scispace - formally typeset
Open Access

The Ongoing Critical Threats Created by Identity Fraud: An Action Plan

Reads0
Chats0
TLDR
This paper follows the structure of the earlier one, maintaining the same headings for consistency purposes, and discusses what has occurred since 2003, what gaps remain, and what the research agenda should be to close those gaps.
Abstract
Much has happened since the 2003 publication of Identity Fraud: A Critical National and Global Threat and yet much is still the same. There is a greater awareness of the problem, as indicated by the number of conferences focused on identity theft, the amount of press on the topic, and the increase in legislative activity. However, we continue to struggle with the ramifications of the use and risks of data in an information society and its potential implications for identity fraud. The possibility that there is a correlation between data misuse and identity fraud has been exacerbated by the heavily publicized recent corporate and governmental security breaches that have involved the loss or theft of personal data. As a result, the debate on the responsible use of personal identifier information for making decisions in the areas of commerce, law enforcement, and national security has intensified. The challenges of privacy and security in this new era remain the same. This paper follows the structure of the earlier one, maintaining the same headings for consistency purposes. In each section, there is discussion of what has occurred since 2003, what gaps remain, and what the research agenda should be to close those gaps. Examples of this research are suggested.

read more

Content maybe subject to copyright    Report

Citations
More filters
Dissertation

Am I who I say I am? a systems analysis into identity fraud in New Zealand

TL;DR: In this article, the authors investigate the systems issues surrounding identity fraud in New Zealand and find that New Zealand does have serious problems in its systems, which in some cases facilitate identity fraud.
Proceedings Article

Developing a Conceptual Framework for Identity Fraud Profiling

TL;DR: This paper identifies the main contemporary profiling methods that are crime and/or business based and develops a conceptual framework for identity fraud profiling that will be useful to law enforcement, industry organisations, and government agencies when fighting to deter, detect, and prevent identity crime.

Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria

TL;DR: In this article, the authors provided scholarly research about the factors that influenced the adoption of biometrics technology to reliably identify and verify individuals in Nigeria to control identity fraud, and the results indicated statistical correlation between adopt biometric technology and three other variables, ease of use, perceived usefulness, and awareness.
References
More filters
Journal Article

The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States.

TL;DR: The Commission's report really does add enormous amounts of history to the sound bites and 30-second visuals that have pervaded politics and the world assessment of the US since that time.
Book

The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States

TL;DR: The final report of the 9/11 Commission on Terrorist Attacks upon the United States (also known as the 9 /11 Commission) was published by the US Department of State in 2003 as mentioned in this paper.

Identity Fraud: A Critical National and Global Threat

TL;DR: The Economic Crime Institute of Utica College (www.ecii.edu) supports education and research in economic crime and information security, providing a reliable resource for innovative solutions to corporate, government, and law enforcement entities.

Implementation of FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors

TL;DR: To help agencies acquire PIV systems that correctly implement FIPS 201, NIST has started a conformance testing program for the standard.
Related Papers (5)