Book chapter 599 views 214 downloads
Changing Faces: Identifying Complex Behavioural Profiles
Human Aspects of Information Security, Privacy, and Trust, Volume: 8533, Pages: 282 - 293
Swansea University Author: Tom Crick
-
PDF | Accepted Manuscript
Download (738.16KB)
DOI (Published version): 10.1007/978-3-319-07620-1_25
Abstract
There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and...
Published in: | Human Aspects of Information Security, Privacy, and Trust |
---|---|
ISBN: | 978-3-319-07619-5 978-3-319-07620-1 |
ISSN: | 0302-9743 1611-3349 |
Published: |
Heraklion, Crete, Greece
Springer
2014
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa43388 |
first_indexed |
2018-08-14T15:01:05Z |
---|---|
last_indexed |
2023-01-11T14:20:03Z |
id |
cronfa43388 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-12-18T17:46:49.6890472</datestamp><bib-version>v2</bib-version><id>43388</id><entry>2018-08-14</entry><title>Changing Faces: Identifying Complex Behavioural Profiles</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>SOSS</deptcode><abstract>There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.</abstract><type>Book chapter</type><journal>Human Aspects of Information Security, Privacy, and Trust</journal><volume>8533</volume><journalNumber/><paginationStart>282</paginationStart><paginationEnd>293</paginationEnd><publisher>Springer</publisher><placeOfPublication>Heraklion, Crete, Greece</placeOfPublication><isbnPrint>978-3-319-07619-5</isbnPrint><isbnElectronic>978-3-319-07620-1</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords/><publishedDay>22</publishedDay><publishedMonth>6</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-06-22</publishedDate><doi>10.1007/978-3-319-07620-1_25</doi><url>https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25</url><notes>2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014)</notes><college>COLLEGE NANME</college><department>Social Sciences School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SOSS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-18T17:46:49.6890472</lastEdited><Created>2018-08-14T15:45:03.3699118</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">School of Social Sciences - Education and Childhood Studies</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043388-03092018090728.pdf</filename><originalFilename>has2014.pdf</originalFilename><uploaded>2018-09-03T09:07:28.4230000</uploaded><type>Output</type><contentLength>716147</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-09-03T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
2022-12-18T17:46:49.6890472 v2 43388 2018-08-14 Changing Faces: Identifying Complex Behavioural Profiles 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 SOSS There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework. Book chapter Human Aspects of Information Security, Privacy, and Trust 8533 282 293 Springer Heraklion, Crete, Greece 978-3-319-07619-5 978-3-319-07620-1 0302-9743 1611-3349 22 6 2014 2014-06-22 10.1007/978-3-319-07620-1_25 https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) COLLEGE NANME Social Sciences School COLLEGE CODE SOSS Swansea University 2022-12-18T17:46:49.6890472 2018-08-14T15:45:03.3699118 Faculty of Humanities and Social Sciences School of Social Sciences - Education and Childhood Studies Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043388-03092018090728.pdf has2014.pdf 2018-09-03T09:07:28.4230000 Output 716147 application/pdf Accepted Manuscript true 2018-09-03T00:00:00.0000000 true eng |
title |
Changing Faces: Identifying Complex Behavioural Profiles |
spellingShingle |
Changing Faces: Identifying Complex Behavioural Profiles Tom Crick |
title_short |
Changing Faces: Identifying Complex Behavioural Profiles |
title_full |
Changing Faces: Identifying Complex Behavioural Profiles |
title_fullStr |
Changing Faces: Identifying Complex Behavioural Profiles |
title_full_unstemmed |
Changing Faces: Identifying Complex Behavioural Profiles |
title_sort |
Changing Faces: Identifying Complex Behavioural Profiles |
author_id_str_mv |
200c66ef0fc55391f736f6e926fb4b99 |
author_id_fullname_str_mv |
200c66ef0fc55391f736f6e926fb4b99_***_Tom Crick |
author |
Tom Crick |
author2 |
Giles Oatley Tom Crick |
format |
Book chapter |
container_title |
Human Aspects of Information Security, Privacy, and Trust |
container_volume |
8533 |
container_start_page |
282 |
publishDate |
2014 |
institution |
Swansea University |
isbn |
978-3-319-07619-5 978-3-319-07620-1 |
issn |
0302-9743 1611-3349 |
doi_str_mv |
10.1007/978-3-319-07620-1_25 |
publisher |
Springer |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
School of Social Sciences - Education and Childhood Studies{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}School of Social Sciences - Education and Childhood Studies |
url |
https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25 |
document_store_str |
1 |
active_str |
0 |
description |
There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework. |
published_date |
2014-06-22T07:28:46Z |
_version_ |
1821299050521034752 |
score |
11.047609 |