No Cover Image

Book chapter 261 views 99 downloads

Changing Faces: Identifying Complex Behavioural Profiles / Giles Oatley, Tom Crick

Human Aspects of Information Security, Privacy, and Trust, Volume: 8533, Pages: 282 - 293

Swansea University Author: Tom Crick

Abstract

There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and...

Full description

Published in: Human Aspects of Information Security, Privacy, and Trust
ISBN: 978-3-319-07619-5 978-3-319-07620-1
ISSN: 0302-9743 1611-3349
Published: Heraklion, Crete, Greece Springer 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa43388
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2018-08-14T15:01:05Z
last_indexed 2018-10-15T19:17:23Z
id cronfa43388
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2018-10-15T14:54:23.3404361</datestamp><bib-version>v2</bib-version><id>43388</id><entry>2018-08-14</entry><title>Changing Faces: Identifying Complex Behavioural Profiles</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.</abstract><type>Book chapter</type><journal>Human Aspects of Information Security, Privacy, and Trust</journal><volume>8533</volume><paginationStart>282</paginationStart><paginationEnd>293</paginationEnd><publisher>Springer</publisher><placeOfPublication>Heraklion, Crete, Greece</placeOfPublication><isbnPrint>978-3-319-07619-5</isbnPrint><isbnElectronic>978-3-319-07620-1</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords/><publishedDay>22</publishedDay><publishedMonth>6</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-06-22</publishedDate><doi>10.1007/978-3-319-07620-1_25</doi><url>https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25</url><notes>2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014)</notes><college>COLLEGE NANME</college><department>Education</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2018-10-15T14:54:23.3404361</lastEdited><Created>2018-08-14T15:45:03.3699118</Created><path><level id="1">College of Science</level><level id="2">Computer Science</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043388-03092018090728.pdf</filename><originalFilename>has2014.pdf</originalFilename><uploaded>2018-09-03T09:07:28.4230000</uploaded><type>Output</type><contentLength>716147</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-09-03T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2018-10-15T14:54:23.3404361 v2 43388 2018-08-14 Changing Faces: Identifying Complex Behavioural Profiles 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 EDUC There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework. Book chapter Human Aspects of Information Security, Privacy, and Trust 8533 282 293 Springer Heraklion, Crete, Greece 978-3-319-07619-5 978-3-319-07620-1 0302-9743 1611-3349 22 6 2014 2014-06-22 10.1007/978-3-319-07620-1_25 https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) COLLEGE NANME Education COLLEGE CODE EDUC Swansea University 2018-10-15T14:54:23.3404361 2018-08-14T15:45:03.3699118 College of Science Computer Science Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043388-03092018090728.pdf has2014.pdf 2018-09-03T09:07:28.4230000 Output 716147 application/pdf Accepted Manuscript true 2018-09-03T00:00:00.0000000 true eng
title Changing Faces: Identifying Complex Behavioural Profiles
spellingShingle Changing Faces: Identifying Complex Behavioural Profiles
Tom, Crick
title_short Changing Faces: Identifying Complex Behavioural Profiles
title_full Changing Faces: Identifying Complex Behavioural Profiles
title_fullStr Changing Faces: Identifying Complex Behavioural Profiles
title_full_unstemmed Changing Faces: Identifying Complex Behavioural Profiles
title_sort Changing Faces: Identifying Complex Behavioural Profiles
author_id_str_mv 200c66ef0fc55391f736f6e926fb4b99
author_id_fullname_str_mv 200c66ef0fc55391f736f6e926fb4b99_***_Tom, Crick
author Tom, Crick
author2 Giles Oatley
Tom Crick
format Book chapter
container_title Human Aspects of Information Security, Privacy, and Trust
container_volume 8533
container_start_page 282
publishDate 2014
institution Swansea University
isbn 978-3-319-07619-5
978-3-319-07620-1
issn 0302-9743
1611-3349
doi_str_mv 10.1007/978-3-319-07620-1_25
publisher Springer
college_str College of Science
hierarchytype
hierarchy_top_id collegeofscience
hierarchy_top_title College of Science
hierarchy_parent_id collegeofscience
hierarchy_parent_title College of Science
department_str Computer Science{{{_:::_}}}College of Science{{{_:::_}}}Computer Science
url https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25
document_store_str 1
active_str 0
description There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.
published_date 2014-06-22T04:00:19Z
_version_ 1717914797194870784
score 10.846149