Managing the loss of control over cyber identity | IEEE Conference Publication | IEEE Xplore