Privacy and identity theft recovery planning: An onion skin model
© 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity revea...
| Main Authors: | , , |
|---|---|
| Format: | Conference Paper |
| Published: |
2016
|
| Online Access: | http://hdl.handle.net/20.500.11937/53858 |
| _version_ | 1848759244890832896 |
|---|---|
| author | Alashoor, T. Baskerville, Richard Zhu, R. |
| author_facet | Alashoor, T. Baskerville, Richard Zhu, R. |
| author_sort | Alashoor, T. |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | © 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management. |
| first_indexed | 2025-11-14T09:56:49Z |
| format | Conference Paper |
| id | curtin-20.500.11937-53858 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T09:56:49Z |
| publishDate | 2016 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-538582017-09-13T15:47:53Z Privacy and identity theft recovery planning: An onion skin model Alashoor, T. Baskerville, Richard Zhu, R. © 2016 IEEE.Identity protection is currently limited to preventative measures and monitoring. Recovery from identity theft is a difficult, protracted, and messy process. Much of the current work views individual identity as a singular, natural element. An in depth analysis of personal identity reveals a person's identity to be polymorphic and socially constructed. Capitalizing on the social view of identity exposes management techniques, like identity backups, to better enable personal identity recovery in the event of theft or disaster. Vignettes and examples illustrate principles for personal identity recovery management. 2016 Conference Paper http://hdl.handle.net/20.500.11937/53858 10.1109/HICSS.2016.461 restricted |
| spellingShingle | Alashoor, T. Baskerville, Richard Zhu, R. Privacy and identity theft recovery planning: An onion skin model |
| title | Privacy and identity theft recovery planning: An onion skin model |
| title_full | Privacy and identity theft recovery planning: An onion skin model |
| title_fullStr | Privacy and identity theft recovery planning: An onion skin model |
| title_full_unstemmed | Privacy and identity theft recovery planning: An onion skin model |
| title_short | Privacy and identity theft recovery planning: An onion skin model |
| title_sort | privacy and identity theft recovery planning: an onion skin model |
| url | http://hdl.handle.net/20.500.11937/53858 |