An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts

نویسندگان

  • Rodger Jamieson
  • Gregory Stephens
  • Donald Winchester
چکیده

This paper addresses many important questions. Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model’s elements and relationships. This framework will be useful to law enforcement, business and government organisations when fighting identity crime. This research has spawned a larger research agenda into identity fraud.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a Conceptual Framework for Identity Fraud Profiling

This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens & Winchester 2007), we investigate how to be...

متن کامل

Avatars, Capital Ships, and False Promises: An Analysis of Fraud in Virtual Worlds and its Implications for the Real World

We expand accounting research on fraud by categorizing and analyzing fraudulent acts in virtual worlds. Virtual worlds are computer-generated, immersive environments where players control a character, an avatar, to interact with others online while engaging in social, entertainment, educational, and commercial endeavors. Virtual worlds include unique capabilities such as anonymous interaction t...

متن کامل

Investigating ID Fraud in Australia: A Research Program

Identity fraud is recognised as a serious and significant problem in Australia by Government and industry, with estimates of losses ranging up to $4 billion per annum. This paper presents details of a research project which aims to research identity fraud from an organisational, information systems, and social perspective by investigating control, management and policy alternatives. Outcomes wi...

متن کامل

Negotiation and Power in the Cybercrime Framework

Given the growing prevalence of Internet fraud and its enormous social costs, the goal of this article is to advance theoretical understanding of the power that perpetrators use when influencing victims in fraudulent transactions. Specifically, the article proposes an interactive model, combining the dimensions of power and negotiation from the management and psychology literature. We then exam...

متن کامل

An Empirical Study of a Two-Sided Model of Fraudulent Exchange

Interpersonal fraud is a complex social action constituted by a series of dependent events and an accurate representation of this interaction requires the examination of both the victim and perpetrator in fraudulent exchanges. IS domain research on ecommerce provides behavioral models that can be used to describe a victim’s perspective on fraud in online commerce. Similarly, research in the acc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007