An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts

This paper addresses many important questions. Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model’s elements and relationships. This framework will be useful to law enforcement, business and government organisations when fighting identity crime. This research has spawned a larger research agenda into identity fraud.

[1]  David Lacey,et al.  The role of organizations in identity theft response: the organization-individual victim dynamic , 2004 .

[2]  Gurpreet Dhillon,et al.  Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..

[3]  Kenneth J. Stevens,et al.  A Model of E-Fraud , 2003, PACIS.

[4]  Wenjie Wang,et al.  A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.

[5]  Lucian Vasiu,et al.  A conceptual framework of e-fraud control in an integrated supply chain , 2004, ECIS.

[6]  Rodger Jamieson,et al.  Development of a Conceptual Framework for Managing Identity Fraud , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[7]  F. H. Mcclintock,et al.  Crime in England and Wales , 1969 .

[8]  Homa Atabakhsh,et al.  Criminal Identity Deception and Deception Detection in Law Enforcement , 2004 .

[9]  K. Calavita,et al.  SAVINGS AND LOAN FRAUD AS ORGANIZED CRIME: TOWARD A CONCEPTUAL TYPOLOGY OF CORPORATE ILLEGALITY* , 1993 .

[10]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.

[11]  W. K. Wilhelm,et al.  The Fraud Management Lifecycle Theory: A Holistic Approach to Fraud Management. , 2004 .

[12]  G. Dowling,et al.  Corporate reputation and sustained superior financial performance , 2002 .

[13]  Russell Dean Vines,et al.  Phishing: Cutting the Identity Theft Line , 2005 .

[14]  D. Parker Crime by computer , 1976 .

[15]  David Lacey,et al.  Identity fraud in Australia: an evaluation of its nature, cost and extent , 2003 .

[16]  Peter Stephenson,et al.  Investigating Computer-Related Crime , 1999 .

[17]  Gurpreet Dhillon,et al.  Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .