What’s your real age? an empirical analysis of identity fraud in online game

In this paper, we empirically examine the ID fraud problem in online game. We analyzed over 260,000 users’ behavior using terabytes of big data. The results of the econometrics analysis showed that the behavior pattern of group around 40 years old was very similar to that of teenagers. Considering that the game used for the analysis is a game for young users, this means that some of the users in the group around 40 years old may be teenagers who have stolen the parent’s ID. In addition, we performed discriminant analysis and log traffic analysis to estimate how many young users were using their parent IDs. As a result, about 47% of the users around 40 years old were found to be teenager users. Also, behavior patterns of users who are estimated to be teenagers have been found in other age groups.

[1]  Ali Mili,et al.  Defining and computing a value based cyber-security measure , 2011 .

[2]  Brad McKenna,et al.  Issues In The Study Of Virtual World Social Movements , 2011, PACIS.

[3]  R. Lazarus Coping theory and research: past, present, and future. , 1993, Psychosomatic medicine.

[4]  R. Kozinets Netnography: Doing Ethnographic Research Online , 2009 .

[5]  Atsushi Fujita,et al.  Exploiting MMORPG log data toward efficient RMT player detection , 2010, Advances in Computer Entertainment Technology.

[6]  Jakob J. Assmann,et al.  MMOGs as Emerging Opportunities for Research on Virtual Organizations and Teams , 2010, AMCIS.

[7]  Edward Castronova,et al.  Exodus to the Virtual World: How Online Fun Is Changing Reality , 2007 .

[8]  Callie Marie Rennison,et al.  National Crime Victimization Survey (NCVS) , 2014 .

[9]  Woodrow Barfield,et al.  Intellectual Property Rights in Virtual Environments: Considering the Rights of Owners, Programmers and Virtual Avatars , 2006 .

[10]  Bert-Jaap Koops,et al.  Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.

[11]  Hao Wang,et al.  Measuring and ranking attacks based on vulnerability analysis , 2012, Inf. Syst. E Bus. Manag..

[12]  Christophe Roquilly,et al.  Control Over Virtual Worlds by Game Companies: Issues and Recommendations , 2011, MIS Q..

[13]  Mark W. Bell Toward a Definition of “Virtual Worlds” , 1970 .

[14]  Dahui Li,et al.  Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..

[15]  Venkatesh Shankar,et al.  Network Effects and Competition: An Empirical Analysis of the Home Video Game Industry , 2002 .

[16]  Dustin Burke,et al.  Behavioral analysis of botnets for threat intelligence , 2011, Information Systems and e-Business Management.

[17]  Oz Shy The Economics of Network Industries , 2001 .

[18]  Joseph Farrell,et al.  Standardization, Compatibility, and Innovation , 1985 .

[19]  Brad McKenna,et al.  Social Movements in World of Warcraft , 2011, AMCIS.

[20]  C. Shapiro,et al.  Network Externalities, Competition, and Compatibility , 1985 .

[21]  Wen-Zhan Song,et al.  Management and security of remote sensor networks in hazardous environments using over the air programming , 2012, Inf. Syst. E Bus. Manag..

[22]  Howard Rheingold,et al.  The Virtual Community: Homesteading on the Electronic Frontier , 2000 .