Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 3495))
Included in the following conference series:
4173Accesses
Abstract
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Clarke, R.: Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information Technology & People 7(4), 6–37 (1994)
Donath, J.S.: Identity and Deception in the Virtual Community. In: Smith, M.a.K.P. (ed.) Communities in Cyberspace. Routledge, London (1998)
GAO: Law Enforcement: Information on Timeliness of Criminal Fingerprint Submissions to the FBI. GAO-04-260, United States General Accounting Office (GAO) (2004)
HomeOffice, U. K.: Identity Fraud: A Study. United Kingdom HomeOffice (2002)
Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: A fingerbank for fingerprint presentation and matching. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (1999)
Levenshtein, V.L.: Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet Physics Doklady 10, 707–710 (1966)
Wang, G., Chen, H., Atabakhsh, H.: Automatically Detecting Deceptive Criminal Identities. Communications of the ACM 47(3), 71–76 (2004)
Author information
Authors and Affiliations
Department of Management Information Systems, University of Arizona, Tucson, AZ, 85721
Alan G. Wang, Homa Atabakhsh & Hsinchun Chen
Tucson Police Department, Tucson, AZ, 85701
Tim Petersen
- Alan G. Wang
You can also search for this author inPubMed Google Scholar
- Homa Atabakhsh
You can also search for this author inPubMed Google Scholar
- Tim Petersen
You can also search for this author inPubMed Google Scholar
- Hsinchun Chen
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Department of Library and Information Science, Rutgers University,
Paul Kantor
School of Communication, Information and Library Studies, Rutgers University, 4 Huntington Street, 08901-1071, New Brunswick, NJ, USA
Gheorghe Muresan
Artificial Solutions, Altonaer Poststraße 13b, 22767, Hamburg, Germany
Fred Roberts
MIS Department, University of Arizona, 85721, Tucson, AZ, USA
Daniel D. Zeng
Institute of Automation, Chinese Academy of Sciences, Beijing, China
Fei-Yue Wang
Department of Management Information Systems, Eller College of Management, The University of Arizona, 85721, AZ, USA
Hsinchun Chen
College of Computing, Georgia Tech Information Security Center, Georgia Institute of Technology, 801 Atlantic Drive, 30332-0280, Atlanta, GA, USA
Ralph C. Merkle
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, A.G., Atabakhsh, H., Petersen, T., Chen, H. (2005). Discovering Identity Problems: A Case Study. In: Kantor, P.,et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_30
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-25999-2
Online ISBN:978-3-540-32063-0
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative