Developing a Conceptual Framework for Identity Fraud Profiling

This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens & Winchester 2007), we investigate how to best profile identity crime/fraud perpetrators. Here we are guided by relevant components of current business and crime profiling techniques. Second, analysis of interview data from industry and government agency participants was carried out using a modified grounded theoretical approach and concept mapping. Third, we consider, what identity fraud profiling systems target victim organisations might use and implement. We provide a definition for identity fraud profiling grounded from expert interviews, and based on profiling and identity crime literature. The major contributions of this paper are formation of an identity fraud profiling definition, construction of a profiling classification taxonomy, and development of an identity fraud profiling conceptual framework. This also involves providing an understanding of the framework’s main elements, their relationships and application to identity fraud profiling. This framework will be useful to law enforcement, industry organisations, and government agencies when fighting to deter, detect, and prevent identity crime.

[1]  Franco Taroni,et al.  Statistics and the Evaluation of Evidence for Forensic Scientists , 2004 .

[2]  Mariano-Florentino Cuéllar The Tenuous Relationship Between the Fight Against Money Laundering and the Disruption of Criminal Finance , 2002 .

[3]  Homa Atabakhsh,et al.  Criminal Identity Deception and Deception Detection in Law Enforcement , 2004 .

[4]  Bill Ong Hing Misusing Immigration Policies in the Name of Homeland Security , 2006 .

[5]  Kenneth J. Stevens,et al.  Investigating the role of Profiling in the Detection and Prevention of Identity Fraud , 2004 .

[6]  Gary T. Marx,et al.  Routinizing the Discovery of Secrets , 1984 .

[7]  David V. Canter,et al.  Mapping Murder: The Secrets of Geographical Profiling , 2003 .

[8]  Edward M. Miller Race, socioeconomic variables, and intelligence : a review and extension of The Bell Curve , 1995 .

[9]  Prashant J. Shenoy,et al.  Resource overbooking and application profiling in shared hosting platforms , 2002, OSDI '02.

[10]  Gediminas Adomavicius,et al.  User profiling in personalization applications through rule discovery and validation , 1999, KDD '99.

[11]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[12]  R. Clarke A Hidden Challenge to the Regulation of Data Surveillance , 2003 .

[13]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[14]  Candice Batton,et al.  Theoretical and Methodological Issues in Racial Profiling Research , 2004 .

[15]  Timothy Roscoe,et al.  Resource overbooking and application profiling in shared hosting platforms , 2002, OSDI '02.

[16]  Patrick E. Cook,et al.  Criminal Profiling , 1999 .

[17]  Bruce D. Sales,et al.  Criminal Profiling: Developing an Effective Science and Practice , 2006 .

[18]  Xiangliang Zhang,et al.  Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..

[19]  JAMES DAVID BALLARD,et al.  Technological Facilitation of Terrorism , 2002 .

[20]  Klaus-Peter Wiedmann,et al.  Customer profiling in e-commerce: Methodological aspects and challenges , 2002 .

[21]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[22]  Stuart Loh,et al.  Continuous Assurance of E-Business Transactions For Fraud Detection , 2002 .

[23]  A. Strauss,et al.  Grounded theory methodology: An overview. , 1994 .

[24]  Gary R. Gordon,et al.  The Ongoing Critical Threats Created by Identity Fraud: An Action Plan , 2006 .

[25]  Rodger Jamieson,et al.  An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts , 2007, PACIS.

[26]  Joseph A. Davis Criminal Personality Profiling and Crime Scene Assessment , 1999 .

[27]  Nathan Gregory,et al.  Offender profiling: A review of the literature. , 2005 .

[28]  Steven A. Egger Psychological Profiling , 1999 .

[29]  Charles L. Becton The Drug Courier Profile: All Seems Infected That Th' Infected Spy, as All Looks Yellow to the Jaundic'd Eye , 1987 .