{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:07:51Z","timestamp":1751083671613,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031969966","type":"print"},{"value":"9783031969973","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-96997-3_16","type":"book-chapter","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T15:23:08Z","timestamp":1751037788000},"page":"250-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Name Pattern Recognition: A Model Proposal Applied to\u00a0the\u00a0Anonymization of\u00a0Unstructured Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9582-607X","authenticated-orcid":false,"given":"Marisa","family":"de Andrade","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8123-7434","authenticated-orcid":false,"given":"Kim","family":"Lima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-8487","authenticated-orcid":false,"given":"Brenda","family":"Cardoso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1902-3124","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Lima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7069-945X","authenticated-orcid":false,"given":"Renato","family":"Torres","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0408-4187","authenticated-orcid":false,"given":"Nelson","family":"Neto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Almeida, S.d.C.D.d., Soares, T.A.: Os impactos da lei geral de prote\u00e7\u00e3o de dados-lgpd no cen\u00e1rio digital. Perspectivas em Ci\u00eancia da Informa\u00e7\u00e3o 27(03), 26\u201345 (2022)","DOI":"10.1590\/1981-5344\/25905"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Anselmo, M., Ribas, B.C.: Pseudonymization in legal texts according to the LGPD: A named entity recognition approach. In: Brazilian Conference on Intelligent Systems, pp. 309\u2013323. Springer (2024)","DOI":"10.1007\/978-3-031-79032-4_22"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Carvalho, A.P., Canedo, E.D., Carvalho, F.P., Carvalho, P.H.P.: Anonymisation and compliance to protection data: Impacts and challenges into big data. In: ICEIS (1), pp. 31\u201341 (2020)","DOI":"10.5220\/0009411100310041"},{"issue":"8","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.3390\/sym13081490","volume":"13","author":"GM Cs\u00e1nyi","year":"2021","unstructured":"Cs\u00e1nyi, G.M., Nagy, D., V\u00e1gi, R., Vad\u00e1sz, J.P., Orosz, T.: Challenges and open problems of legal document anonymization. Symmetry 13(8), 1490 (2021)","journal-title":"Symmetry"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Cunha, L.F.d.C., Ramalho, J.C.: NER in archival finding aids: extended. Mach. Learn. Knowl. Extract. 4(1), 42\u201365 (2022)","DOI":"10.3390\/make4010003"},{"key":"16_CR6","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 4171\u20134186 (2019)"},{"key":"16_CR7","unstructured":"Grandvalet, Y., Bengio, Y.: Semi-supervised learning by entropy minimization. In: Advances in Neural Information Processing Systems, vol. 17 (2004)"},{"issue":"1","key":"16_CR8","first-page":"411","volume":"7","author":"M Honnibal","year":"2017","unstructured":"Honnibal, M., Montani, I.: spacy 2: Natural language understanding with bloom embeddings, convolutional neural networks and incremental parsing. To appear 7(1), 411\u2013420 (2017)","journal-title":"To appear"},{"key":"16_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110540","volume":"145","author":"R Juez-Hernandez","year":"2023","unstructured":"Juez-Hernandez, R., Quijano-S\u00e1nchez, L., Liberatore, F., G\u00f3mez, J.: Agora: an intelligent system for the anonymization, information extraction and automatic mapping of sensitive documents. Appl. Soft Comput. 145, 110540 (2023)","journal-title":"Appl. Soft Comput."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Laguna, S., et al.: Explimeable: a visual analytics approach for exploring lime. In: 2023 Workshop on Visual Analytics in Healthcare (VAHC), pp. 27\u201333. IEEE (2023)","DOI":"10.1109\/VAHC60858.2023.00011"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Li, X., Feng, J., Meng, Y., Han, Q., Wu, F., Li, J.: A unified MRC framework for named entity recognition. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, pp. 5849\u20135859 (2020)","DOI":"10.18653\/v1\/2020.acl-main.519"},{"key":"16_CR12","first-page":"39","volume":"1","author":"LN Lorenzon","year":"2021","unstructured":"Lorenzon, L.N.: An\u00e1lise comparada entre regulamenta\u00e7\u00f5es de dados pessoais no brasil e na uni\u00e3o europeia (lgpd e gdpr) e seus respectivos instrumentos de enforcement. Revista do Programa de Direito da Uni\u00e3o Europeia 1, 39\u201352 (2021)","journal-title":"Revista do Programa de Direito da Uni\u00e3o Europeia"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Luoma, J., Pyysalo, S.: Exploring cross-sentence contexts for named entity recognition with Bert. In: Proceedings of the 28th International Conference on Computational Linguistics pp. 904\u2013914 (2020)","DOI":"10.18653\/v1\/2020.coling-main.78"},{"key":"16_CR14","unstructured":"Nelson, G.S.: Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. In: SAS global forum proceedings, pp. 1\u201323 (2015)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Silva, M.P.d., Viera, A.F.G.: Descoberta de conhecimento com uso de t\u00e9cnicas de minera\u00e7\u00e3o de textos aplicadas em documentos textuais da investiga\u00e7\u00e3o policial brasileira. Investigaci\u00f3n bibliotecol\u00f3gica 35(88), 161\u2013183 (2021)","DOI":"10.22201\/iibi.24488321xe.2021.88.58389"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Silveira, M., et al.: An anonymization service for privacy in data mining. In: Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing pp. 214\u2013219 (2023)","DOI":"10.1145\/3615366.3625074"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Sousa, T.R., Coutinho, M., Coutinho, L., Albuquerque, R.: Lgpd: Levantamento de t\u00e9cnicas criptogr\u00e1ficas e de anonimiza\u00e7\u00e3o para prote\u00e7\u00e3o de bases de dados. In: Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg), pp. 55\u201368. SBC (2020)","DOI":"10.5753\/sbseg.2020.19227"},{"issue":"3","key":"16_CR18","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1093\/idpl\/ipac008","volume":"12","author":"EM Weitzenboeck","year":"2022","unstructured":"Weitzenboeck, E.M., Lison, P., Cyndecka, M., Langford, M.: The GDPR and unstructured data: is anonymization possible? Int. Data Privacy Law 12(3), 184\u2013206 (2022)","journal-title":"Int. Data Privacy Law"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96997-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T15:23:15Z","timestamp":1751037795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96997-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031969966","9783031969973"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96997-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}