An identity fraud model categorising perpetrators, channels, methods of attack, victims and organisational impacts

Rodger Jamieson, Greg Stephens, Donald Winchester

Research output: Contribution to conferenceConference paper

Abstract

This paper addresses many important questions. Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model's elements and relationships. This framework will be useful to law enforcement, business and government organisations when fighting identity crime. This research has spawned a larger research agenda into identity fraud.
Original languageEnglish
Publication statusPublished - 1 Dec 2007
Externally publishedYes
EventPACIS 2007 - 11th Pacific Asia Conference on Information Systems: Managing Diversity in Digital Enterprises -
Duration: 1 Dec 2007 → …

Conference

ConferencePACIS 2007 - 11th Pacific Asia Conference on Information Systems: Managing Diversity in Digital Enterprises
Period1/12/07 → …

Keywords

  • Identity fraud
  • Identity fraud perpetrators
  • Information systems
  • Organisational impact of crime
  • Proof of identity (POI) and personal identifying information (PII)

Fingerprint

Dive into the research topics of 'An identity fraud model categorising perpetrators, channels, methods of attack, victims and organisational impacts'. Together they form a unique fingerprint.

Cite this