Duncan Hodges

Learn More
This paper reports current progress on the design and initial evaluation of an innovative privacy feedback system aimed to provide social network users with tailor-made feedback about their identity exposure online. Preliminary results suggest our feedback system, based on a research driven model of identity, appears to reduce the amount of information(More)
In this paper we describe a model for evaluating and investigating holistic identities across both the cyber- and natural-worlds. The model is taxonomy-agnostic and helps guide analysts through the creation of a rich super identity whilst also being flexible enough for users to deploy their intuition and experience. Super identities are created by iterative(More)
The large number of millimetre and microwave terrestrial links that are in operational use has lead to the development of techniques to estimate two-dimensional rainfall rate fields e.g., [1]. This paper outlines a reconstruction algorithm that can be used to estimate the rainfall field from a number of measurements of path attenuation on terrestrial links.(More)
In this paper we propose a new approach for managing capability within organisations that are engaged in identity-attribution or identity-enrichment exercises. Specifically, we believe that a modelling framework which uses a bottom-up data-driven approach encapsulates the most appropriate abstraction of capability. In particular, that this should be(More)
The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographical and cyber elements also are necessary to complete the picture. Law enforcement is beginning to adjust to these changes, recognizing identity’s(More)
The use of Big Data technologies and analytics have the potential to revolutionise the world. The mass instrumentation of the planet and society is providing intelligence that is not only enhancing our personal lives, but also opening up new opportunities for addressing some of key environmental, social and economic challenges of the 21st century.(More)
We present two tools for analysing identity in support of homeland security. Both are based upon the Superi-dentity model that brings together cyber and physical spaces into a single understanding of identity. Between them, the tools provide support for defensive, information gathering and capability planning operations. The first tool allows an analyst to(More)
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of(More)