Show simple item record

dc.contributor.authorAlashoor, T.
dc.contributor.authorBaskerville, Richard
dc.contributor.authorZhu, R.
dc.date.accessioned2017-06-23T03:01:34Z
dc.date.available2017-06-23T03:01:34Z
dc.date.created2017-06-19T03:39:27Z
dc.date.issued2016
dc.identifier.citationAlashoor, T. and Baskerville, R. and Zhu, R. 2016. Privacy and identity theft recovery planning: An onion skin model, 49th Annual Hawaii International Conference on System Sciences, HICSS 2016, pp. 3696-3705.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/53858
dc.identifier.doi10.1109/HICSS.2016.461
dc.description.abstract

© 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management.

dc.titlePrivacy and identity theft recovery planning: An onion skin model
dc.typeConference Paper
dcterms.source.volume2016-March
dcterms.source.startPage3696
dcterms.source.endPage3705
dcterms.source.titleProceedings of the Annual Hawaii International Conference on System Sciences
dcterms.source.seriesProceedings of the Annual Hawaii International Conference on System Sciences
dcterms.source.isbn9780769556703
dcterms.source.conference49th Annual Hawaii International Conference on System Sciences, HICSS 2016
curtin.departmentSchool of Information Systems
curtin.accessStatusFulltext not available


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record