26,570 research outputs found
PRIVAFRAME: A Frame-Based Knowledge Graph for Sensitive Personal Data
The pervasiveness of dialogue systems and virtual conversation applications raises an important theme: the potential of sharing sensitive information, and the consequent need for protection. To guarantee the subject’s right to privacy, and avoid the leakage of private content, it is important to treat sensitive information. However, any treatment requires firstly to identify sensitive text, and appropriate techniques to do it automatically. The Sensitive Information Detection (SID) task has been explored in the literature in different domains and languages, but there is no common benchmark. Current approaches are mostly based on artificial neural networks (ANN) or transformers based on them. Our research focuses on identifying categories of personal data in informal English sentences, by adopting a new logical-symbolic approach, and eventually hybridising it with ANN models. We present a frame-based knowledge graph built for personal data categories defined in the Data Privacy Vocabulary (DPV). The knowledge graph is designed through the logical composition of already existing frames, and has been evaluated as background knowledge for a SID system against a labeled sensitive information dataset. The accuracy of PRIVAFRAME reached 78%. By comparison, a transformer-based model achieved 12% lower performance on the same dataset. The top-down logical-symbolic frame-based model allows a granular analysis, and does not require a training dataset. These advantages lead us to use it as a layer in a hybrid model, where the logical SID is combined with an ANNs SID tested in a previous study by the authors
Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review
Text mining and related analytics emerge as a technological approach to support human activities in extracting useful knowledge through texts in several formats. From a managerial point of view, it can help organizations in planning and decision-making processes, providing information that was not previously evident through textual materials produced internally or even externally. In this context, within the public/governmental scope, public security agencies are great beneficiaries of the tools associated with text mining, in several aspects, from applications in the criminal area to the collection of people's opinions and sentiments about the actions taken to promote their welfare. This article reports details of a systematic literature review focused on identifying the main areas of text mining application in public security, the most recurrent technological tools, and future research directions. The searches covered four major article bases (Scopus, Web of Science, IEEE Xplore, and ACM Digital Library), selecting 194 materials published between 2014 and the first half of 2021, among journals, conferences, and book chapters. There were several findings concerning the targets of the literature review, as presented in the results of this article
Contextual Knowledge and Information Fusion for Maritime Piracy Surveillance
Proceedings of: NATO Advanced Study Institute (ASI) on Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems, Salamanca, 19-30 September, 2011Though piracy accounts for only a small fraction of the general losses of the maritime industry it creates a serious threat to the maritime security because of the connections between organized piracy and wider criminal networks and corruption on land. Fighting piracy requires monitoring the waterways, harbors,and criminal networks on the land to increase the ability of the decision makers to predict piracy attracts and manage operations to prevent or contain them. Piracy surveillance involves representing and processing huge amount heterogeneous information often uncertain, unreliable, and irrelevant within a specific context to detect and recognize suspicious activities to alert decision makers on vessel behaviors of interest with minimal false alarm. The paper discusses the role of information fusion, and context representation and utilization in building an piracy surveillance picture.This paper has utilized the results of the research activity supported in part by Projects CICYT TIN2008-06742-C02-02/TSI, CICYT TEC2008-06732-C02-02/TEC and CAM CONTEXTS (S2009/TIC-1485)Publicad
The effects of an intensive training and feedback program on investigative interviews of children
In the present study, we assessed the effectiveness of an extensive training and feedback program with investigative interviewers of child victims of alleged abuse and neglect in a large Canadian city. Twelve investigative interviewers participated in a joint training initiative that lasted eight months and involved classroom components and extensive weekly verbal and written feedback. Interviewers were significantly more likely to use open-ended prompts and elicited more information from children with open-ended prompts following training. These differences were especially prominent following a subsequent ‘refresher’ training session. No negative effects of training were observed. Clear evidence was found of the benefits of an intensive training and feedback program across a wide variety of investigative interviews with children. Although previous research has found benefits of training with interviewers of child sexual assault victims, the current study extends these findings to a wide range of allegations and maltreatment contexts
Design of a Controlled Language for Critical Infrastructures Protection
We describe a project for the construction of controlled language for critical infrastructures protection (CIP). This project originates
from the need to coordinate and categorize the communications on CIP at the European level. These communications can be physically
represented by official documents, reports on incidents, informal communications and plain e-mail. We explore the application of
traditional library science tools for the construction of controlled languages in order to achieve our goal. Our starting point is an
analogous work done during the sixties in the field of nuclear science known as the Euratom Thesaurus.JRC.G.6-Security technology assessmen
Recommended from our members
Biometric capture: disrupting the digital codification of black migrants in the UK
The current system of the surveillance of migrants relies on biometric capture. To be captured is to be codified into machine-readable representations. This paper merges technological codifications with political discourse to explore the disproportionate capturing of black migrants in the UK. Using the historical treatment of Nigerian migrants in the UK as an illustration, this paper interrogates how contemporary technologies are used to codify and confine black migrants. This paper explores works from digital artists – Keith Piper and Joy Buolamwini – to address this codification of blackness using biometric technology. It calls for new technological cultures of coding that centre the disruption of violent systems of capture. Failure is defined as this disruption of hegemonic systems of codification and capture that aim to subjugate black communities. This paper stresses that it is only when technologies of capture fail that black and migrant communities can truly experience digital freedom
- …