methodology ontology who identifies who? how? how to structure input of research? D2.1 Nabeth 2004 ontology in computer sciences: ‘explicit specification of a conceptualisation’ ontology (what is) epistemology (what can we know) methodology (how can we produce knowledge) 12.07.2016 2nd WP2 Workshop @ INSEAD 2 ontology in computer science is an instrument to clarify and share the use of terms (pragmatic approach) better not get into a discussion on ‘real meaning’ or ‘true identity’ better see the difference between 1st and 3rd person perspective or self and same 12.07.2016 2nd WP2 Workshop @ INSEAD 3 identity concept modeling (mix of 1st/3rd p. perspective) I, me and self (Mead) true identity, assigned identity, abstracted identity (Durand) identities and territories (contexts, Nabeth?) relational and dynamic concept of identity as nexus of different roles, evershifting 12.07.2016 2nd WP2 Workshop @ INSEAD 4 identification concept 3rd person perspective risks, mechanisms, protection against, management importance 1st person perspective (organisations, national state) 12.07.2016 2nd WP2 Workshop @ INSEAD 5 Inventory of terms and some categorisation definitions, illustrations and references, relations between terms beginnings of the construction of a semantic network: lexical (syntactic, definitions that relate a term to other terms) 12.07.2016 2nd WP2 Workshop @ INSEAD 6 Canhoto Backhouse categorization theory and semiotics case-study: EU-directive to combat money laundering objective the same in all MS’s wide variation in submission levels 12.07.2016 2nd WP2 Workshop @ INSEAD 7 Suspicious Transaction Report STR to Financial Intelligence Unit trade off between false negatives and false positives, reporting institution is stimulated to over-report, law enforcement agents should minimize false positives over-reporting creates backlog 12.07.2016 2nd WP2 Workshop @ INSEAD 8 how to reduce false negatives and false positives: how to expand knowledge to refine the identification of suspicious financial transactions 12.07.2016 2nd WP2 Workshop @ INSEAD 9 role of automatic monitoring role of intuition (practical wisdom, experience, refined judgement) traditional methodology too much oriented towards technological design and legal regulation, plea for incorporation of semiotics 12.07.2016 2nd WP2 Workshop @ INSEAD 10 semiotics I physical level records of actions and users empirical level aggregation of data at client level syntactical level automatic monitoring systems 12.07.2016 2nd WP2 Workshop @ INSEAD 11 semiotics II semantic level legal landscape, differentiation MS’s pragmatic level cognitive prototype developed by professionals with significant experience social level formal/informal norms, cultural context 12.07.2016 2nd WP2 Workshop @ INSEAD 12 profiling/categorisation how to generate profiles that yield few false negatives and few false positives (balance between the two will depend per context) this is a matter of both privacy and security but privacy/security is also about not being profiled (anonymity, pseudonymity, unlinkability) 12.07.2016 2nd WP2 Workshop @ INSEAD 13 refinement of identification syntactical level: develop intelligent automatic monitoring systems pragmatic level: learning theory: interpretation of automatically generated profiles, how to generate/recognise new patterns social level: diversity of socio-cultural norms 12.07.2016 2nd WP2 Workshop @ INSEAD 14 semiotics recognition of intersubjective perspective in objectification: beyond reification of ontologies beyond reductive interpretations of identity challenge: how to further refine profiling technologies while protecting indeterminate identity (freedom to (re)define yourself) 12.07.2016 2nd WP2 Workshop @ INSEAD 15