Developing a conceptual framework for identity fraud profiling

Rodger Jamieson, Donald Winchester, Greg Stephens, Stephen Smith

Research output: Contribution to conferenceConference paper


This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens & Winchester 2007), we investigate how to best profile identity crime/fraud perpetrators. Here we are guided by relevant components of current business and crime profiling techniques. Second, analysis of interview data from industry and government agency participants was carried out using a modified grounded theoretical approach and concept mapping. Third, we consider, what identity fraud profiling systems target victim organisations might use and implement. We provide a definition for identity fraud profiling grounded from expert interviews, and based on profiling and identity crime literature. The major contributions of this paper are formation of an identity fraud profiling definition, construction of a profiling classification taxonomy, and development of an identity fraud profiling conceptual framework. This also involves providing an understanding of the framework's main elements, their relationships and application to identity fraud profiling. This framework will be useful to law enforcement, industry organisations, and government agencies when fighting to deter, detect, and prevent identity crime.
Original languageEnglish
Publication statusPublished - 1 Dec 2008
Externally publishedYes
Event16th European Conference on Information Systems, ECIS 2008 -
Duration: 1 Dec 2008 → …


Conference16th European Conference on Information Systems, ECIS 2008
Period1/12/08 → …


  • Identity attributes
  • Identity crime
  • Identity deception
  • Identity fraud
  • Identity fraud profiling
  • Identity theft
  • Information systems (IS)
  • Profiling


Dive into the research topics of 'Developing a conceptual framework for identity fraud profiling'. Together they form a unique fingerprint.

Cite this