No Cover Image

Book chapter 495 views 193 downloads

Changing Faces: Identifying Complex Behavioural Profiles

Giles Oatley, Tom Crick Orcid Logo

Human Aspects of Information Security, Privacy, and Trust, Volume: 8533, Pages: 282 - 293

Swansea University Author: Tom Crick Orcid Logo

Abstract

There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and...

Full description

Published in: Human Aspects of Information Security, Privacy, and Trust
ISBN: 978-3-319-07619-5 978-3-319-07620-1
ISSN: 0302-9743 1611-3349
Published: Heraklion, Crete, Greece Springer 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa43388
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2018-08-14T15:01:05Z
last_indexed 2023-01-11T14:20:03Z
id cronfa43388
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-12-18T17:46:49.6890472</datestamp><bib-version>v2</bib-version><id>43388</id><entry>2018-08-14</entry><title>Changing Faces: Identifying Complex Behavioural Profiles</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.</abstract><type>Book chapter</type><journal>Human Aspects of Information Security, Privacy, and Trust</journal><volume>8533</volume><journalNumber/><paginationStart>282</paginationStart><paginationEnd>293</paginationEnd><publisher>Springer</publisher><placeOfPublication>Heraklion, Crete, Greece</placeOfPublication><isbnPrint>978-3-319-07619-5</isbnPrint><isbnElectronic>978-3-319-07620-1</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords/><publishedDay>22</publishedDay><publishedMonth>6</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-06-22</publishedDate><doi>10.1007/978-3-319-07620-1_25</doi><url>https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25</url><notes>2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014)</notes><college>COLLEGE NANME</college><department>Education</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-18T17:46:49.6890472</lastEdited><Created>2018-08-14T15:45:03.3699118</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">School of Social Sciences - Education and Childhood Studies</level></path><authors><author><firstname>Giles</firstname><surname>Oatley</surname><order>1</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>2</order></author></authors><documents><document><filename>0043388-03092018090728.pdf</filename><originalFilename>has2014.pdf</originalFilename><uploaded>2018-09-03T09:07:28.4230000</uploaded><type>Output</type><contentLength>716147</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-09-03T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2022-12-18T17:46:49.6890472 v2 43388 2018-08-14 Changing Faces: Identifying Complex Behavioural Profiles 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 EDUC There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework. Book chapter Human Aspects of Information Security, Privacy, and Trust 8533 282 293 Springer Heraklion, Crete, Greece 978-3-319-07619-5 978-3-319-07620-1 0302-9743 1611-3349 22 6 2014 2014-06-22 10.1007/978-3-319-07620-1_25 https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) COLLEGE NANME Education COLLEGE CODE EDUC Swansea University 2022-12-18T17:46:49.6890472 2018-08-14T15:45:03.3699118 Faculty of Humanities and Social Sciences School of Social Sciences - Education and Childhood Studies Giles Oatley 1 Tom Crick 0000-0001-5196-9389 2 0043388-03092018090728.pdf has2014.pdf 2018-09-03T09:07:28.4230000 Output 716147 application/pdf Accepted Manuscript true 2018-09-03T00:00:00.0000000 true eng
title Changing Faces: Identifying Complex Behavioural Profiles
spellingShingle Changing Faces: Identifying Complex Behavioural Profiles
Tom Crick
title_short Changing Faces: Identifying Complex Behavioural Profiles
title_full Changing Faces: Identifying Complex Behavioural Profiles
title_fullStr Changing Faces: Identifying Complex Behavioural Profiles
title_full_unstemmed Changing Faces: Identifying Complex Behavioural Profiles
title_sort Changing Faces: Identifying Complex Behavioural Profiles
author_id_str_mv 200c66ef0fc55391f736f6e926fb4b99
author_id_fullname_str_mv 200c66ef0fc55391f736f6e926fb4b99_***_Tom Crick
author Tom Crick
author2 Giles Oatley
Tom Crick
format Book chapter
container_title Human Aspects of Information Security, Privacy, and Trust
container_volume 8533
container_start_page 282
publishDate 2014
institution Swansea University
isbn 978-3-319-07619-5
978-3-319-07620-1
issn 0302-9743
1611-3349
doi_str_mv 10.1007/978-3-319-07620-1_25
publisher Springer
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str School of Social Sciences - Education and Childhood Studies{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}School of Social Sciences - Education and Childhood Studies
url https://link.springer.com/chapter/10.1007%2F978-3-319-07620-1_25
document_store_str 1
active_str 0
description There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attracting worldwide attention include the cases of Chelsea Manning, Edward Snowden and the US authorities. The challenges with profiling an individual across a range of activities is that their data footprint will legitimately vary significantly based on time and/or location. The insider threat problem is thus a specific instance of the more general problem of profiling complex behaviours. In this paper, we discuss our preliminary research models relating to profiling complex behaviours and present a set of experiments related to changing roles as viewed through large-scale social network datasets, such as Twitter. We employ psycholinguistic metrics in this work, considering changing roles from the standpoint of a trait-based personality theory. We also present further representations, including an alternative psychological theory (not trait-based), and established techniques for crime modelling, spatio-temporal and graph/network, to investigate within a wider reasoning framework.
published_date 2014-06-22T03:54:38Z
_version_ 1763752729441730560
score 10.997866