Home > Research > Publications & Outputs > Who am I? Analysing Digital Personas in Cybercr...

Electronic data

  • Paper

    Rights statement: (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works

    Submitted manuscript, 568 KB, PDF document

    Available under license: None

Links

Text available via DOI:

View graph of relations

Who am I? Analysing Digital Personas in Cybercrime Investigations

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
<mark>Journal publication date</mark>04/2013
<mark>Journal</mark>Computer
Issue number4
Volume46
Number of pages8
Pages (from-to)54-61
Publication StatusPublished
<mark>Original language</mark>English

Abstract

Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigators
with clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.

Bibliographic note

(c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.