2016
DOI: 10.2298/csis140808038s
|View full text |Cite
|
Sign up to set email alerts
|

Computer aided anonymization and redaction of judicial documents

Abstract: Public access to case law is a required prerequisite for the legal certainty and the rule of law. Nevertheless, according to the law, only authorized persons can access judgments in their non-anonymized and unredacted form. This paper proposes a computer aided method for anonymization and redaction of judgments, with an aim to improve efficiency of overall process. The anonymization and redaction procedure is based on the access control mechanism for XML documents. AKOMA NTOSO is chosen as an XML format in ord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Anonymization means deleting or replacing personally identifiable data and redaction means deleting or replacing confidential data. One method for semiautomatic anonymization and redaction of judicial decisions is proposed by Sladić, Gostojić, Milosavljević, Konjović, and Milosavljević, (2016) that uses standardized legal document formats and formalized anonymization rules to facilitate this process. Two other methods for privacy protection, the restricted access and open access procedures, are described in Bargh et al’s (2016) study.…”
Section: Discussionmentioning
confidence: 99%
“…Anonymization means deleting or replacing personally identifiable data and redaction means deleting or replacing confidential data. One method for semiautomatic anonymization and redaction of judicial decisions is proposed by Sladić, Gostojić, Milosavljević, Konjović, and Milosavljević, (2016) that uses standardized legal document formats and formalized anonymization rules to facilitate this process. Two other methods for privacy protection, the restricted access and open access procedures, are described in Bargh et al’s (2016) study.…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, legal ontologies, such as those described in Kralingen, (1997), Breuker and Hoekstra (2004), Gangemi (2008), Rubino et al (2006), Breuker et al (2007 and Gostojić et al (2013) can be used to semantically enrich its content, a condition that is a prerequisite for offering semantic services to users. Two such services, retrieval and browsing on the one hand as well as the anonymization, on the other hand, are described in Gostojić et al (2013) and Sladić et al (2016). Retrieval and browsing service uses a formal representation of legal norms contained in the legislation (its content) to offer semantic retrieval and browsing of legislation.…”
Section: Sequentially Effective Versionsmentioning
confidence: 99%