CFP last date
20 May 2024
Reseach Article

Security Issues and Accuracy Concerns in Information Retrieval Process

by Ashish Gautam, Ketan Jain, Vijay Kr. Pushkar, Shashi Kant Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 3
Year of Publication: 2013
Authors: Ashish Gautam, Ketan Jain, Vijay Kr. Pushkar, Shashi Kant Rai
10.5120/11939-7730

Ashish Gautam, Ketan Jain, Vijay Kr. Pushkar, Shashi Kant Rai . Security Issues and Accuracy Concerns in Information Retrieval Process. International Journal of Computer Applications. 70, 3 ( May 2013), 1-6. DOI=10.5120/11939-7730

@article{ 10.5120/11939-7730,
author = { Ashish Gautam, Ketan Jain, Vijay Kr. Pushkar, Shashi Kant Rai },
title = { Security Issues and Accuracy Concerns in Information Retrieval Process },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 3 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number3/11939-7730/ },
doi = { 10.5120/11939-7730 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:51.469183+05:30
%A Ashish Gautam
%A Ketan Jain
%A Vijay Kr. Pushkar
%A Shashi Kant Rai
%T Security Issues and Accuracy Concerns in Information Retrieval Process
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 3
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An approach towards Information retrieval process security issues & accuracy of the retrieved data from the user perspective, are the major concerns of this paper. Implanted work includes demonstration of the retrieval modes, process flow of information retrieval system and risk analysis of the retrieved data. Much work has been done to highlight the accuracy problem in the retrieved content where an accuracy formula focuses on the calculation of the accuracy percentage in order to generate an transparent approach towards the information retrieval process.

References
  1. Foote, Jonathan (1999). "An overview of audio information retrieval". Multimedia Systems (Springer).
  2. Dr. Gregory B. Newby, Kevin Gamiel 2002. Secure Information Sharing and Information Retrieval Infrastructure with Grid IR. In NSF/NIJ Symposium on Intelligence and Security Informatics. 1-10.
  3. Joel Stubinz, Samuel Whighli, 2004. Information retrieval system design for high effectiveness. www. cs. rmit. edu. au/~jz/sci/p3. pdf
  4. Manning, C. D. , Raghavan, P. , and Schütze, H. 2008. no. , pp. Muict. polppolservice. com. -dl-acm. org.
  5. Macleod, I. 1991. Text retrieval and the relational model. J. Am. Soc. Inf. Sci. 42, 3, 155-165.
  6. Cooper, W. S. -, 1971 Information storage and retrieval – Elsevier GW Furnas, S Deerwester, ST Dumais- in information retrieval, 1988 - dl. acm. org.
  7. Bob Blakely, Ellen Mc Dermott, Dan Geer. 2002. Information security is information risk management. In NSPW'01.
  8. Korfhage, Robert R. (1997). Information Storage and Retrieval. Wiley. pp. 368 pp.
  9. Frakes, William B. (1992). Information Retrieval Data Structures & Algorithms. Prentice-Hall, Inc.
  10. Luhn, H. P "A Statstical Approach to Mechanized Encoding and searching of Literary Information," IBM, J. Res. Develop. . 1:309-317, 1957.
  11. Frakes, William B. (1992). Information Retrieval Data Structures & Algorithms. Prentice-Hall, Inc
  12. Manning, Christopher D. ; Raghavan, Prabhakar; Schütze, Hinrich (2008). Introduction to Information Retrieval. Cambridge University Press
  13. Goodrum, Abby A. (2000). "Image Information Retrieval: An Overview of Current Research". Informing Science.
Index Terms

Computer Science
Information Sciences

Keywords

Retrieval Risk Severity Authentication.