Privacy and identity theft recovery planning: An onion skin model

© 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity revea...

Full description

Bibliographic Details
Main Authors: Alashoor, T., Baskerville, Richard, Zhu, R.
Format: Conference Paper
Published: 2016
Online Access:http://hdl.handle.net/20.500.11937/53858
_version_ 1848759244890832896
author Alashoor, T.
Baskerville, Richard
Zhu, R.
author_facet Alashoor, T.
Baskerville, Richard
Zhu, R.
author_sort Alashoor, T.
building Curtin Institutional Repository
collection Online Access
description © 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management.
first_indexed 2025-11-14T09:56:49Z
format Conference Paper
id curtin-20.500.11937-53858
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T09:56:49Z
publishDate 2016
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-538582017-09-13T15:47:53Z Privacy and identity theft recovery planning: An onion skin model Alashoor, T. Baskerville, Richard Zhu, R. © 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management. 2016 Conference Paper http://hdl.handle.net/20.500.11937/53858 10.1109/HICSS.2016.461 restricted
spellingShingle Alashoor, T.
Baskerville, Richard
Zhu, R.
Privacy and identity theft recovery planning: An onion skin model
title Privacy and identity theft recovery planning: An onion skin model
title_full Privacy and identity theft recovery planning: An onion skin model
title_fullStr Privacy and identity theft recovery planning: An onion skin model
title_full_unstemmed Privacy and identity theft recovery planning: An onion skin model
title_short Privacy and identity theft recovery planning: An onion skin model
title_sort privacy and identity theft recovery planning: an onion skin model
url http://hdl.handle.net/20.500.11937/53858