Privacy and identity theft recovery planning: An onion skin model

© 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity revea...

Full description

Bibliographic Details
Main Authors: Alashoor, T., Baskerville, Richard, Zhu, R.
Format: Conference Paper
Published: 2016
Online Access:http://hdl.handle.net/20.500.11937/53858
Description
Summary:© 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management.