US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem

@article{Rana2018USCentricVI,
  title={US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem},
  author={Rima Rana and Razieh Nokhbeh Zaeem and K. Suzanne Barber},
  journal={2018 International Carnahan Conference on Security Technology (ICCST)},
  year={2018},
  pages={1-5}
}
Personally Identifiable Information (PII) refers to any information that can be used to trace or identify an individual. A Javelin Strategy and Research Report stated that PII misuse and fraud hits record high with 15.4 million US victims in 2016, about 16% more than the previous year. A comprehensive analysis of PII attributes and their relationships is necessary to protect users from identity theft. However, identity theft and fraud are not just a US problem. According to a new report from… 

Figures and Tables from this paper

An Identity Asset Sensitivity Model in Self-Sovereign Identities

This research proposes a model of determining PII sensitivity by a score to measure what attributes or combination thereof is sensitive to share and highlights that while it is important to improve how PII attributes are shared, it is paramount to identify which P II attributes are safer to share to achieve the same identity management goals.

Personal Data Early Warning System: Machine Learning Models Extract Identity Theft and Fraud Trends from News

The PDEWS system stands as a novel approach to analyzing cyber threat trends via online news while delivering threat mitigation recommendations based on best practices and specifically highlights PII used to gain access, PII stolen as a result, and the steps and tactics used in between, to shed light on the interdependent nature of identity theft and fraud.

An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication

The Identity Ecosystem model, based on real world data of about 6,000 identity theft and fraud stories, recommends some authentication choices and discourages others, paving the way for a truly effective identity solution based on blockchain.

A Survival Game Analysis to Personal Identity Protection Strategies

A reinforcement learning algorithm is proposed for solving the optimal strategy to protect the user’s identity against a malicious and efficient attacker to understand the evolutionary process of identity under attack.

A Survival Game Analysis to Common Personal Identity Protection Strategies

A reinforcement learning algorithm is proposed for solving the optimal strategy to protect the user's identity against a malicious and efficient attacker to understand the evolutionary process of identity under attack.

How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft

This work is the first work to study the actual, large-scale impact of using blockchain for identity management, particularly how it can protect Personally Identifiable Information (PII) to curb identity theft and fraud.

Proactive Identity Knowledge and Mitigation System

The technical details of I-WARN are discussed, current solutions for threat intelligence sharing with how they compare to I- WARN, and future work are discussed.

A Framework for Estimating Privacy Risk Scores of Mobile Apps

This work calculates the privacy risk of over 600 PII attributes through a longitudinal study of over 20 years of identity theft and fraud news reporting, and maps the access rights and privacy policies of each smart application to the authors' dataset of PII to analyze what PII the application collects.

Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings

Two variants of Cocks’ identity-based encryption are developed, one of which has faster encryption, where the most time-consuming part only requires several modular multiplications, and the other makes the first variant anonymous under suitable complexity assumptions.

Business Information Systems Workshops: BIS 2020 International Workshops, Colorado Springs, CO, USA, June 8–10, 2020, Revised Selected Papers

The quantitative assessment of maritime data quality is presented, if the real data meets data quality standards and detects what are the most common quality issues, and a potential stemming from utilization of Big Data technologies in a process of data quality assessment is shown.

References

Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes

This paper presents the mathematical representation and implementation of a model of Personally Identifiable Information attributes for people, named Identity Ecosystem, and uses Gibb's Sampling to approximate the posteriors in the model.