an piracy surveillance picture.This paper has utilized the results of the research activity supported in part by Projects CICYT TIN2008-06742-C02-02/TSI, CICYT TEC2008-06732-C02-02/TEC and CAM CONTEXTS (S2009/TIC-1485)Publicad

    The effects of an intensive training and feedback program on investigative interviews of children

    Get PDF
    In the present study, we assessed the effectiveness of an extensive training and feedback program with investigative interviewers of child victims of alleged abuse and neglect in a large Canadian city. Twelve investigative interviewers participated in a joint training initiative that lasted eight months and involved classroom components and extensive weekly verbal and written feedback. Interviewers were significantly more likely to use open-ended prompts and elicited more information from children with open-ended prompts following training. These differences were especially prominent following a subsequent ‘refresher’ training session. No negative effects of training were observed. Clear evidence was found of the benefits of an intensive training and feedback program across a wide variety of investigative interviews with children. Although previous research has found benefits of training with interviewers of child sexual assault victims, the current study extends these findings to a wide range of allegations and maltreatment contexts

    Design of a Controlled Language for Critical Infrastructures Protection

    Get PDF
    We describe a project for the construction of controlled language for critical infrastructures protection (CIP). This project originates from the need to coordinate and categorize the communications on CIP at the European level. These communications can be physically represented by official documents, reports on incidents, informal communications and plain e-mail. We explore the application of traditional library science tools for the construction of controlled languages in order to achieve our goal. Our starting point is an analogous work done during the sixties in the field of nuclear science known as the Euratom Thesaurus.JRC.G.6-Security technology assessmen
    • …
    corecore