Identity Theft and Fraud
Evaluating and Managing Risk
Publication Year: 2012
To date, little has been written on identity theft and fraud with a Canadian audience in mind. This book fills that gap, helping Canadians minimize their identity theft and fraud risks.
Published by: University of Ottawa Press
Title Page, Copyright
Chapter 1: Introduction
The information age has brought many benefits to consumers, organizations and government agencies. We have ready access over the Internet to a huge range of information that can satisfy just about anyone’s needs, we can communicate with people and...
Chapter 2: Understanding Identity Theft and Fraud
This chapter begins the exploration of the concepts behind identity theft and fraud. The basic ideas are presented first, including certain problem domains. Then a comprehensive model of the identity theft and fraud process is introduced, including an explanation...
Chapter 3: Risk and Trust
Risk is an extremely important aspect of the process of protecting against identity theft, because the level of perceived risk from the threat of identity theft determines how much time, effort and money should be spent to reduce this risk. If the risk is perceived...
Chapter 4: Information Sources for Identity Theft and Fraud
Human identification is the basis of all studies involving identity theft and fraud. This chapter explores this feature in some detail, then applies it to the credit industry, where identification is managed by a variety of identifiers and verifiers. Personal credit...
Chapter 5: The Nature and Scope of Identity Theft and Fraud
This chapter is a detailed discussion of the characteristics of identity theft, including its definition, how it may occur, how identity thieves physically acquire identity information in various ways, and the nature of criminal social engineering activities like certain...
Chapter 6: Measuring Identity Theft and Fraud
Measuring identity theft and fraud is critically important if society is to make any progress in defending against it. This derives from the old axiom that you can’t manage something if you can’t measure it. However, there are many problems with determining how...
Chapter 7: Managing the Risks of Data Theft, Identity Theft and Fraud
The focus of this chapter is on the development of a general model for managing data, identity theft and fraud risks. The purpose of the model is to provide advice in how to contain and counter such risks in an organized manner. The model’s concept...
Chapter 8: A Lifecycle Approach to Identity Asset Protection
In Chapter 7, a general three-phase model (Anticipatory, Reactionary and Remediation) was developed for managing data, identity theft and fraud risks, and it was applied in specific ways to manage these risks for larger organizations, small businesses and...
Chapter 9: Employee Responsibility for Risks to Identity Assets
Are employees responsible for identity theft risks? Organizations are the sites of identity information collection, use and storage, and employees are involved in all the stages of the identity management lifecycle. How they deal with information at hand will...
Chapter 10: Consumer and Business Perspectives
Reducing the risk from identity theft is very much the responsibility of both individuals and organizations, who must also become aware of and take certain steps to protect themselves against identity theft and fraud threats. This chapter deals with...
Chapter 11: Technical Perspectives On Security
The most important network security issues are those that involve defending against the increasing degree of criminal activity on the Internet. In previous chapters we have discussed risk management (Chapters 7 and 8), employee behavioural issues (Chapter...
Chapter 12: Evaluating and Managing Organizational Readiness for Security and IDTF Risks
Information security is in a constant state of change, and security methodologies have been unable to keep pace with the continuous appearance of new threats. With each advance in technology, new risks are exposed that could represent security exposures to the enterprise...
Chapter 13: A Research Agenda for Identity Theft and Fraud Risks
There are many possible aspects of IDTF and associated risks that can be explored by researchers wishing to contribute their expertise in the continuing battle against this growing problem. For example, a recent article by Romanosky et al. (Romanosky, Telang...
Chapter 14: Monitoring Trends: Indexes of Identity Theft and Fraud
Throughout this book, we have outlined findings from various surveys and other sources on IDTF. In this chapter, we focus on findings discovered by collecting relevant data through government-mandated policies and by surveys that probed the consumer, business...
Chapter 15: Overview of the Book and a Glimpse of the Future
The objective of this book is to highlight the risks of identity theft and fraud to consumers, businesses, governments and other institutions that are victims of the escalating level of these crimes, and to discuss methods that are being used to reduce...