No Cover Image

Book chapter 537 views 200 downloads

Changing Faces: Identifying Complex Behavioural Profiles

Giles Oatley, Tom Crick Orcid Logo

Human Aspects of Information Security, Privacy, and Trust, Volume: 8533, Pages: 282 - 293

Swansea University Author: Tom Crick Orcid Logo

Abstract

There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and...

Full description

Published in: Human Aspects of Information Security, Privacy, and Trust
ISBN: 978-3-319-07619-5 978-3-319-07620-1
ISSN: 0302-9743 1611-3349
Published: Heraklion, Crete, Greece Springer 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa43388
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.
Item Description: 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014)
College: Faculty of Humanities and Social Sciences
Start Page: 282
End Page: 293