Tools for understanding identity

We present two tools for analysing identity in support of homeland security. Both are based upon the Superi-dentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to explore and understand the model, and to apply it to risk-exposure assessment activities for a particular individual, e.g. an influential person in the intelligence or government community, or a commercial company board member. It can also be used to understand critical capabilities in an organization's identity-attribution process, and so used to plan resource investment. The second tool, referred to as Identity Map, is designed to support investigations requiring enrichment of identities and the making of attributions. Both are currently working prototypes.

[1]  D. Paulhus,et al.  The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy , 2002 .

[2]  E. Giles,et al.  Height estimation from foot and shoeprint length. , 1991, Journal of forensic sciences.

[3]  Sadie Creese,et al.  A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  A. Poropat A meta-analysis of the five-factor model of personality and academic performance. , 2009, Psychological bulletin.

[5]  Sadie Creese,et al.  A Model for Identity in the Cyber and Natural Universes , 2012, 2012 European Intelligence and Security Informatics Conference.

[6]  Sadie Creese,et al.  Building a better intelligence machine: A new approach to capability review and development , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[7]  Gregory J. Park,et al.  Predicting Dark Triad Personality Traits from Twitter Usage and a Linguistic Analysis of Tweets , 2012, 2012 11th International Conference on Machine Learning and Applications.