On mining sensitive rules to identify privacy threats