Privacy and Identity Theft Recovery Planning: An Onion Skin Model

Tawfiq Alashoor, Richard Baskerville, Ruilin Zhu

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management.

Original languageEnglish
Title of host publicationProceedings of the 49th Hawaii International Conference on System Sciences (HICSS 2016)
EditorsTung X. Bui, Ralph H. Sprague
Number of pages10
Place of PublicationLos Alamitos, CA
PublisherIEEE
Publication date7 Mar 2016
Pages3696-3705
Article number7427645
ISBN (Print)9781479983896
ISBN (Electronic)9780769556703
DOIs
Publication statusPublished - 7 Mar 2016
Externally publishedYes
Event49th Annual Hawaii International Conference on System Sciences, HICSS 2016 - Kauai, Hawaii, United States
Duration: 5 Jan 20168 Jan 2016
Conference number: 49
http://www.hicss.org/

Conference

Conference49th Annual Hawaii International Conference on System Sciences, HICSS 2016
Number49
CountryUnited States
CityKauai, Hawaii
Period05/01/201608/01/2016
Internet address
SeriesProceedings of the Annual Hawaii International Conference on System Sciences
ISSN1060-3425

Keywords

  • Privacy
  • Fingerprint recognition
  • Skin
  • Iris recognition
  • Context
  • Security

Cite this