Duncan Hodges

Learn More
This paper reports current progress on the design and initial evaluation of an innovative privacy feedback system aimed to provide social network users with tailor-made feedback about their identity exposure online. Preliminary results suggest our feedback system, based on a research driven model of identity, appears to reduce the amount of information(More)
In this paper we describe a model for evaluating and investigating holistic identities across both the cyber- and natural-worlds. The model is taxonomy-agnostic and helps guide analysts through the creation of a rich super identity whilst also being flexible enough for users to deploy their intuition and experience. Super identities are created by iterative(More)
The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographical and cyber elements also are necessary to complete the picture. Law enforcement is beginning to adjust to these changes, recognizing identity’s(More)
The use of Big Data technologies and analytics have the potential to revolutionise the world. The mass instrumentation of the planet and society is providing intelligence that is not only enhancing our personal lives, but also opening up new opportunities for addressing some of key environmental, social and economic challenges of the 21st century.(More)
In this paper we propose a new approach for managing capability within organisations that are engaged in identity-attribution or identity-enrichment exercises. Specifically, we believe that a modelling framework which uses a bottom-up data-driven approach encapsulates the most appropriate abstraction of capability. In particular, that this should be(More)
The large number of millimetre and microwave terrestrial links that are in operational use has lead to the development of techniques to estimate two-dimensional rainfall rate fields e.g., [1]. This paper outlines a reconstruction algorithm that can be used to estimate the rainfall field from a number of measurements of path attenuation on terrestrial links.(More)
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of(More)
Over the last decade, the popularity of graphical passwords has increased tremendously. They can now be found on various devices and systems, including platforms such as the Windows 8 and Android operating systems. In this paper, we focus on the PassPoints graphical-password scheme and investigate the extent to which these passwords might be predicted based(More)