1,494
views
0
recommends
+1 Recommend
1 collections
    21
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Digital Footprints: Your Unique Identity

      proceedings-article
      , ,
      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)
      Human Computer Interaction Conference
      4 - 6 July 2018
      Identity, Authentication, Digital Footprint, Privacy, Security
      Bookmark

            Abstract

            In the digital age where Human Computer Interaction is creating large and entirely unique digital footprints, online accounts and activities can prove to be a valuable source of information that may contribute to verification that an asserted identity is genuine. Online social contextual data – or ‘Digital identities’ -- pertaining to real people are built over time and bolstered by associated accounts, relationships and attributes. This data is difficult to fake and therefore may have the capacity to provide proof of a ‘real’ identity. This paper outlines the design and initial development of a solution that utilizes data sourced from an individual’s digital footprint to assess the likelihood that it pertains to a ‘real’ identity. This is achieved through application of machine learning and Bayesian probabilistic modelling techniques.

            Content

            Author and article information

            Contributors
            Conference
            July 2018
            July 2018
            : 1-5
            Affiliations
            [0001]University of Ulster

            Derry, Northern Ireland, UK

            boyle-j2@ulster.ac.uk
            Article
            10.14236/ewic/HCI2018.173
            b183e202-588f-4795-b95f-0835e3de5f70
            © Blue et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            HCI
            32
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2018.173
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Identity,Privacy,Authentication,Security,Digital Footprint

            REFERENCES

            1. “Bayesian Theory” John Wiley & Sons Chichester 2000

            2. “My digital footprint” AMF Ventures Limited, Futuretext London 2009

            3. “Bayesian techniques for location estimation” Proceedings of the 2003 Workshop on Location-Aware Computing 16 Seattle Washington, USA 2003

            4. “Digital footprints and changing networks during online identity transitions ” institutionDept of Infomatics, University of California, Irvine, CA Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 2895 2907 San Jose, CA 2016

            5. , “The 9/11 Commission Report” 2004 URL: http://govinfo.library.unt.edu/911/report/index.htm

            6. “Frameworks for entity matching: a comparison” Data Knowledge Eng 69 197 210 2010

            7. “Identity matching using personal and social identity features” Information Systems Frontier 13 101 113 2010

            8. “AR is on the verge of transforming the human-computer relationship” VB October 2017 URL: http://venturebeat.com/2017/10/30/ar-is-on-the-verge-of-transforming-the-human-computer-relationship/

            9. “The use of the dark web for the purpose of illegal activity spreading” ЕКОНОМИКА 63 January-March 2017

            10. “Identity: Personal AND Social” institutionUniversity of Sussex, Oxford Handbook of Personality and Social Psychology Second Oxford University Press London 2017

            11. “Automatically detecting criminal identity deception: an adaptive detection algorithm” IEEE Transport Systems Management, Part A-Systems Humans 36 988 999 2006

            12. “Probability” Mathworld, Wolfram Alpha 2017 URL: http://mathworld.wolfram.com/Probability.html

            13. “Model relationship strength in social networks” institutionPurdue University West Lafayette, IN Proceedings of the 19th international conference on World wide web 981 990 Raleigh, NC 2010

            Comments

            Comment on this article