An introduction to information security evaluation

  • KANNO Y
N/ACitations
Citations of this article
89Readers
Mendeley users who have this article in their library.

Abstract

In recent years, analysts have been confronted with the in- creasing availability of on-line sources of information in the form of natural-language texts. This increased accessibility of textual information has led to a corresponding interest in technology for processing this text automatically to extract task-relevant information. This demand for a technological solution to the need to deal with the often-overwhelming quantity of available information has stimulated the devel- opment of the field of Information Extraction. This article provides an overview of the problems addressed, current ap- proaches toward solutions, and assesses the state of the art and its potential for future progress.

Cite

CITATION STYLE

APA

KANNO, Y. (2005). An introduction to information security evaluation. Journal of Information Processing and Management, 48(6), 320–332. https://doi.org/10.1241/johokanri.48.320

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free