Data loss in the British government : A bounty of credentials for organised crime
- Authors: Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, Brisbane : 7th-9th July 2009 p. 531-536
- Full Text:
- Description: Personal information stored in large government databases is a prime target for criminals because of its potential use in identity theft and associated crime, such as fraud. In 2007-2008, a number of very high-profile cases of data loss within the British Government, its departments and non-departmental bodies raised three pressing issues of public significance: (1) how broad was the loss across agencies; (2) how deep was each loss incident; and (3) what counter-measures (organisational and technical) could be put in place to prevent further loss? This paper provides a chronological review of data loss incidents, and assesses the potential to mitigate risk, given organisational structures and processes, and taking into account current government calls for further medium and long-term acquisition and storage of citizen's private data. The potential use of the "lost" credentials is discussed in the context of identity theft. © 2009 IEEE.
- Authors: Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, Brisbane : 7th-9th July 2009 p. 531-536
- Full Text:
- Description: Personal information stored in large government databases is a prime target for criminals because of its potential use in identity theft and associated crime, such as fraud. In 2007-2008, a number of very high-profile cases of data loss within the British Government, its departments and non-departmental bodies raised three pressing issues of public significance: (1) how broad was the loss across agencies; (2) how deep was each loss incident; and (3) what counter-measures (organisational and technical) could be put in place to prevent further loss? This paper provides a chronological review of data loss incidents, and assesses the potential to mitigate risk, given organisational structures and processes, and taking into account current government calls for further medium and long-term acquisition and storage of citizen's private data. The potential use of the "lost" credentials is discussed in the context of identity theft. © 2009 IEEE.
Understanding victims of identity theft: Preliminary insights
- Turville, Kylie, Yearwood, John, Miller, Charlynn
- Authors: Turville, Kylie , Yearwood, John , Miller, Charlynn
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: Identity theft is not a new crime, however changes in society and the way that business is conducted have made it an easier, attractive and more lucrative crime. When a victim discovers the misuse of their identity they must then begin the process of recovery, including fixing any issues that may have been created by the misuse. For some victims this may only take a small amount of time and effort, however for others they may continue to experience issues for many years after the initial moment of discovery. To date, little research has been conducted within Australia or internationally regarding what a victim experiences as they work through the recovery process. This paper presents a summary of the identity theft domain with an emphasis on research conducted within Australia, and identifies a number of issues regarding research in this area. The paper also provides an overview of the research project currently being undertaken by the authors in obtaining an understanding of what victims of identity theft experience during the recovery process; particularly their experiences when dealing with organizations. Finally, it reports on some of the preliminary work that has already been conducted for the research project. © 2010 IEEE.
- Authors: Turville, Kylie , Yearwood, John , Miller, Charlynn
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: Identity theft is not a new crime, however changes in society and the way that business is conducted have made it an easier, attractive and more lucrative crime. When a victim discovers the misuse of their identity they must then begin the process of recovery, including fixing any issues that may have been created by the misuse. For some victims this may only take a small amount of time and effort, however for others they may continue to experience issues for many years after the initial moment of discovery. To date, little research has been conducted within Australia or internationally regarding what a victim experiences as they work through the recovery process. This paper presents a summary of the identity theft domain with an emphasis on research conducted within Australia, and identifies a number of issues regarding research in this area. The paper also provides an overview of the research project currently being undertaken by the authors in obtaining an understanding of what victims of identity theft experience during the recovery process; particularly their experiences when dealing with organizations. Finally, it reports on some of the preliminary work that has already been conducted for the research project. © 2010 IEEE.
Understanding victims of identity theft: A grounded theory approach
- Turville, Kylie, Firmin, Sally, Yearwood, John, Miller, Charlynn
- Authors: Turville, Kylie , Firmin, Sally , Yearwood, John , Miller, Charlynn
- Date: 2010
- Type: Text , Conference paper
- Relation: 5th International Conference on Qualitative Research in IT and IT in Qualitative Research, QualIT 2010
- Full Text:
- Reviewed:
- Description: Being a victim of identity theft can be a devastating and life-changing event. Once the victim discovers the misuse they need to begin the process of recovery. For the "lucky" victims this may take only a couple of phone calls and a small amount of time; however, some victims may experience difficulties for many year. In order to recover, victims of crime require support and assistance; however, within Australia this support is sadly lacking. In order to identify the issues currently faced by victims of identity theft as they work through the recovery process, a Grounded Theory methodology was identified as most appropriate. This paper provides a brief overview of the history of the research project; a brief introduction of grounded theory with a focus on preconceived ideas and their implications; and a description of the research project currently being undertaken. A discussion of some issues experienced when using grounded theory within an IT department with very little experience of qualitative research will be provided, along with some preliminary results.
- Description: E1
- Authors: Turville, Kylie , Firmin, Sally , Yearwood, John , Miller, Charlynn
- Date: 2010
- Type: Text , Conference paper
- Relation: 5th International Conference on Qualitative Research in IT and IT in Qualitative Research, QualIT 2010
- Full Text:
- Reviewed:
- Description: Being a victim of identity theft can be a devastating and life-changing event. Once the victim discovers the misuse they need to begin the process of recovery. For the "lucky" victims this may take only a couple of phone calls and a small amount of time; however, some victims may experience difficulties for many year. In order to recover, victims of crime require support and assistance; however, within Australia this support is sadly lacking. In order to identify the issues currently faced by victims of identity theft as they work through the recovery process, a Grounded Theory methodology was identified as most appropriate. This paper provides a brief overview of the history of the research project; a brief introduction of grounded theory with a focus on preconceived ideas and their implications; and a description of the research project currently being undertaken. A discussion of some issues experienced when using grounded theory within an IT department with very little experience of qualitative research will be provided, along with some preliminary results.
- Description: E1
Social networking, the catalyst for identity thefts in the digital society
- Authors: Holm, Eric
- Date: 2014
- Type: Text , Journal article
- Relation: International Journal on Advances in Life Sciences Vol. 6, no. 3-4 (2014), p. 157-166
- Full Text:
- Reviewed:
- Description: This paper explores the vulnerability of social network users to identity theft when they share personal identification information online. The sharing of details like age, sex, address and other personal information like photographs can assist in establishing an identity. Identity criminals exploit social network users and the weaknesses of social networking sites to gather the information needed to commit identity theft and identity fraud using this identification information. While there are mechanisms that can reduce the incidence of this crime, information sharing on social networks is voluntary, which, makes its control difficult. This paper presents an exploration of existing literature from Australia, the United States and United Kingdom and highlights the importance of the relationship between social networking and identity crime. The drivers to sharing information on these platforms are considered. The paper provides opportunities to improve the understanding of the relationship between personal information and the crime. A difficulty in having preventative mechanisms in place is that social networking sites have a vested interest in promoting rather than preventing the sharing of information. Further, identity crime is pervasive which, makes the amelioration of risks difficult. In conclusion, efforts have been made in this paper to outline arguments that will assist in resolving the crime given vulnerability of social network users to identity theft. © by authors.
- Authors: Holm, Eric
- Date: 2014
- Type: Text , Journal article
- Relation: International Journal on Advances in Life Sciences Vol. 6, no. 3-4 (2014), p. 157-166
- Full Text:
- Reviewed:
- Description: This paper explores the vulnerability of social network users to identity theft when they share personal identification information online. The sharing of details like age, sex, address and other personal information like photographs can assist in establishing an identity. Identity criminals exploit social network users and the weaknesses of social networking sites to gather the information needed to commit identity theft and identity fraud using this identification information. While there are mechanisms that can reduce the incidence of this crime, information sharing on social networks is voluntary, which, makes its control difficult. This paper presents an exploration of existing literature from Australia, the United States and United Kingdom and highlights the importance of the relationship between social networking and identity crime. The drivers to sharing information on these platforms are considered. The paper provides opportunities to improve the understanding of the relationship between personal information and the crime. A difficulty in having preventative mechanisms in place is that social networking sites have a vested interest in promoting rather than preventing the sharing of information. Further, identity crime is pervasive which, makes the amelioration of risks difficult. In conclusion, efforts have been made in this paper to outline arguments that will assist in resolving the crime given vulnerability of social network users to identity theft. © by authors.
- «
- ‹
- 1
- ›
- »