{"id":"https://openalex.org/W2103312254","doi":"https://doi.org/10.1186/s13388-015-0021-0","title":"A framework of identity resolution: evaluating identity attributes and matching algorithms","display_name":"A framework of identity resolution: evaluating identity attributes and matching algorithms","publication_year":2015,"publication_date":"2015-07-27","ids":{"openalex":"https://openalex.org/W2103312254","doi":"https://doi.org/10.1186/s13388-015-0021-0","mag":"2103312254"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-015-0021-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-015-0021-0","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-015-0021-0","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-015-0021-0","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078433071","display_name":"Jiexun Li","orcid":"https://orcid.org/0000-0002-5259-5363"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiexun Li","raw_affiliation_strings":["College of Business, Oregon State University, Corvallis, OR, 97331, USA","College of Business, Oregon State University, Corvallis, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Business, Oregon State University, Corvallis, OR, 97331, USA","institution_ids":["https://openalex.org/I131249849"]},{"raw_affiliation_string":"College of Business, Oregon State University, Corvallis, USA#TAB#","institution_ids":["https://openalex.org/I131249849"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010260222","display_name":"G. Alan Wang","orcid":"https://orcid.org/0000-0002-5026-881X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alan G. Wang","raw_affiliation_strings":["Pamplin College of Business, Virginia Tech, Blacksburg, VA, 24061, USA","Pamplin College of Business, Virginia Tech, Blacksburg, USA"],"affiliations":[{"raw_affiliation_string":"Pamplin College of Business, Virginia Tech, Blacksburg, VA, 24061, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Pamplin College of Business, Virginia Tech, Blacksburg, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078433071"],"corresponding_institution_ids":["https://openalex.org/I131249849"],"apc_list":null,"apc_paid":null,"fwci":1.6462,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.85944783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7647525072097778},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7354800701141357},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.6222333908081055},{"id":"https://openalex.org/keywords/transitive-closure","display_name":"Transitive closure","score":0.5522987246513367},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5386052131652832},{"id":"https://openalex.org/keywords/transitive-relation","display_name":"Transitive relation","score":0.5354257822036743},{"id":"https://openalex.org/keywords/social-identity-approach","display_name":"Social identity approach","score":0.5203089714050293},{"id":"https://openalex.org/keywords/resolution","display_name":"Resolution (logic)","score":0.5085896253585815},{"id":"https://openalex.org/keywords/social-identity-theory","display_name":"Social identity theory","score":0.5057594776153564},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.47987785935401917},{"id":"https://openalex.org/keywords/referent","display_name":"Referent","score":0.4623260796070099},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3312642574310303},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2410452663898468},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.23793494701385498},{"id":"https://openalex.org/keywords/social-group","display_name":"Social group","score":0.19641521573066711},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.18611714243888855},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13763543963432312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12239927053451538}],"concepts":[{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7647525072097778},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7354800701141357},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.6222333908081055},{"id":"https://openalex.org/C128896722","wikidata":"https://www.wikidata.org/wiki/Q1501387","display_name":"Transitive closure","level":2,"score":0.5522987246513367},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5386052131652832},{"id":"https://openalex.org/C191399111","wikidata":"https://www.wikidata.org/wiki/Q64861","display_name":"Transitive relation","level":2,"score":0.5354257822036743},{"id":"https://openalex.org/C195755200","wikidata":"https://www.wikidata.org/wiki/Q7551162","display_name":"Social identity approach","level":4,"score":0.5203089714050293},{"id":"https://openalex.org/C138268822","wikidata":"https://www.wikidata.org/wiki/Q1051925","display_name":"Resolution (logic)","level":2,"score":0.5085896253585815},{"id":"https://openalex.org/C98447023","wikidata":"https://www.wikidata.org/wiki/Q1540351","display_name":"Social identity theory","level":3,"score":0.5057594776153564},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.47987785935401917},{"id":"https://openalex.org/C2777096784","wikidata":"https://www.wikidata.org/wiki/Q3826351","display_name":"Referent","level":2,"score":0.4623260796070099},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3312642574310303},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2410452663898468},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.23793494701385498},{"id":"https://openalex.org/C180872759","wikidata":"https://www.wikidata.org/wiki/Q874405","display_name":"Social group","level":2,"score":0.19641521573066711},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.18611714243888855},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13763543963432312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12239927053451538},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/s13388-015-0021-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-015-0021-0","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-015-0021-0","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/s13388-015-0021-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-015-0021-0","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-015-0021-0","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6600000262260437,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2103312254.pdf","grobid_xml":"https://content.openalex.org/works/W2103312254.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W25706487","https://openalex.org/W102826459","https://openalex.org/W130948412","https://openalex.org/W338913944","https://openalex.org/W1494501810","https://openalex.org/W1547461197","https://openalex.org/W1559390933","https://openalex.org/W1564630549","https://openalex.org/W1606941371","https://openalex.org/W1647671624","https://openalex.org/W1761401273","https://openalex.org/W1799750435","https://openalex.org/W1979629649","https://openalex.org/W1986581064","https://openalex.org/W2018105456","https://openalex.org/W2024770506","https://openalex.org/W2052390074","https://openalex.org/W2068376489","https://openalex.org/W2073471108","https://openalex.org/W2086322024","https://openalex.org/W2097089247","https://openalex.org/W2102766632","https://openalex.org/W2104511295","https://openalex.org/W2104761952","https://openalex.org/W2107903248","https://openalex.org/W2108991785","https://openalex.org/W2117062793","https://openalex.org/W2135223301","https://openalex.org/W2136209041","https://openalex.org/W2148019918","https://openalex.org/W2153717768","https://openalex.org/W2159481891","https://openalex.org/W2163019836","https://openalex.org/W2292926678","https://openalex.org/W2322816544","https://openalex.org/W2995537986","https://openalex.org/W3146259567","https://openalex.org/W4214671568","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1553139688","https://openalex.org/W2371151875","https://openalex.org/W2136009070","https://openalex.org/W2362009423","https://openalex.org/W2391133415","https://openalex.org/W2012063573","https://openalex.org/W1982015164","https://openalex.org/W203725150","https://openalex.org/W4230967508","https://openalex.org/W1499233953"],"abstract_inverted_index":{"Duplicate":[0],"and":[1,49,71,85,92,101,122],"false":[2],"identity":[3,9,24,42,47,55,62,66,105,111,120],"records":[4,25],"are":[5,27],"quite":[6],"common":[7],"in":[8],"management":[10],"systems":[11],"due":[12],"to":[13,22,29,131],"unintentional":[14],"errors":[15],"or":[16],"intentional":[17],"deceptions.":[18],"Identity":[19],"resolution":[20,43,112],"is":[21,129],"uncover":[23],"that":[26,44],"co-referent":[28],"the":[30,96,133],"same":[31],"real-world":[32,93],"individual.":[33],"In":[34,107],"this":[35],"paper":[36],"we":[37,57],"introduce":[38],"a":[39,109],"framework":[40],"of":[41,61,98,119],"covers":[45],"different":[46],"attributes":[48,103,121],"matching":[50,79,124],"algorithms.":[51],"Guided":[52],"by":[53],"social":[54,68,72,99],"theories,":[56],"define":[58],"three":[59,78,117],"types":[60,118],"cues,":[63],"namely":[64],"personal":[65],"attributes,":[67,70],"behavior":[69,100],"relationship":[73,102],"attributes.":[74],"We":[75],"also":[76],"compare":[77],"algorithms:":[80],"pair-wise":[81],"comparison,":[82],"transitive":[83],"closure,":[84],"collective":[86,110],"clustering.":[87],"Our":[88],"experiments":[89],"using":[90],"synthetic":[91],"data":[94],"demonstrate":[95],"importance":[97],"for":[104],"resolution.":[106],"particular,":[108],"technique,":[113],"which":[114],"captures":[115],"all":[116,137],"makes":[123],"decisions":[125],"on":[126],"identities":[127],"collectively,":[128],"shown":[130],"achieve":[132],"best":[134],"performance":[135],"among":[136],"approaches.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
