Home > Research > Publications & Outputs > Who am I? Analysing Digital Personas in Cybercr...

Electronic data

  • Paper

    Rights statement: (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works

    Submitted manuscript, 568 KB, PDF document

    Available under license: None

Links

Text available via DOI:

View graph of relations

Who am I? Analysing Digital Personas in Cybercrime Investigations

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Who am I? Analysing Digital Personas in Cybercrime Investigations. / Rashid, Awais; Baron, Alistair; Rayson, Paul et al.
In: Computer, Vol. 46, No. 4, 04.2013, p. 54-61.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Rashid A, Baron A, Rayson P, May-Chahal C, Greenwood P, Walkerdine J. Who am I? Analysing Digital Personas in Cybercrime Investigations. Computer. 2013 Apr;46(4):54-61. doi: 10.1109/MC.2013.68

Author

Bibtex

@article{07acd9459ad74eeaa6ea756f739ad341,
title = "Who am I? Analysing Digital Personas in Cybercrime Investigations",
abstract = "Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigatorswith clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.",
keywords = "computers and society, computing milieu, cybersecurity",
author = "Awais Rashid and Alistair Baron and Paul Rayson and Corinne May-Chahal and Phil Greenwood and James Walkerdine",
note = "(c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.",
year = "2013",
month = apr,
doi = "10.1109/MC.2013.68",
language = "English",
volume = "46",
pages = "54--61",
journal = "Computer",
issn = "0018-9162",
publisher = "IEEE COMPUTER SOC",
number = "4",

}

RIS

TY - JOUR

T1 - Who am I? Analysing Digital Personas in Cybercrime Investigations

AU - Rashid, Awais

AU - Baron, Alistair

AU - Rayson, Paul

AU - May-Chahal, Corinne

AU - Greenwood, Phil

AU - Walkerdine, James

N1 - (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

PY - 2013/4

Y1 - 2013/4

N2 - Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigatorswith clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.

AB - Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigatorswith clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.

KW - computers and society

KW - computing milieu

KW - cybersecurity

UR - http://www.scopus.com/inward/record.url?scp=84876147292&partnerID=8YFLogxK

U2 - 10.1109/MC.2013.68

DO - 10.1109/MC.2013.68

M3 - Journal article

AN - SCOPUS:84876147292

VL - 46

SP - 54

EP - 61

JO - Computer

JF - Computer

SN - 0018-9162

IS - 4

ER -