Back to Search
Start Over
Online ID theft techniques, investigation and response
- Source :
- University of Bristol-PURE
- Publication Year :
- 2007
- Publisher :
- Inderscience Publishers, 2007.
-
Abstract
- ID theft, especially in its online form, is currently one of the most prevalent types of computer crime. The limited end-user awareness as well as the retention and business processing of large amounts of personal data in a manner that does not meet security and regulatory requirements provide plenty of opportunities to fraudsters. A number of organisations have produced guidelines of good practice targeted to individuals and organisations; however the matter is still on the rise. In this paper, we review computer-based techniques employed by fraudsters in order to steal IDs and refer to published guidelines and the documented good practice against those. We discuss the issues related to the investigation of such incidents and provide the grounds for the development of a framework to assist in their forensic examination.
- Subjects :
- Computer Networks and Communications
Computer science
business.industry
Digital forensics
Internet privacy
Computer forensics
Computer security
computer.software_genre
Electronic security
Digital evidence
Order (business)
Forensic examination
Cyber crime
Safety, Risk, Reliability and Quality
business
Good practice
Law
computer
Subjects
Details
- ISSN :
- 17519128 and 1751911X
- Volume :
- 1
- Database :
- OpenAIRE
- Journal :
- International Journal of Electronic Security and Digital Forensics
- Accession number :
- edsair.doi.dedup.....e46d63cce4e5410dc5a53b06b4837d8b
- Full Text :
- https://doi.org/10.1504/ijesdf.2007.013594