Tools for understanding identity

We present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability...

Full description

Bibliographic Details
Main Authors: Creese, S, Gibson−Robinson, T, Goldsmith, M, Hodges, D, Kim, D, Love, O, Nurse, J, Pike, B, Schultz, J
Format: Conference item
Published: IEEE 2013
_version_ 1797099873618624512
author Creese, S
Gibson−Robinson, T
Goldsmith, M
Hodges, D
Kim, D
Love, O
Nurse, J
Pike, B
Schultz, J
author_facet Creese, S
Gibson−Robinson, T
Goldsmith, M
Hodges, D
Kim, D
Love, O
Nurse, J
Pike, B
Schultz, J
author_sort Creese, S
collection OXFORD
description We present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to explore and understand the model, and to apply it to risk-exposure assessment activities for a particular individual, e.g. an influential person in the intelligence or government community, or a commercial company board member. It can also be used to understand critical capabilities in an organization's identity-attribution process, and so used to plan resource investment. The second tool, referred to as Identity Map, is designed to support investigations requiring enrichment of identities and the making of attributions. Both are currently working prototypes.
first_indexed 2024-03-07T05:29:50Z
format Conference item
id oxford-uuid:e1defe88-56e6-4d03-a1bc-725000c288b4
institution University of Oxford
last_indexed 2024-03-07T05:29:50Z
publishDate 2013
publisher IEEE
record_format dspace
spelling oxford-uuid:e1defe88-56e6-4d03-a1bc-725000c288b42022-03-27T09:57:12ZTools for understanding identityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:e1defe88-56e6-4d03-a1bc-725000c288b4Department of Computer ScienceIEEE2013Creese, SGibson−Robinson, TGoldsmith, MHodges, DKim, DLove, ONurse, JPike, BSchultz, JWe present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to explore and understand the model, and to apply it to risk-exposure assessment activities for a particular individual, e.g. an influential person in the intelligence or government community, or a commercial company board member. It can also be used to understand critical capabilities in an organization's identity-attribution process, and so used to plan resource investment. The second tool, referred to as Identity Map, is designed to support investigations requiring enrichment of identities and the making of attributions. Both are currently working prototypes.
spellingShingle Creese, S
Gibson−Robinson, T
Goldsmith, M
Hodges, D
Kim, D
Love, O
Nurse, J
Pike, B
Schultz, J
Tools for understanding identity
title Tools for understanding identity
title_full Tools for understanding identity
title_fullStr Tools for understanding identity
title_full_unstemmed Tools for understanding identity
title_short Tools for understanding identity
title_sort tools for understanding identity
work_keys_str_mv AT creeses toolsforunderstandingidentity
AT gibsonrobinsont toolsforunderstandingidentity
AT goldsmithm toolsforunderstandingidentity
AT hodgesd toolsforunderstandingidentity
AT kimd toolsforunderstandingidentity
AT loveo toolsforunderstandingidentity
AT nursej toolsforunderstandingidentity
AT pikeb toolsforunderstandingidentity
AT schultzj toolsforunderstandingidentity