Data Over-Collection Reduction Model Using Security Level Analysis and Data Access Status Technique Articles pdf