Book chapter 599 views 214 downloads
Changing Faces: Identifying Complex Behavioural Profiles
Human Aspects of Information Security, Privacy, and Trust, Volume: 8533, Pages: 282 - 293
Swansea University Author: Tom Crick
-
PDF | Accepted Manuscript
Download (738.16KB)
DOI (Published version): 10.1007/978-3-319-07620-1_25
Abstract
There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and...
Published in: | Human Aspects of Information Security, Privacy, and Trust |
---|---|
ISBN: | 978-3-319-07619-5 978-3-319-07620-1 |
ISSN: | 0302-9743 1611-3349 |
Published: |
Heraklion, Crete, Greece
Springer
2014
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa43388 |
Abstract: |
There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework. |
---|---|
Item Description: |
2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) |
College: |
Faculty of Humanities and Social Sciences |
Start Page: |
282 |
End Page: |
293 |