US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem

@article{Rana2018USCentricVI,
  title={US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem},
  author={Rima Rana and Razieh Nokhbeh Zaeem and K. Suzanne Barber},
  journal={2018 International Carnahan Conference on Security Technology (ICCST)},
  year={2018},
  pages={1-5}
}
Personally Identifiable Information (PII) refers to any information that can be used to trace or identify an individual. A Javelin Strategy and Research Report stated that PII misuse and fraud hits record high with 15.4 million US victims in 2016, about 16% more than the previous year. A comprehensive analysis of PII attributes and their relationships is necessary to protect users from identity theft. However, identity theft and fraud are not just a US problem. According to a new report from… 
An Identity Asset Sensitivity Model in Self-Sovereign Identities
Due to the emergence of new paradigms such as social media and the Internet of Things (IoT), the use of the Internet has ushered in further challenges. After years of research, there is still no
Personal Data Early Warning System: Machine Learning Models Extract Identity Theft and Fraud Trends from News
Each year, cyber attacks pose a greater and greater risk to consumer personal information stored by corporations and government agencies. Billions of consumer records are breached each year and data
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
TLDR
The Identity Ecosystem model, based on real world data of about 6,000 identity theft and fraud stories, recommends some authentication choices and discourages others, paving the way for a truly effective identity solution based on blockchain.
A Survival Game Analysis to Personal Identity Protection Strategies
TLDR
A reinforcement learning algorithm is proposed for solving the optimal strategy to protect the user’s identity against a malicious and efficient attacker to understand the evolutionary process of identity under attack.
A Survival Game Analysis to Common Personal Identity Protection Strategies
Throughout the years, authentication processes of individuals’ identities have become essential parts of our modern daily life. These authentication processes also introduced the heavy use of
How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft
TLDR
This work is the first work to study the actual, large-scale impact of using blockchain for identity management, particularly how it can protect Personally Identifiable Information (PII) to curb identity theft and fraud.
A Framework for Estimating Privacy Risk Scores of Mobile Apps
TLDR
This work calculates the privacy risk of over 600 PII attributes through a longitudinal study of over 20 years of identity theft and fraud news reporting, and maps the access rights and privacy policies of each smart application to the authors' dataset of PII to analyze what PII the application collects.
Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings
TLDR
Two variants of Cocks’ identity-based encryption are developed, one of which has faster encryption, where the most time-consuming part only requires several modular multiplications, and the other makes the first variant anonymous under suitable complexity assumptions.
Business Information Systems Workshops: BIS 2020 International Workshops, Colorado Springs, CO, USA, June 8–10, 2020, Revised Selected Papers
TLDR
The quantitative assessment of maritime data quality is presented, if the real data meets data quality standards and detects what are the most common quality issues, and a potential stemming from utilization of Big Data technologies in a process of data quality assessment is shown.

References

Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
TLDR
This paper presents the mathematical representation and implementation of a model of Personally Identifiable Information attributes for people, named Identity Ecosystem, and uses Gibb's Sampling to approximate the posteriors in the model.