This disclosure describes techniques to automatically identify text content is inappropriate or likely in violation of organizational policy. A user interface is provided that enables users to make suitable corrections to written material. The described techniques can be implemented in software (e.g., in document authoring or communications applications)
Nowadays, the publication of textual documents provides critical benefits to scientific research and...
Employer monitoring of communications is prevalent and on the rise due in part to the Sarbanes-Oxley...
Freedom of Information legislations in many western democ- racies, including the United Kingdom (UK...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
This disclosure describes techniques for automatic detection of unintentional sharing of content. A ...
Damaging or objectionable innuendo can sometimes get associated with otherwise harmless-looking symb...
Detecting the degree and character of sexually explicit textual content is a feasible and potentiall...
With the advent of internet, large numbers of text documents are published and shared every day.Each...
D Wolthusen Both human analysts and particularly automated tool suites are capable of deriving sensi...
This publication describes techniques that enable a developer of an operating system (OS) to protect...
Online social networks are a predominant medium for social interaction where people communicate in a...
The content of notifications from the device operating system and applications is displayed on the s...
Document authoring tools, e.g., word processors, include automatic checking and correction features ...
Information is essential for all purpose of activities such as research, business decision making, e...
The process of sensitive data preservation is a manual and a semi-automatic procedure. Sensitive dat...
Nowadays, the publication of textual documents provides critical benefits to scientific research and...
Employer monitoring of communications is prevalent and on the rise due in part to the Sarbanes-Oxley...
Freedom of Information legislations in many western democ- racies, including the United Kingdom (UK...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
This disclosure describes techniques for automatic detection of unintentional sharing of content. A ...
Damaging or objectionable innuendo can sometimes get associated with otherwise harmless-looking symb...
Detecting the degree and character of sexually explicit textual content is a feasible and potentiall...
With the advent of internet, large numbers of text documents are published and shared every day.Each...
D Wolthusen Both human analysts and particularly automated tool suites are capable of deriving sensi...
This publication describes techniques that enable a developer of an operating system (OS) to protect...
Online social networks are a predominant medium for social interaction where people communicate in a...
The content of notifications from the device operating system and applications is displayed on the s...
Document authoring tools, e.g., word processors, include automatic checking and correction features ...
Information is essential for all purpose of activities such as research, business decision making, e...
The process of sensitive data preservation is a manual and a semi-automatic procedure. Sensitive dat...
Nowadays, the publication of textual documents provides critical benefits to scientific research and...
Employer monitoring of communications is prevalent and on the rise due in part to the Sarbanes-Oxley...
Freedom of Information legislations in many western democ- racies, including the United Kingdom (UK...