Sensitive information: A review and research agenda

A basic challenge for intelligence and security informatics is exploring the ways in which humans categorize or classify “sensitive” information. Research and practice support the critical nature of categorization frameworks, yet there are a number of different ways humans conceptualize sensitive information. In this paper we review some of the dilemmas associated with classification of sensitive information, present different classification approaches, and then identify alternative propositions related to factors that influence judgments about degree of sensitivity. We conclude with directions for future research.

[1]  D E Forsythe,et al.  Using ethnography to build a working system: rethinking basic design assumptions. , 1992, Proceedings. Symposium on Computer Applications in Medical Care.

[2]  Brett Trueman,et al.  The Strategic Timing of Corporate Disclosures , 1996 .

[3]  Pete Earley Family of Spies: Inside the John Walker Spy Ring , 1988 .

[4]  E. Rosch,et al.  Cognition and Categorization , 1980 .

[5]  B. Kwasnik THE IMPORTANCE OF FACTORS THAT ARE NOT DOCUMENT ATTRIBUTES IN THE ORGANISATION OF PERSONAL DOCUMENTS , 1991 .

[6]  Shameek Konar,et al.  Information As Regulation: The Effect of Community Right to Know Laws on Toxic Emissions , 1997 .

[7]  Christoph Scholz,et al.  The Symbolic Value of Computerized Information Systems , 1990 .

[8]  P. Kay Basic Color Terms: Their Universality and Evolution , 1969 .

[9]  Michelle Lynn Brown,et al.  A theory of information technology cultures : magic dragons, wizards and archetypal patterns , 1995 .

[10]  Barbara H. Kwasnik,et al.  The Role of Classification in Knowledge Representation and Discovery , 1999, Libr. Trends.

[11]  Daniel Robey,et al.  More on myth, magic and metaphor: Cultural insights into the management of information technology in organizations , 1999, Inf. Technol. People.

[12]  Carl R. Chen,et al.  Timing the Disclosure of Information: Management's View of Earnings Announcements , 1994 .

[13]  J. March,et al.  A Behavioral Theory of the Firm , 1964 .

[14]  Robert J. Bloomfield,et al.  Market Transparency: Who Wins and Who Loses? , 1999 .

[15]  D. Merten,et al.  ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .

[16]  Bruce Murphy,et al.  Enterprise Security Architecture , 2000, Inf. Secur. J. A Glob. Perspect..

[17]  Robert E. Verrecchia,et al.  Pre-announcement and event-period private information , 1997 .

[18]  Chris Hare Improving Network Level Security through Real-time Monitoring and Intrusion Detection , 2000 .

[19]  Siew Hong Teoh,et al.  Information Disclosure and Voluntary Contributions to Public Goods , 1997 .

[20]  Elizabeth D. Liddy,et al.  Information Security and Sharing , 2001 .

[21]  Clare Beghtol,et al.  'Facets' as Interdisciplinary undiscovered Public Knowledge: S.R. Ranganathan in India and L. Guttman in Israel , 1995, J. Documentation.

[22]  S. M. Drigotas,et al.  Secret Transmission: A Relative Intimacy Hypothesis , 1999 .

[23]  R. Landau,et al.  Secrecy, anonymity, and deception in donor insemination: a genetic, psycho-social and ethical critique. , 1998, Social work in health care.

[24]  Bert R. Boyce,et al.  Beyond topicality : A two stage view of relevance and the retrieval process , 1982, Inf. Process. Manag..

[25]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[26]  B. Schutt Sorting things out. , 1970, The American journal of nursing.

[27]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[28]  Tamar Katriel,et al.  Sodot: Secret‐sharing as a social form among Israeli children∗ , 1990 .

[29]  T. Van Dijk,et al.  RELEVANCE ASSIGNMENT IN DISCOURSE COMPREHENSION , 1979 .

[30]  E. Rosch,et al.  Categorization of Natural Objects , 1981 .

[31]  Baruch Lev,et al.  Information Asymmetry, R&D, and Insider Gains , 2000 .

[32]  Suil Pae,et al.  Acquisition and discretionary disclosure of private information and its implications for firms' productive activities , 1999 .

[33]  Yongmin Chen Conflicting interests in information disclosure and short-term orientation of firms , 1994 .

[34]  G. Fine,et al.  Secrecy, Trust, and Dangerous Leisure: Generating Group Cohesion in Voluntary Organizations , 1996 .

[35]  Clare Beghtol,et al.  Bibliographic Classification Theory and Text Linguistics: Aboutness Analysis, intertextuality and the Cognitive Act of Classifying Documents , 1986, J. Documentation.

[36]  Jack L. Brock Federal Information Security: Actions Needed to Address Widespread Weaknesses , 2000 .

[37]  Ellen M. Markman,et al.  Categorization and Naming in Children: Problems of Induction , 1989 .

[38]  M. Baba Dangerous Liaisons: Trust, Distrust, and Information Technology in American Work Organizations , 1999 .

[39]  Anthony P. Maingot Offshore Secrecy Centers and the Necessary Role of States: Bucking the Trend , 1995 .

[40]  V. Groze,et al.  The Impact of Secrecy and Denial in Adoption: Practice and Treatment Issues , 1997 .

[41]  R. Brown How shall a thing be called. , 1958, Psychological review.

[42]  Robert M. Bushman,et al.  Public Disclosure and the Structure of Private Information Markets , 1991 .

[43]  M. McCloskey,et al.  Natural categories: Well defined or fuzzy sets? , 1978 .

[44]  Susan Leigh Star,et al.  Grounded Classification: Grounded Theory and Faceted Classification , 1998, Libr. Trends.

[45]  Raya Fidel,et al.  Proceedings of the 2nd ASIS SIG/CR Classification Research Workshop, held at the 54th ASIS Annual Meeting, Washington, DC, October 27-31, 1991 , 1992 .

[46]  Genevieve J. Knezo,et al.  "Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy , 2003 .

[47]  Tracy R. Lewis,et al.  Série Scientifique Scientific Series Disclosure of Information in Regulatory Proceedings Les Organisations-partenaires / the Partner Organizations Disclosure of Information in Regulatory Proceedings , 2022 .

[48]  Jan H. P. Eloff,et al.  Security classification for documents , 1996, Comput. Secur..

[49]  E. Shils,et al.  The torment of secrecy : the background and consequences of American security policies , 1957 .

[50]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[51]  C. Palmer,et al.  Telling the Truth (Up to a Point): Radio Communication Among Maine Lobstermen , 1990 .

[52]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[53]  Louis Phlips,et al.  The Economics of Imperfect Information , 1989 .