Tools for understanding identity
We present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability...
Main Authors: | , , , , , , , , |
---|---|
Format: | Conference item |
Published: |
IEEE
2013
|
_version_ | 1797099873618624512 |
---|---|
author | Creese, S Gibson−Robinson, T Goldsmith, M Hodges, D Kim, D Love, O Nurse, J Pike, B Schultz, J |
author_facet | Creese, S Gibson−Robinson, T Goldsmith, M Hodges, D Kim, D Love, O Nurse, J Pike, B Schultz, J |
author_sort | Creese, S |
collection | OXFORD |
description | We present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to explore and understand the model, and to apply it to risk-exposure assessment activities for a particular individual, e.g. an influential person in the intelligence or government community, or a commercial company board member. It can also be used to understand critical capabilities in an organization's identity-attribution process, and so used to plan resource investment. The second tool, referred to as Identity Map, is designed to support investigations requiring enrichment of identities and the making of attributions. Both are currently working prototypes. |
first_indexed | 2024-03-07T05:29:50Z |
format | Conference item |
id | oxford-uuid:e1defe88-56e6-4d03-a1bc-725000c288b4 |
institution | University of Oxford |
last_indexed | 2024-03-07T05:29:50Z |
publishDate | 2013 |
publisher | IEEE |
record_format | dspace |
spelling | oxford-uuid:e1defe88-56e6-4d03-a1bc-725000c288b42022-03-27T09:57:12ZTools for understanding identityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:e1defe88-56e6-4d03-a1bc-725000c288b4Department of Computer ScienceIEEE2013Creese, SGibson−Robinson, TGoldsmith, MHodges, DKim, DLove, ONurse, JPike, BSchultz, JWe present two tools for analysing identity in support of homeland security. Both are based upon the Superidentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to explore and understand the model, and to apply it to risk-exposure assessment activities for a particular individual, e.g. an influential person in the intelligence or government community, or a commercial company board member. It can also be used to understand critical capabilities in an organization's identity-attribution process, and so used to plan resource investment. The second tool, referred to as Identity Map, is designed to support investigations requiring enrichment of identities and the making of attributions. Both are currently working prototypes. |
spellingShingle | Creese, S Gibson−Robinson, T Goldsmith, M Hodges, D Kim, D Love, O Nurse, J Pike, B Schultz, J Tools for understanding identity |
title | Tools for understanding identity |
title_full | Tools for understanding identity |
title_fullStr | Tools for understanding identity |
title_full_unstemmed | Tools for understanding identity |
title_short | Tools for understanding identity |
title_sort | tools for understanding identity |
work_keys_str_mv | AT creeses toolsforunderstandingidentity AT gibsonrobinsont toolsforunderstandingidentity AT goldsmithm toolsforunderstandingidentity AT hodgesd toolsforunderstandingidentity AT kimd toolsforunderstandingidentity AT loveo toolsforunderstandingidentity AT nursej toolsforunderstandingidentity AT pikeb toolsforunderstandingidentity AT schultzj toolsforunderstandingidentity |