Duncan Hodges

  • Citations Per Year
Learn More
This paper reports current progress on the design and initial evaluation of an innovative privacy feedback system aimed to provide social network users with tailor-made feedback about their identity exposure online. Preliminary results suggest our feedback system, based on a research driven model of identity, appears to reduce the amount of information(More)
In this paper we describe a model for evaluating and investigating holistic identities across both the cyber- and natural-worlds. The model is taxonomy-agnostic and helps guide analysts through the creation of a rich super identity whilst also being flexible enough for users to deploy their intuition and experience. Super identities are created by iterative(More)
In this paper we propose a new approach for managing capability within organisations that are engaged in identity-attribution or identity-enrichment exercises. Specifically, we believe that a modelling framework which uses a bottom-up data-driven approach encapsulates the most appropriate abstraction of capability. In particular, that this should be(More)
The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographical and cyber elements also are necessary to complete the picture. Law enforcement is beginning to adjust to these changes, recognizing identity’s(More)
The use of Big Data technologies and analytics have the potential to revolutionise the world. The mass instrumentation of the planet and society is providing intelligence that is not only enhancing our personal lives, but also opening up new opportunities for addressing some of key environmental, social and economic challenges of the 21st century.(More)
The large number of millimetre and microwave terrestrial links that are in operational use has lead to the development of techniques to estimate two-dimensional rainfall rate fields e.g., [1]. This paper outlines a reconstruction algorithm that can be used to estimate the rainfall field from a number of measurements of path attenuation on terrestrial links.(More)
We present two tools for analysing identity in support of homeland security. Both are based upon the Superi-dentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to(More)
Over the last decade, the popularity of graphical passwords has increased tremendously. They can now be found on various devices and systems, including platforms such as the Windows 8 and Android operating systems. In this paper, we focus on the PassPoints graphicalpassword scheme and investigate the extent to which these passwords might be predicted based(More)
The use of smartphones is becoming ubiquitous in modern society, these very personal devices store large amounts of personal information and we use these devices to access everything from our bank to our social networks, we communicate using these devices in both open one-to-many communications and in more closed, private one-toone communications. In this(More)