{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:24:10Z","timestamp":1743089050193,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319574530"},{"type":"electronic","value":"9783319574547"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57454-7_14","type":"book-chapter","created":{"date-parts":[[2017,4,22]],"date-time":"2017-04-22T12:09:31Z","timestamp":1492862971000},"page":"173-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Preventing Inadvertent Information Disclosures via Automatic Security Policies"],"prefix":"10.1007","author":[{"given":"Tanya","family":"Goyal","sequence":"first","affiliation":[]},{"given":"Sanket","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"Balaji Vasan","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"key":"14_CR1","unstructured":"Enron email dataset webpage. http:\/\/www.cs.cmu.edu\/~enron\/"},{"key":"14_CR2","unstructured":"The history of data breaches. https:\/\/digitalguardian.com\/blog\/history-data-breaches. Accessed 22 Oct 2016"},{"key":"14_CR3","unstructured":"Stanford Named Entity Recognizer (NER). http:\/\/nlp.stanford.edu\/software\/CRF-NER.shtml. Accessed 26 Oct 2016"},{"key":"14_CR4","unstructured":"Wikileaks cablegate data. https:\/\/wikileaks.org\/plusd\/"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Gupta, A., Prabhu, Y., Varma, M.: Multi-label learning with millions of labels: recommending advertiser bid phrases for web pages. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2488388.2488391"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Aura, T., Kuhn, T.A., Roe, M.: Scanning electronic documents for personally identifiable information. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 41\u201350. ACM (2006)","DOI":"10.1145\/1179601.1179608"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Carvalho, V.R., Cohen, W.W.: Preventing information leaks in email. In: International Conference on Data Mining (SDM). SIAM (2007)","DOI":"10.1137\/1.9781611972771.7"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-78646-7_30","volume-title":"Advances in Information Retrieval","author":"VR Carvalho","year":"2008","unstructured":"Carvalho, V.R., Cohen, W.W.: Ranking users for intelligent message addressing. In: Macdonald, C., Ounis, I., Plachouras, V., Ruthven, I., White, R.W. (eds.) ECIR 2008. LNCS, vol. 4956, pp. 321\u2013333. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-78646-7_30"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Cumby, C.M., Ghani, R.: A machine learning based system for semi-automatically redacting documents. In: IAAI (2011)","DOI":"10.1609\/aaai.v25i2.18851"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Gabrilovich, E., Markovitch, S.: Text categorization with many redundant features: using aggressive feature selection to make SVMs competitive with C4. 5. In: Proceedings of the Twenty-First International Conference on Machine Learning, p. 41. ACM (2004)","DOI":"10.1145\/1015330.1015388"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-540-88192-6_26","volume-title":"Advanced Data Mining and Applications","author":"L Geng","year":"2008","unstructured":"Geng, L., Korba, L., Wang, X., Wang, Y., Liu, H., You, Y.: Using data mining methods to predict personally identifiable information in emails. In: Tang, C., Ling, C.X., Zhou, X., Cercone, N.J., Li, X. (eds.) ADMA 2008. LNCS (LNAI), vol. 5139, pp. 272\u2013281. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-88192-6_26"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Graus, D., Van Dijk, D., Tsagkias, M., Weerkamp, W., De Rijke, M.: Recipient recommendation in enterprises using communication graphs and email content. In: Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1079\u20131082. ACM (2014)","DOI":"10.1145\/2600428.2609514"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-22263-4_2","volume-title":"Privacy Enhancing Technologies","author":"M Hart","year":"2011","unstructured":"Hart, M., Manadhata, P., Johnson, R.: Text classification for data loss prevention. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 18\u201337. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22263-4_2"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.2753\/MIS0742-1222250205","volume":"25","author":"ME Johnson","year":"2008","unstructured":"Johnson, M.E.: Information risk of inadvertent disclosure: an analysis of file-sharing risk in the financial supply chain. J. Manag. Inf. Syst. 25(2), 97\u2013124 (2008)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1\u20133","key":"14_CR15","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1023\/A:1012491419635","volume":"46","author":"E Leopold","year":"2002","unstructured":"Leopold, E., Kindermann, J.: Text categorization with support vector machines. How to represent texts in input space? Mach. Learn. 46(1\u20133), 423\u2013444 (2002)","journal-title":"Mach. Learn."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Liu, T., Pu, Y., Shi, J., Li, Q., Chen, X.: Towards misdirected email detection for preventing information leakage. In: 2014 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ISCC.2014.6912554"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Prabhu, Y., Varma, M.: FastXML: a fast, accurate and stable tree-classifier for extreme multi-label learning. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 263\u2013272. ACM (2014)","DOI":"10.1145\/2623330.2623651"},{"key":"14_CR18","volume-title":"A Literature Survey on Algorithms for Multi-label Learning","author":"MS Sorower","year":"2010","unstructured":"Sorower, M.S.: A Literature Survey on Algorithms for Multi-label Learning. Oregon State University, Corvallis (2010)"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JA Suykens","year":"1999","unstructured":"Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural Process. Lett. 9(3), 293\u2013300 (1999)","journal-title":"Neural Process. Lett."},{"key":"14_CR20","unstructured":"Verizon RISK Team: 2014 data breach investigations report (2014)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-540-74958-5_38","volume-title":"Machine Learning: ECML 2007","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Vlahavas, I.: Random k-labelsets: an ensemble method for multilabel classification. In: Kok, J.N., Koronacki, J., Mantaras, R.L., Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol. 4701, pp. 406\u2013417. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-74958-5_38"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Zilberman, P., Dolev, S., Katz, G., Elovici, Y., Shabtai, A.: Analyzing group communication for preventing data leakage via email. In: 2011 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 37\u201341. IEEE (2011)","DOI":"10.1109\/ISI.2011.5984047"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57454-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:13:10Z","timestamp":1710346390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-57454-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319574530","9783319574547"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57454-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"23 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/pakdd2017.snu.ac.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}