David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Artificial Intelligence and Law 18 (1):77-102 (2010)
Combating the identity problem is crucial and urgent as false identity has become a common denominator of many serious crimes, including mafia trafficking and terrorism. Without correct identification, it is very difficult for law enforcement authority to intervene, or even trace terrorists’ activities. Amongst several identity attributes, personal names are commonly, and effortlessly, falsified or aliased by most criminals. Typical approaches to detecting the use of false identity rely on the similarity measure of textual and other content-based characteristics, which are usually not applicable in the case of highly deceptive, erroneous and unknown descriptions. This barrier can be overcome through analysis of link information displayed by the individual in communication behaviours, financial interactions and social networks. In particular, this paper presents a novel link-based approach that improves existing techniques by integrating multiple link properties in the process of similarity evaluation. It is utilised in a hybrid model that proficiently combines both text-based and link-based measures of examined names to refine the justification of their similarity. This approach is experimentally evaluated against other link-based and text-based techniques, over a terrorist-related dataset, with further generalization to a similar problem occurring in publication databases. The empirical study demonstrates the great potential of this work towards developing an effective identity verification system.
|Keywords||False identity detection Hybrid algorithm Link analysis Terrorist data|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
Kevin D. Ashley & Stefanie Brüninghaus (2009). Automatically Classifying Case Texts and Predicting Outcomes. Artificial Intelligence and Law 17 (2):125-165.
Lothar Philipps & Giovanni Sartor (1999). Introduction: From Legal Theories to Neural Networks and Fuzzy Reasoning. [REVIEW] Artificial Intelligence and Law 7 (2-3):115-128.
Anja Oskamp & Marc Lauritsen (2002). AI in Law Practice? So Far, Not Much. Artificial Intelligence and Law 10 (4):227-236.
Lofti A. Zadeh (1965). Fuzzy Sets. Information and Control 8 (1):338--53.
Citations of this work BETA
No citations found.
Similar books and articles
Marya Schechtman (2010). Memory and Identity. Philosophical Studies 153 (1):65-79.
Michael Quante (1999). Precedent Autonomy and Personal Identity. Kennedy Institute of Ethics Journal 9 (4):365-381.
Fernando Aguiar, Pablo Brañas-Garza, Maria Paz Espinosa & Luis M. Miller (2010). Personal Identity: A Theoretical and Experimental Analysis. Journal of Economic Methodology 17 (3):261-275.
Rachel Robison (2009). Shape Shifting and Time Traveling : Link's Identity Issues. In Luke Cuddy (ed.), The Legend of Zelda and Philosophy: I Link Thereforei Am. Open Court
Roland Breeur & Arnold Burms (2008). Persons and Relics. Ratio 21 (2):134–146.
Fran Hagstrom (2005). Creating Creative Identity. Inquiry 24 (4):19-28.
Dan Klein & Christopher D. Manning, Interpreting and Extending Classical Agglomerative Clustering Algorithms Using a Model-Based Approach.
Mordecai Nisan (1996). Personal Identity and Education for the Desirable. Journal of Moral Education 25 (1):75-83.
Added to index2010-03-01
Total downloads8 ( #276,630 of 1,727,288 )
Recent downloads (6 months)5 ( #147,227 of 1,727,288 )
How can I increase my downloads?