Discovering identity problems: A case study

Alan G. Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science
EditorsP. Kantor, G. Muresan, F. Roberts, D.D. Zeng, F.-Y. Wang, H. Chen, R.C. Merkle
Pages368-373
Number of pages6
Volume3495
StatePublished - 2005
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2005 - Atlanta, GA, United States
Duration: May 19 2005May 20 2005

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2005
CountryUnited States
CityAtlanta, GA
Period5/19/055/20/05

Fingerprint

Law enforcement
Crime
Taxonomies
Information technology
Information systems

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Wang, A. G., Atabakhsh, H., Petersen, T., & Chen, H. (2005). Discovering identity problems: A case study. In P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F-Y. Wang, H. Chen, & R. C. Merkle (Eds.), Lecture Notes in Computer Science (Vol. 3495, pp. 368-373)

Discovering identity problems : A case study. / Wang, Alan G.; Atabakhsh, Homa; Petersen, Tim; Chen, Hsinchun.

Lecture Notes in Computer Science. ed. / P. Kantor; G. Muresan; F. Roberts; D.D. Zeng; F.-Y. Wang; H. Chen; R.C. Merkle. Vol. 3495 2005. p. 368-373.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wang, AG, Atabakhsh, H, Petersen, T & Chen, H 2005, Discovering identity problems: A case study. in P Kantor, G Muresan, F Roberts, DD Zeng, F-Y Wang, H Chen & RC Merkle (eds), Lecture Notes in Computer Science. vol. 3495, pp. 368-373, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, United States, 5/19/05.
Wang AG, Atabakhsh H, Petersen T, Chen H. Discovering identity problems: A case study. In Kantor P, Muresan G, Roberts F, Zeng DD, Wang F-Y, Chen H, Merkle RC, editors, Lecture Notes in Computer Science. Vol. 3495. 2005. p. 368-373
Wang, Alan G. ; Atabakhsh, Homa ; Petersen, Tim ; Chen, Hsinchun. / Discovering identity problems : A case study. Lecture Notes in Computer Science. editor / P. Kantor ; G. Muresan ; F. Roberts ; D.D. Zeng ; F.-Y. Wang ; H. Chen ; R.C. Merkle. Vol. 3495 2005. pp. 368-373
@inproceedings{c336e1ad0f194154a950705f65800a73,
title = "Discovering identity problems: A case study",
abstract = "Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5{\%}) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30{\%} of the suspects had used a false identity (i.e., intentional deception), while 42{\%} had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.",
author = "Wang, {Alan G.} and Homa Atabakhsh and Tim Petersen and Hsinchun Chen",
year = "2005",
language = "English (US)",
volume = "3495",
pages = "368--373",
editor = "P. Kantor and G. Muresan and F. Roberts and D.D. Zeng and F.-Y. Wang and H. Chen and R.C. Merkle",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - Discovering identity problems

T2 - A case study

AU - Wang, Alan G.

AU - Atabakhsh, Homa

AU - Petersen, Tim

AU - Chen, Hsinchun

PY - 2005

Y1 - 2005

N2 - Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.

AB - Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.

UR - http://www.scopus.com/inward/record.url?scp=24944486007&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944486007&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:24944486007

VL - 3495

SP - 368

EP - 373

BT - Lecture Notes in Computer Science

A2 - Kantor, P.

A2 - Muresan, G.

A2 - Roberts, F.

A2 - Zeng, D.D.

A2 - Wang, F.-Y.

A2 - Chen, H.

A2 - Merkle, R.C.

ER -