Projects per year
We present a novel de-centralised service for proving the provenance of online digital identity, exposed as an assistive tool to help non-expert users make better decisions about whom to trust online. Our service harnesses the digital personhood (DP); the longitudinal and multi-modal signals created through users' lifelong digital interactions, as a basis for evidencing the provenance of identity. We describe how users may exchange trust evidence derived from their DP, in a granular and privacy-preserving manner, with other users in order to demonstrate coherence and longevity in their behaviour online. This is enabled through a novel secure infrastructure combining hybrid on- and off-chain storage combined with deep learning for DP analytics and visualization. We show how our tools enable users to make more effective decisions on whether to trust unknown third parties online, and also to spot behavioural deviations in their own social media footprints indicative of account hijacking.
|Number of pages||14|
|Journal||IEEE Transactions on Services Computing|
|Early online date||7 May 2020|
|Publication status||E-pub ahead of print - 7 May 2020|
- artificial intelligence
- decentralised trust
- interaction design
- online identity
FingerprintDive into the research topics of 'TAPESTRY: a de-centralized service for trusted interaction online'. Together they form a unique fingerprint.
- 1 Finished
1/01/17 → 30/09/20
A mixed methods approach to understanding funder trust and due diligence processes in online crowdfunding investmentJones, H. S. & Moncur, W., 29 Feb 2020, In: ACM Transactions on Social Computing. 3, 1, 29 p., 3.
Research output: Contribution to journal › Article › peer-reviewOpen AccessFile5 Downloads (Pure)
Yang, Y., Cooper, D., Collomosse, J., Drăgan, C. C., Manulis, M., Steane, J., Manohar, A., Briggs, J., Jones, H. & Moncur, W., 15 May 2019, Ithaca, N.Y., 13 p.
Research output: Working paperOpen AccessFile
Jones, H. S. & Moncur, W., 2018, Psychological and Behavioral Examinations in Cyber Security. p. 109-132 24 p.
Research output: Chapter in Book/Report/Conference proceeding › ChapterOpen AccessFile