Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Discovering Identity Problems: A Case Study

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Clarke, R.: Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information Technology & People 7(4), 6–37 (1994)

    Article  Google Scholar 

  2. Donath, J.S.: Identity and Deception in the Virtual Community. In: Smith, M.a.K.P. (ed.) Communities in Cyberspace. Routledge, London (1998)

    Google Scholar 

  3. GAO: Law Enforcement: Information on Timeliness of Criminal Fingerprint Submissions to the FBI. GAO-04-260, United States General Accounting Office (GAO) (2004)

    Google Scholar 

  4. HomeOffice, U. K.: Identity Fraud: A Study. United Kingdom HomeOffice (2002)

    Google Scholar 

  5. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: A fingerbank for fingerprint presentation and matching. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (1999)

    Google Scholar 

  6. Levenshtein, V.L.: Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet Physics Doklady 10, 707–710 (1966)

    MathSciNet  Google Scholar 

  7. Wang, G., Chen, H., Atabakhsh, H.: Automatically Detecting Deceptive Criminal Identities. Communications of the ACM 47(3), 71–76 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Management Information Systems, University of Arizona, Tucson, AZ, 85721

    Alan G. Wang, Homa Atabakhsh & Hsinchun Chen

  2. Tucson Police Department, Tucson, AZ, 85701

    Tim Petersen

Authors
  1. Alan G. Wang

    You can also search for this author inPubMed Google Scholar

  2. Homa Atabakhsh

    You can also search for this author inPubMed Google Scholar

  3. Tim Petersen

    You can also search for this author inPubMed Google Scholar

  4. Hsinchun Chen

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Library and Information Science, Rutgers University,  

    Paul Kantor

  2. School of Communication, Information and Library Studies, Rutgers University, 4 Huntington Street, 08901-1071, New Brunswick, NJ, USA

    Gheorghe Muresan

  3. Artificial Solutions, Altonaer Poststraße 13b, 22767, Hamburg, Germany

    Fred Roberts

  4. MIS Department, University of Arizona, 85721, Tucson, AZ, USA

    Daniel D. Zeng

  5. Institute of Automation, Chinese Academy of Sciences, Beijing, China

    Fei-Yue Wang

  6. Department of Management Information Systems, Eller College of Management, The University of Arizona, 85721, AZ, USA

    Hsinchun Chen

  7. College of Computing, Georgia Tech Information Security Center, Georgia Institute of Technology, 801 Atlantic Drive, 30332-0280, Atlanta, GA, USA

    Ralph C. Merkle

Rights and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, A.G., Atabakhsh, H., Petersen, T., Chen, H. (2005). Discovering Identity Problems: A Case Study. In: Kantor, P.,et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_30

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp