We cannot verify your location
Browse Book and Journal Content on Project MUSE
OR
title

Identity Theft and Fraud

Evaluating and Managing Risk

Norm Archer

Publication Year: 2012

Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a risk management approach. It outlines various strategies that can be easily implemented to help prevent identity theft and fraud. It addresses technical issues in a clear and uncomplicated way to help decision-makers at all levels understand the steps their businesses and organizations can take to mitigate identity theft and fraud risks. And it highlights the risks individuals face in this digital age. This book can help anyone – businesses and organizations of all sizes, as well as individuals – develop an identity theft and fraud prevention strategy that will reduce their risk and protect their identity assets.

To date, little has been written on identity theft and fraud with a Canadian audience in mind. This book fills that gap, helping Canadians minimize their identity theft and fraud risks.

Published by: University of Ottawa Press

Title Page, Copyright

pdf iconDownload PDF (44.0 KB)
 

read more

Chapter 1: Introduction

pdf iconDownload PDF (79.6 KB)
pp. 1-13

The information age has brought many benefits to consumers, organizations and government agencies. We have ready access over the Internet to a huge range of information that can satisfy just about anyone’s needs, we can communicate with people and...

read more

Chapter 2: Understanding Identity Theft and Fraud

pdf iconDownload PDF (381.5 KB)
pp. 14-42

This chapter begins the exploration of the concepts behind identity theft and fraud. The basic ideas are presented first, including certain problem domains. Then a comprehensive model of the identity theft and fraud process is introduced, including an explanation...

read more

Chapter 3: Risk and Trust

pdf iconDownload PDF (162.0 KB)
pp. 43-57

Risk is an extremely important aspect of the process of protecting against identity theft, because the level of perceived risk from the threat of identity theft determines how much time, effort and money should be spent to reduce this risk. If the risk is perceived...

read more

Chapter 4: Information Sources for Identity Theft and Fraud

pdf iconDownload PDF (158.1 KB)
pp. 58-75

Human identification is the basis of all studies involving identity theft and fraud. This chapter explores this feature in some detail, then applies it to the credit industry, where identification is managed by a variety of identifiers and verifiers. Personal credit...

read more

Chapter 5: The Nature and Scope of Identity Theft and Fraud

pdf iconDownload PDF (120.2 KB)
pp. 76-101

This chapter is a detailed discussion of the characteristics of identity theft, including its definition, how it may occur, how identity thieves physically acquire identity information in various ways, and the nature of criminal social engineering activities like certain...

read more

Chapter 6: Measuring Identity Theft and Fraud

pdf iconDownload PDF (164.2 KB)
pp. 102-121

Measuring identity theft and fraud is critically important if society is to make any progress in defending against it. This derives from the old axiom that you can’t manage something if you can’t measure it. However, there are many problems with determining how...

read more

Chapter 7: Managing the Risks of Data Theft, Identity Theft and Fraud

pdf iconDownload PDF (213.4 KB)
pp. 122-153

The focus of this chapter is on the development of a general model for managing data, identity theft and fraud risks. The purpose of the model is to provide advice in how to contain and counter such risks in an organized manner. The model’s concept...

read more

Chapter 8: A Lifecycle Approach to Identity Asset Protection

pdf iconDownload PDF (214.7 KB)
pp. 154-186

In Chapter 7, a general three-phase model (Anticipatory, Reactionary and Remediation) was developed for managing data, identity theft and fraud risks, and it was applied in specific ways to manage these risks for larger organizations, small businesses and...

read more

Chapter 9: Employee Responsibility for Risks to Identity Assets

pdf iconDownload PDF (153.7 KB)
pp. 187-203

Are employees responsible for identity theft risks? Organizations are the sites of identity information collection, use and storage, and employees are involved in all the stages of the identity management lifecycle. How they deal with information at hand will...

read more

Chapter 10: Consumer and Business Perspectives

pdf iconDownload PDF (187.2 KB)
pp. 204-225

Reducing the risk from identity theft is very much the responsibility of both individuals and organizations, who must also become aware of and take certain steps to protect themselves against identity theft and fraud threats. This chapter deals with...

read more

Chapter 11: Technical Perspectives On Security

pdf iconDownload PDF (309.2 KB)
pp. 226-258

The most important network security issues are those that involve defending against the increasing degree of criminal activity on the Internet. In previous chapters we have discussed risk management (Chapters 7 and 8), employee behavioural issues (Chapter...

read more

Chapter 12: Evaluating and Managing Organizational Readiness for Security and IDTF Risks

pdf iconDownload PDF (168.5 KB)
pp. 259-274

Information security is in a constant state of change, and security methodologies have been unable to keep pace with the continuous appearance of new threats. With each advance in technology, new risks are exposed that could represent security exposures to the enterprise...

read more

Chapter 13: A Research Agenda for Identity Theft and Fraud Risks

pdf iconDownload PDF (114.8 KB)
pp. 275-298

There are many possible aspects of IDTF and associated risks that can be explored by researchers wishing to contribute their expertise in the continuing battle against this growing problem. For example, a recent article by Romanosky et al. (Romanosky, Telang...

read more

Chapter 14: Monitoring Trends: Indexes of Identity Theft and Fraud

pdf iconDownload PDF (87.2 KB)
pp. 299-313

Throughout this book, we have outlined findings from various surveys and other sources on IDTF. In this chapter, we focus on findings discovered by collecting relevant data through government-mandated policies and by surveys that probed the consumer, business...

read more

Chapter 15: Overview of the Book and a Glimpse of the Future

pdf iconDownload PDF (84.6 KB)
pp. 314-329

The objective of this book is to highlight the risks of identity theft and fraud to consumers, businesses, governments and other institutions that are victims of the escalating level of these crimes, and to discuss methods that are being used to reduce...

Glossary

pdf iconDownload PDF (93.1 KB)
pp. 330-350

Index

pdf iconDownload PDF (504.0 KB)
pp. 351-362


E-ISBN-13: 9780776619927
E-ISBN-10: 0776619926
Print-ISBN-13: 9780776607771
Print-ISBN-10: 0776607774

Page Count: 368
Publication Year: 2012

Series Title: Critical Issues in Risk Management

Research Areas

Recommend

Subject Headings

  • Identity theft--Canada--Prevention.
  • Identity theft--Canada.
  • Fraud--Canada.
  • Fraud--Canada--Prevention.
  • Risk management--Canada.
  • Identity theft.
  • Fraud.
  • Risk management.
  • You have access to this content
  • Free sample
  • Open Access
  • Restricted Access