IDEAS home Printed from https://ideas.repec.org/h/spr/sprchp/978-981-15-2248-2_7.html
   My bibliography  Save this book chapter

Identity Deception

In: Digital Transformation of Identity in the Age of Artificial Intelligence

Author

Listed:
  • Kazuhiko Shibuya

    (Tokyo Metropolitan University, Faculty of System Design)

Abstract

This chapter deals with identity deception. How do those who pretend to someone detect by appropriate ways? How to detect deceptive communications among numerous participants in security context? It is always one of the old and new problems in computer security (e.g., verification on counterfactual data, monitoring, detection, authentication, and protection). In this chapter, the author mainly takes up some cases. First issue is to design a mathematical model on anomaly detections in mutual communications among participants in the larger networking. Scoring services driven by the AI have been focused on daily activities to measure each digitized score of the citizens on the bases of their honesty and other dispositions. And blockchain distributed networking ought to serve mutual monitoring and detection mechanisms among multiple participants. Secondly, such deceptive behavior can be refined as a problem on social intelligence of the human for adaptations. Finally, deceptive technology on generative adversarial machine learning should be discussed.

Suggested Citation

  • Kazuhiko Shibuya, 2020. "Identity Deception," Springer Books, in: Digital Transformation of Identity in the Age of Artificial Intelligence, chapter 0, pages 99-110, Springer.
  • Handle: RePEc:spr:sprchp:978-981-15-2248-2_7
    DOI: 10.1007/978-981-15-2248-2_7
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a
    for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-981-15-2248-2_7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.