Rights statement: (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works
Submitted manuscript, 568 KB, PDF document
Available under license: None
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Who am I? Analysing Digital Personas in Cybercrime Investigations
AU - Rashid, Awais
AU - Baron, Alistair
AU - Rayson, Paul
AU - May-Chahal, Corinne
AU - Greenwood, Phil
AU - Walkerdine, James
N1 - (c) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
PY - 2013/4
Y1 - 2013/4
N2 - Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigatorswith clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.
AB - Online cybercrime activities often involve criminals hiding behind multiple identities (so-called digital personas). Unraveling these multiple digital personas is a non-trivial problem owing to the large amounts of text communicated in online social media and the large numbers of digital personas involved. The cognitive load for cybercrime investigators is immense { existing tools lack the sophisticated capabilities required to analyse digital personas in order to provide investigatorswith clues to the identity of the individual or group hiding behind one or more personas. In this article, we present the Isis toolkit which addresses this very problem.
KW - computers and society
KW - computing milieu
KW - cybersecurity
UR - http://www.scopus.com/inward/record.url?scp=84876147292&partnerID=8YFLogxK
U2 - 10.1109/MC.2013.68
DO - 10.1109/MC.2013.68
M3 - Journal article
AN - SCOPUS:84876147292
VL - 46
SP - 54
EP - 61
JO - Computer
JF - Computer
SN - 0018-9162
IS - 4
ER -