An approach to managing identity fraud

Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Abstract

This chapter outlines components of a strategy for government and a conceptual identity fraud enterprise management framework for organizations to manage identity crime occurring via cyberspace. Identity crime, related cybercrimes and information systems security breaches are insidious motivators for governments and organizations to protect and secure their systems, databases and other assets against intrusion and loss. Managing identity crime is a critical step in cyber security and global information assurance. Strategy components and conceptual model elements are constructed through analysis and synthesis of models from academic literature, and reports by industry and government professionals. A comprehensive government strategy with a legislative component reinforces organizational policies to combat identity crimes. Model components used to develop our identity fraud organizational framework were selected from cost of identity fraud, identity risk management, identity fraud profiling, and fraud risk management literature. Our framework is organized into anticipatory, reactionary and remediation phases.
Original languageEnglish
Title of host publicationCyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Number of pages16
ISBN (Electronic)9781605663265
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes

Fingerprint

Dive into the research topics of 'An approach to managing identity fraud'. Together they form a unique fingerprint.

Cite this