{"id":"https://openalex.org/W2997276186","doi":"https://doi.org/10.1108/lht-11-2018-0166","title":"Social network analysis of law information privacy protection of cybersecurity based on rough set theory","display_name":"Social network analysis of law information privacy protection of cybersecurity based on rough set theory","publication_year":2019,"publication_date":"2019-12-13","ids":{"openalex":"https://openalex.org/W2997276186","doi":"https://doi.org/10.1108/lht-11-2018-0166","mag":"2997276186"},"language":"en","primary_location":{"id":"doi:10.1108/lht-11-2018-0166","is_oa":false,"landing_page_url":"https://doi.org/10.1108/lht-11-2018-0166","pdf_url":null,"source":{"id":"https://openalex.org/S143568823","display_name":"Library Hi Tech","issn_l":"0737-8831","issn":["0737-8831","2054-166X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Library Hi Tech","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100421428","display_name":"Yang Li","orcid":"https://orcid.org/0000-0002-1147-280X"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Li","raw_affiliation_strings":["School of Law, Minzu University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Law, Minzu University of China, Beijing, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102346929","display_name":"Xuhua Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuhua Hu","raw_affiliation_strings":["Beijing King Virtue Attorneys at Law, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing King Virtue Attorneys at Law, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100421428"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.76104459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"40","issue":"1","first_page":"133","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11063","display_name":"Rough Sets and Fuzzy Logic","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7786527872085571},{"id":"https://openalex.org/keywords/rough-set","display_name":"Rough set","score":0.7123533487319946},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5174856185913086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5119179487228394},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5034133791923523},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4736441373825073},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4608793556690216},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44935017824172974},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4269489049911499},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4147648215293884},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3991163969039917},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20828554034233093},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.15800046920776367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7786527872085571},{"id":"https://openalex.org/C111012933","wikidata":"https://www.wikidata.org/wiki/Q3137210","display_name":"Rough set","level":2,"score":0.7123533487319946},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5174856185913086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5119179487228394},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5034133791923523},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4736441373825073},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4608793556690216},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44935017824172974},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4269489049911499},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4147648215293884},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3991163969039917},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20828554034233093},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.15800046920776367}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/lht-11-2018-0166","is_oa":false,"landing_page_url":"https://doi.org/10.1108/lht-11-2018-0166","pdf_url":null,"source":{"id":"https://openalex.org/S143568823","display_name":"Library Hi Tech","issn_l":"0737-8831","issn":["0737-8831","2054-166X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Library Hi Tech","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1977510887","https://openalex.org/W2131138871","https://openalex.org/W2272918802","https://openalex.org/W2330216853","https://openalex.org/W2522022198","https://openalex.org/W2553029681","https://openalex.org/W2567650686","https://openalex.org/W2596550646","https://openalex.org/W2614538623","https://openalex.org/W2620323949","https://openalex.org/W2655703056","https://openalex.org/W2753753116","https://openalex.org/W2763578266","https://openalex.org/W2766307109","https://openalex.org/W2766312160","https://openalex.org/W2781996601","https://openalex.org/W2783203532","https://openalex.org/W2786171514","https://openalex.org/W2788139408","https://openalex.org/W2790360011","https://openalex.org/W2794377947","https://openalex.org/W2794631344","https://openalex.org/W2795686572","https://openalex.org/W2798461587","https://openalex.org/W2803881474","https://openalex.org/W2807409770","https://openalex.org/W2807759081","https://openalex.org/W2809112858","https://openalex.org/W2811275589","https://openalex.org/W2884146796","https://openalex.org/W2884490183","https://openalex.org/W2886832575","https://openalex.org/W2887544206","https://openalex.org/W2898676909"],"related_works":["https://openalex.org/W4229600140","https://openalex.org/W2182490965","https://openalex.org/W2327430950","https://openalex.org/W2524758925","https://openalex.org/W2596305496","https://openalex.org/W2290534421","https://openalex.org/W118448456","https://openalex.org/W1996017820","https://openalex.org/W3003650144","https://openalex.org/W2940702331"],"abstract_inverted_index":{"Purpose":[0],"The":[1,186,200,325],"purpose":[2],"of":[3,11,16,38,43,46,57,74,106,131,147,155,168,174,211,218,235,245,285,291,322,347,363,371,378,402,412,436,455,462,471,476],"this":[4,117,262,364,443],"paper":[5],"is":[6,60,293,317,394],"to":[7,62,83,250,304,331],"solve":[8],"the":[9,36,39,44,63,96,100,103,121,127,135,145,166,169,175,180,194,204,208,216,231,243,259,268,283,288,345,361,369,376,398,434,445,453,460,469],"problem":[10,401],"information":[12,56,108,150,177],"privacy":[13,104,236,240,338,385,399,420,437,454],"and":[14,21,26,48,53,112,152,179,193,214,233,239,247,278,309,336,351,355,375,448,467,474,479],"security":[15],"social":[17,22,58,75,97,122,225,286,456,463],"users.":[18],"Mobile":[19],"internet":[20],"network":[23,64,76,84,98,123,226,457,464],"are":[24,184,264,329],"more":[25,27,52,54,81,271],"deeply":[28],"integrated":[29],"into":[30,295],"people\u2019s":[31],"daily":[32],"life,":[33],"especially":[34],"under":[35,95],"interaction":[37],"fierce":[40],"development":[41,435],"momentum":[42],"Internet":[45],"Things":[47],"diversified":[49],"personalized":[50],"services,":[51],"private":[55],"users":[59],"exposed":[61],"environment":[65],"actively":[66],"or":[67],"unintentionally.":[68],"In":[69,116,230,267,282,366,442],"addition,":[70,367],"a":[71,254,384,410],"large":[72],"amount":[73],"data":[77,189,212,223,256,260,272,292,316,321,340,439],"not":[78,265],"only":[79],"brings":[80],"benefits":[82],"application":[85,362,430],"providers,":[86],"but":[87],"also":[88],"provides":[89,409],"motivation":[90],"for":[91,276,313,319,358,390,419,432],"malicious":[92],"attackers.":[93],"Therefore,":[94],"environment,":[99,426],"research":[101,327],"on":[102,120,140,165,221,253],"protection":[105,237,241,339,386,400,421,438,473],"user":[107,477],"has":[109,352,428],"great":[110],"theoretical":[111,326,354],"practical":[113,356,429],"significance.":[114],"Design/methodology/approach":[115],"study,":[118,444],"based":[119,139],"analysis,":[124],"combined":[125,368],"with":[126],"attribute":[128,182,379],"reduction":[129,137,380],"idea":[130],"rough":[132,142,156,296,310,348,382,414],"set":[133,143,157,297,311,349,411,415],"theory,":[134],"generalized":[136],"concept":[138],"multi-level":[141],"from":[144],"perspectives":[146],"positive":[148],"region,":[149],"entropy":[151],"knowledge":[153,301],"granularity":[154,172],"theory":[158,298,350,370,377],"were":[159,191,197],"proposed.":[160],"Furthermore,":[161],"it":[162],"was":[163],"traversed":[164],"basis":[167],"hierarchical":[170,289,315,320,332],"compatible":[171],"space":[173],"original":[176],"system":[178],"corresponding":[181],"values":[183],"coarsened.":[185],"selected":[187],"test":[188,232],"sets":[190],"tested,":[192],"experimental":[195],"results":[196,201,328],"analyzed.":[198],"Findings":[199],"showed":[202],"that":[203],"algorithm":[205,238,246,389,447],"can":[206,450],"guarantee":[207],"anonymity":[209],"requirement":[210],"publishing":[213],"improve":[215],"effect":[217],"classification":[219,422],"modeling":[220,312],"anonymous":[222],"in":[224,261,381,405,424],"environment.":[227,407],"Research":[228],"limitations/implications":[229],"verification":[234],"scheme,":[242],"efficiency":[244],"scheme":[248,449],"needs":[249],"be":[251,274],"tested":[252],"larger":[255],"scale.":[257],"However,":[258],"study":[263],"enough.":[266],"following":[269],"research,":[270,342],"will":[273],"used":[275],"testing":[277],"verification.":[279],"Practical":[280],"implications":[281],"context":[284],"network,":[287],"structure":[290,466],"introduced":[294],"as":[299],"domain":[300],"by":[302],"referring":[303],"human":[305],"granulation":[306],"cognitive":[307],"mechanism,":[308],"complex":[314],"studied":[318],"decision":[323,333,392],"table.":[324],"applied":[330],"rule":[334],"mining":[335,341,423],"k-anonymous":[337],"which":[343,396,427],"enriches":[344],"connotation":[346],"important":[353],"significance":[357],"further":[359],"promoting":[360,433],"theory.":[365],"secure":[372],"multi-party":[373],"computing":[374],"set,":[383],"feature":[387,403,416],"selection":[388,404,417],"multi-source":[391],"table":[393],"proposed,":[395],"solves":[397],"distributed":[406,425],"It":[408],"effective":[413],"method":[418],"value":[431],"mining.":[440],"Originality/value":[441],"proposed":[446],"effectively":[451],"protect":[452],"data,":[458],"ensure":[459],"availability":[461],"graph":[465],"realize":[468],"need":[470],"both":[472],"sharing":[475],"attributes":[478],"relational":[480],"data.":[481]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
